misp-circl-feed/feeds/circl/stix-2.1/cd8b9093-e319-4719-81b3-04a275b2f048.json

28032 lines
No EOL
1.2 MiB

{
"type": "bundle",
"id": "bundle--cd8b9093-e319-4719-81b3-04a275b2f048",
"objects": [
{
"type": "identity",
"spec_version": "2.1",
"id": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:29.000Z",
"modified": "2020-10-30T08:56:29.000Z",
"name": "CIRCL",
"identity_class": "organization"
},
{
"type": "report",
"spec_version": "2.1",
"id": "report--cd8b9093-e319-4719-81b3-04a275b2f048",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:29.000Z",
"modified": "2020-10-30T08:56:29.000Z",
"name": "OSINT - Ryuk Ransomware: Extensive Attack Infrastructure Revealed",
"published": "2020-10-30T09:10:43Z",
"object_refs": [
"indicator--8dfed048-c049-4ca3-8c61-18e849312303",
"indicator--b88500ac-0313-4587-a31d-1169f2cb698a",
"indicator--165a272e-1ca2-471c-a546-7d280a93c8d8",
"indicator--55cdea8b-75a6-4ab0-93dc-d455cb2d5a85",
"indicator--f086465e-1c86-4f39-90b2-0f29a3889061",
"indicator--b2776b50-8071-4a5b-b2b8-a139a6bcc5ed",
"indicator--b115a272-f614-4d78-8db3-4f5993dfb048",
"indicator--85aceed2-4f89-486b-870c-1400dee522c1",
"indicator--015f2f6f-df45-465b-95d1-928bf070e005",
"indicator--602bf525-e5b4-4dc5-a505-94329b5db176",
"indicator--02443c02-506b-4958-abd0-daccb7f77ef5",
"indicator--a199f61e-5141-47ea-8425-dc0e924d7774",
"indicator--f820ed47-f5a5-442e-9848-81df9b3bc31a",
"indicator--7e54e76d-8e4c-4e7f-936c-83097ecffad3",
"indicator--bdb8d512-4b26-4ea4-a1b2-84731b47df17",
"indicator--15f3bc4c-a33a-4cef-b36d-e064ff92a6b3",
"indicator--4b82b465-a2f5-4646-beb6-875bc34ec338",
"indicator--0aa27621-17cc-414e-9b59-bc6db1b99199",
"indicator--15f46a6e-675b-46ef-a3dd-383e253be58b",
"indicator--8c5e3e2c-3a04-47e5-aa2d-7352d33420e1",
"indicator--11c24aa3-d669-42b5-b6d7-d062392832be",
"indicator--c6c924b0-5c08-44d6-aef0-992614080b49",
"indicator--b8fe84f9-053c-40aa-8435-1601ae67c504",
"indicator--3f74ca97-6061-4964-8a06-14d22e059efe",
"indicator--52829006-ac3e-43b6-b6e2-43535645482a",
"indicator--e7ebb555-7a77-4f0b-8d44-0b7cfa514a43",
"indicator--606abae5-2d9e-41d0-b4c5-eebd578d9c1e",
"indicator--5485ef1f-0fb4-432b-8a21-5fef00d02258",
"indicator--4b8851f4-ced5-4804-b807-9e0e066350bc",
"indicator--795556f3-4f6d-4064-ab59-2f72a50eca6d",
"indicator--8b83d295-3da3-4e07-b5b9-b803ab88ac08",
"indicator--0bd721f4-1b9a-40b3-ad43-180f45a36d95",
"indicator--8d9a797d-2eb4-4a10-8271-936eead18812",
"indicator--da1fdbf7-bc84-459a-83f9-4bdc4550ff51",
"indicator--fddcdca8-e126-4f6a-ada0-6f38a7ee051a",
"indicator--7650875e-7717-4bf7-8f38-47eb8930c14f",
"indicator--d06f51f3-1b03-48f7-9d5f-73df56bbfc75",
"indicator--681a21c2-28ad-48ff-ab8e-2d1cf815c0fb",
"indicator--fa210e30-4f71-46b9-af7d-0b129852b5c7",
"indicator--eac77d1c-f26e-428f-b03f-78d93a350784",
"indicator--72080da5-bc9b-47b3-8031-9afcc0eeeba4",
"indicator--c007fc23-e8cc-4d0c-8a29-0ca57d381d77",
"indicator--4344efe7-991e-4604-a520-63d2567a078a",
"indicator--5f1013e5-083a-4326-af9c-bb28524d2eeb",
"indicator--d6544a02-ef46-4609-b4ef-ee0374d91797",
"indicator--975d6a1a-5bee-4809-8870-79217305825d",
"indicator--dd0686ad-2784-4f96-82cc-da8564528dd8",
"indicator--175bc9fe-05f9-4068-855e-6db13795dcbf",
"indicator--9994427a-0fb4-4bed-9bee-5e2f71e7b667",
"indicator--73ac4089-6ea4-4f33-8573-86797c5d35d8",
"indicator--ffecfa3c-00bf-4bb4-b5ea-5fe1c628c1f5",
"indicator--a1e41a23-057b-4eb5-89b6-98f536f79b67",
"indicator--0f198735-03ab-4348-bbdf-ff72cedb77b2",
"indicator--bbb42dd3-05c7-45fb-8950-e561fa3ab255",
"indicator--9a28462d-55c5-4a75-a966-798612124f22",
"indicator--4eae81e3-eaaa-4904-926e-1d37ddabcddc",
"indicator--f7a3c7e8-a390-4557-b3c9-475656c0bfae",
"indicator--42a05067-6199-420e-afa8-e1dfe1746234",
"indicator--1ba50b46-2a36-4c76-a90e-4ed70698e904",
"indicator--cb6fb378-09ad-4dc4-b6ea-e746b51cb95f",
"indicator--f1850f72-bb08-48f6-921d-b3147514be67",
"indicator--9add5703-dedb-414c-8973-805eefeaf3ac",
"indicator--a37702ca-0505-49ba-9b2a-e49bd3580576",
"indicator--ad26464a-7b56-46f2-a2b9-ab10fa2d146b",
"indicator--773eeab1-23b9-4237-93ee-68828651f077",
"indicator--be110bd7-63b1-4daa-bfa2-cfb1d64de018",
"indicator--3993b733-9172-4d58-ba15-594082a437f8",
"indicator--39373f2a-bbf4-4cd7-99d7-267d7c213f17",
"indicator--63ae4a7d-c2bc-4bdd-92cc-6ef9e90cabbc",
"indicator--35e82e18-c868-455a-8010-dbd448cebbb5",
"indicator--bdd77e67-4199-4199-a388-f4a328a868ef",
"indicator--511b7913-beb5-4d2c-8d39-1c5f700797d5",
"indicator--92cbf44e-1374-4f0d-9854-85d5238cbf43",
"indicator--36818da6-d744-4079-88a4-849896fca8e7",
"indicator--1cbc00bf-ec64-4444-9420-c7ae09525e69",
"indicator--aa9a22d1-b0b8-41cf-962f-711ce5619da7",
"indicator--369e8d63-60fa-4323-a401-336435f1754e",
"indicator--f1a33675-c93c-45f6-a07c-4ddcf0582e0b",
"indicator--4dd3e70c-38bd-4a61-a00f-3c971d4e158b",
"indicator--290a87ac-c4a5-44ed-af8c-cc850a488d2c",
"indicator--cefbdf5f-3879-4529-b8e1-6e2cd25da0a1",
"indicator--83d0c686-5335-4552-bf94-d9a70ed54ff0",
"indicator--032d3e2e-0f00-4a9c-aad5-d6412ffb9210",
"indicator--6dbdc417-87e9-49eb-92e3-ee5bbfe52575",
"indicator--f4374331-ed4e-436b-8a04-97f22c9dcca0",
"indicator--07f1e4da-457e-4213-976b-e3a8f410b2cf",
"indicator--68593fe6-0a49-4f73-83ba-97bbfd5caff1",
"indicator--88061115-36e4-4c93-9339-924593946e2b",
"indicator--d57cf63c-4fd6-4b01-b9f3-b590e7a619fd",
"indicator--adbfff19-7a7b-4685-95e3-8b0a848e130a",
"indicator--f31a9872-23e9-4e1a-9970-2cf7fcc74ad0",
"indicator--1579a174-dee9-4bfc-88ca-71cec352fe12",
"indicator--2df701d9-7887-4db5-888a-e023ed683f24",
"indicator--256321b4-eb04-4efa-a496-df6fbd82589c",
"indicator--bacaa3a7-2d51-45bf-b9c2-a9ed18bee217",
"indicator--fc3d7250-dbd4-4167-bac8-190931fe2412",
"indicator--7a90fefc-2491-4a36-b24c-5194b886d57a",
"indicator--b7b8f26d-b2eb-4c82-b56f-928b76b528b5",
"indicator--bd9960f4-8621-4c55-8e96-2cb9501a12bc",
"indicator--927fb907-9d4a-4e40-8865-e6a6d1e0609e",
"indicator--d6b84255-5094-47f1-b00c-7f96e74b31a5",
"indicator--30ee0742-9861-43bc-95d2-74e2c73736ed",
"indicator--0aeb53e8-43e7-4d86-9d8f-c24eabdd20b8",
"indicator--a10e8c06-b76e-499d-9c4f-96350482590d",
"indicator--a351cd4c-a1c2-4485-aad5-d1f1f6fe4c1c",
"indicator--3dbf2098-d724-4816-8b53-9595dacf5bcf",
"indicator--e0e38055-b973-4daf-ba07-5d2132ee036c",
"indicator--410552aa-12e6-4b34-808c-8a15eaeeaaa4",
"indicator--2dffd5d0-95a9-4167-a20f-efbce37cd813",
"indicator--e668cb26-80fa-476f-9b95-dccc8f157733",
"indicator--36faefa9-2de7-4c9c-ad3a-4d23a2414bd1",
"indicator--ebb228ec-865e-4a14-94cd-1d74ae55532b",
"indicator--ea6cab36-4618-4308-9f76-bc9fd5d6c545",
"indicator--98ad36bb-19fd-4fb4-b15c-7ae2211a91c7",
"indicator--f4090866-08a5-4340-8573-42cf1b8eb8ba",
"indicator--72877c2d-4103-438e-824c-157865180902",
"indicator--3304e7de-d1da-4dd7-a9a1-979a7c7e053e",
"indicator--0d2be2f7-4e5b-4396-b2d0-dd9676b3e0f5",
"indicator--f53772f6-4e4b-4f4d-9b9d-a3886377993f",
"indicator--baa84abe-4146-4f4f-986a-3b4c2faa592c",
"indicator--9da3863e-53c5-45e2-b5e8-8f0d0f2e0c0d",
"indicator--576076c6-f558-427f-871c-1d5e9d4020ac",
"indicator--af6a0a9f-5403-4a8b-9de0-a26b300de9b2",
"indicator--de48181e-908e-4d42-8445-2a2dfa37baf6",
"indicator--a6e460ab-064c-4099-8fa8-ff496465126b",
"indicator--5ead3dda-2e81-46fa-8eec-56865a7e61ac",
"indicator--83b1fe49-47af-4705-9362-ca671564c57e",
"indicator--547a2b4a-1eb2-4fd1-a357-f0d2d9459c53",
"indicator--f258f723-fa2b-489e-97ff-ab7653b15e51",
"indicator--f389df0e-5d92-4e07-8ebe-42dbe36efe9c",
"indicator--47b240f5-3693-495c-a208-93b7cd2a4b76",
"indicator--ff964ad0-0b8c-4ebd-8aad-2fcc1fb74c9f",
"indicator--aa3ccdc6-7443-45d0-b57a-3039e0a41849",
"indicator--b86c3c84-4d71-48a2-9bb7-e563a6d0e02a",
"indicator--b7889f44-e9cf-478b-8062-7eaf815965d0",
"indicator--9f4f70d9-f493-4571-b959-350a5050c1c0",
"indicator--a5b30b0d-b1aa-4c56-ae8e-854032be31e7",
"indicator--3e402d85-6649-4da8-a2dd-0d54392fc5f1",
"indicator--5e8eeda8-8f3d-4abf-9444-25991d122df7",
"indicator--29e3bf99-346a-4f40-a106-7ab26fbf1b14",
"indicator--cbf06367-9ff3-401e-ab0a-eb6346be4eaf",
"indicator--6b94de3f-e060-48b8-b8ba-2fe9531f469a",
"indicator--37894cf8-9159-4928-a53b-950949ac7b53",
"indicator--be60ff22-b0f8-49a8-9486-8a7f7a8e6e3c",
"indicator--40d81876-ef8d-474e-b1b1-6398ab83a431",
"indicator--1e4e6cbc-8d53-443b-9b74-f3033a036693",
"indicator--3f4de579-e03b-40c6-b4f8-c309c08ed0c0",
"indicator--28b771d4-b6e2-4dbf-8418-aa6b2706a8dc",
"indicator--c5da1e0d-1fcb-4247-b696-0a428276af4f",
"indicator--f5de0613-fc28-4f6d-b025-2de50ceabd60",
"indicator--7a8cb9ee-dd34-417c-8c8d-bf5684f297b4",
"indicator--f03331c7-48fe-4f1b-a89a-d5fc4d80af00",
"indicator--3df4a1e1-82ea-41da-92f5-bf2a0bbd3fab",
"indicator--ecf423bc-426c-422e-a9bc-42cdc56a2110",
"indicator--3c55a5b2-fca8-4af7-82fc-58413a5ca35f",
"indicator--c4cce24e-07c9-4b05-94a1-e2c053167ece",
"indicator--fa6be0dc-10ba-42ca-acca-6d51a68367d9",
"indicator--9e6684e7-a420-40d1-a192-e5b179fd4214",
"indicator--ca3275a0-10bf-4eb1-a087-973ef0b94bcb",
"indicator--fac56ded-07f7-4090-903d-d70af2a53246",
"indicator--39081399-833c-432d-853c-a3090d8d4dc2",
"indicator--cc39f74b-3b97-43b3-a98a-0c076d64f7a1",
"indicator--e3c72c6c-c1ed-4531-997a-7fc1f8b83ddf",
"indicator--8aa3b76c-83b1-4da6-bad3-364c1e2319c7",
"indicator--adab092e-dd01-499d-b58e-e42ceb7d60d2",
"indicator--dba8d556-e4d2-410a-a6cf-586eae184fe7",
"indicator--91633569-0baf-4a30-bb64-358c82f86730",
"indicator--e1414f2b-a6de-417c-b9e3-b9027af50e88",
"indicator--f0321d25-371a-4104-9d3a-486bd8864023",
"indicator--2dce37d3-2e3c-406a-9ab5-d84d4c3d4428",
"indicator--29035d3f-d8f0-4581-86c9-e83357b64078",
"indicator--1f498b54-d70c-42b4-a6d6-dbc378cb4e05",
"indicator--943e1000-b7ba-4460-918d-f701357684c3",
"indicator--2c39abc9-6e7a-47c7-b8b3-d887fe1e7116",
"indicator--8b62d131-8b8e-46ef-9bb3-d469937aa372",
"indicator--ae128ae7-0822-4733-b51b-bdbc7e036398",
"indicator--1c99be5c-a7dd-434f-8590-e698af8df024",
"indicator--6cd822f2-21fb-404c-8f77-04b10bc00229",
"indicator--55b4a0ff-26d0-44ef-a53a-193fbed78f8a",
"indicator--483db1e7-349e-4a9b-b46d-140eea2b6ee5",
"indicator--9fad4bd9-0fd9-4af4-b2c7-646d8dc51df6",
"indicator--51a26adf-fbe4-4f71-9aae-02908402ca8e",
"indicator--124f9ccf-6639-45f7-8b61-129f4e36465f",
"indicator--1282af98-c3c5-45fd-81ab-af3c8a779880",
"indicator--1a17ec2f-d2de-4bf9-baa1-428a0108c195",
"indicator--6fbeee56-250c-45cb-91df-edf160abe828",
"indicator--c3b5e848-4ac9-4cec-87b9-6c452d732ad3",
"indicator--67b7dec0-893f-4204-834e-ef9d0230d45b",
"indicator--0fa39974-e9f6-464e-b65a-e9952b710c6a",
"indicator--6e0bfab4-696e-4d35-a448-ac472c0d48fd",
"indicator--075a4cc8-c45c-455f-8ce0-0626cc2ca2b8",
"indicator--e83931df-921b-43b9-ab82-e6f5711aa8e4",
"indicator--80b58a77-a699-4018-b0f6-aa319287d841",
"indicator--60bdd54e-25a8-4525-b766-3bc7890724bd",
"indicator--8e09d384-12dd-45a7-83ea-5a5323538849",
"indicator--68374fd6-d4f3-48b8-8940-9541e72dcfa7",
"indicator--aef6e6a4-b46c-4052-a332-7111b1790071",
"indicator--5fefac5b-1a26-4768-926b-fd7d6acd21d0",
"indicator--04706cd7-5cc2-4aec-b58f-e1175b264a10",
"indicator--e5f6efa7-1ed6-4f27-ae43-0d80cea155d1",
"indicator--65dea4f8-3d75-4f9b-a9b8-2f700f729c2c",
"indicator--afa03e80-3c53-43ee-93c3-60403b7e9cb5",
"indicator--48e5002a-8537-4fe5-a2c5-5ae8a1199351",
"indicator--8b15f06d-d26b-4894-9c2b-2d37a00ca135",
"indicator--1fe74af2-21ce-4178-950b-d1b7f1f6465e",
"indicator--1242cd21-1499-4019-aa19-23514930741d",
"indicator--e073bfb0-a049-4ea3-8e9e-e50ce5410dce",
"indicator--3e48c676-87c3-4652-9c72-0600ac303b24",
"indicator--5feae022-0583-4ed6-bca5-4cd8970fad14",
"indicator--665179fb-5237-4996-8d56-1fc35091923f",
"indicator--1b230e00-45b1-43e5-9d42-53055806a644",
"indicator--4e0a416a-50a2-41a2-adb3-42e713489b8f",
"indicator--1d5aa17a-e809-49c3-b633-951c90003a9f",
"indicator--05d632a7-b1d2-4685-b416-1778613cfba5",
"indicator--473fa15f-360f-43ae-bd6a-9c31b49c8e68",
"indicator--3645c172-c292-4368-9643-6b252cee1257",
"indicator--d21048f9-2e2c-444e-aafd-473c46b26ec4",
"indicator--4af5d025-269b-4298-a13d-00588707a71d",
"indicator--f4f0bd51-d065-4cd6-aaf4-8bd1b82e7ce5",
"indicator--1ba8521f-0e89-46d8-a991-3f75fd0e015d",
"indicator--f075191a-e863-43d8-9bb2-f1f640422f06",
"indicator--81c12345-d963-4c76-8987-9b9fd296a309",
"indicator--a534ac2b-7ddf-4639-8648-bc3dba854d72",
"indicator--efa2a49d-bef6-462d-b481-fbc88edc05af",
"indicator--28dfe41e-37d7-4ecc-b7ea-be2e0c72411c",
"indicator--f334e275-65ec-4c04-b537-e53379fef535",
"indicator--61988f14-72cb-49d5-b71f-57a460e9aa7e",
"indicator--04145b55-019d-4d6f-afe5-925b37158fcb",
"indicator--70e5fbb9-9818-47ba-b256-f3f38e4170c0",
"indicator--ed59cb9b-0c69-4481-8285-3071d8cc0b25",
"indicator--d9a80c4e-d479-4134-941c-41b47a8d805e",
"indicator--23671ff8-f711-448c-9a22-d0ee4c53510b",
"indicator--67db0811-0a9f-4b29-8207-6c2437d5d5e6",
"indicator--d26eef13-27ab-4dd1-975d-77cdf75592c6",
"indicator--5be3bcf0-03c2-4e13-8934-2e441ee4cb51",
"indicator--e873c894-bdf3-4f15-badc-df0fe552d37c",
"indicator--bd9b2dd8-8723-4f38-acc5-b03db726c673",
"indicator--0053eef9-d437-4b9e-b834-e28ed2f804d5",
"indicator--883c34b2-e7c4-477d-941c-1a1115f6bb71",
"indicator--f2a055dd-2a84-4d95-99cd-eef573fa5134",
"indicator--d1de6e94-d388-492e-8f90-8e1168fdeafa",
"indicator--d26d6450-4f1f-48da-a8dc-0cb5cc66339b",
"indicator--f1e9646c-5240-402c-a28f-4266c48dd6e7",
"indicator--01af9203-2a60-4cb8-b72b-905e0a3b5ee5",
"indicator--d9e61e6a-0f25-4e4d-b2f8-329e1037aa49",
"indicator--e63f987b-4248-4814-8e68-6667e1d43cef",
"indicator--8575a3b7-823b-430b-87b1-1ccdd78d0f3d",
"indicator--2639130e-2748-4eb6-8bec-f45b86cb6470",
"indicator--8e21e7da-790d-424a-8afb-609653b003d1",
"indicator--5e9c8341-24e1-4522-95b4-87f379ae457e",
"indicator--ba27dc70-f8c0-4999-8a43-5cadec6411a3",
"indicator--2c8d0b84-8cd7-49da-a48b-c6d6da430eaa",
"indicator--fd800e1f-eb59-4bfc-8337-d9e72a6cdfef",
"indicator--08489cc5-6d5c-4c9b-9a2f-14750957a95d",
"indicator--f906b453-4d6d-4706-a046-4cc3b954ba47",
"indicator--b5ee1de0-94a4-4fdb-bb78-a9bc6a14c890",
"indicator--aecbbbd4-1257-4067-8dc5-8be4136281d9",
"indicator--8724a1aa-943b-40ff-86b9-4ca5c7d7a1ec",
"indicator--f181f1d9-fff3-4688-b6e4-8d84db72558a",
"indicator--f3422730-966d-4129-9a32-de5fe08c2e37",
"indicator--ad412593-3a56-459a-953a-344bc0426abc",
"indicator--b382511d-15c8-478b-9d6f-ad7d8296a8c3",
"indicator--f29c1079-29b7-4381-ab49-5b0fa4563fe2",
"indicator--502531c8-7dbe-42d9-bcf1-14b8cd98d67f",
"indicator--ecdeed69-b119-4f1a-904c-68c885c6ccec",
"indicator--8fadb0d4-9a3a-4f41-840e-2166080c086f",
"indicator--c7ca6976-2d6e-457e-8d0d-93804111cf71",
"indicator--cda14ca5-af0e-440c-b5ba-77fc94982e69",
"indicator--af10b7c7-431d-4c39-92fd-5fa9ec897faf",
"indicator--36b3c11d-4825-498b-87db-816b2400ca3d",
"indicator--7b237f58-b13c-4a9c-97be-e35ffa69881e",
"indicator--f5e4adc9-2cf9-44b1-ada4-3a6dc0b954c8",
"indicator--35b6feb7-d983-48cc-83e1-ff4ea7169d71",
"indicator--90e7b7d6-2fc5-447e-a87e-08bba3918f85",
"indicator--05035135-ea33-42b2-bb12-ea174b206403",
"indicator--3ab2f9cd-1f4c-4fbe-8f0d-c7e08c350f09",
"indicator--29dbfcb1-a550-4a8b-b48b-705550774e76",
"indicator--5ea3bc25-b6f4-4260-8f28-c82a32d3a2a0",
"indicator--40c3a2b4-8680-4efe-857a-528de382814f",
"indicator--16532aa5-331c-4f39-a6cf-637854d434c7",
"indicator--7336f89a-8705-42ce-837f-1155c9d7b44f",
"indicator--9e0497e7-3d23-4c21-a0ce-dbfec579dbe9",
"indicator--eca175c7-477b-40cc-87d0-45da6e6fcaaf",
"indicator--d65ee8a5-1728-4d91-a01a-cdda8bf91f23",
"indicator--65a2bdc2-3c35-4424-a876-bdd00cd8c93f",
"indicator--58200074-00f6-4fbf-a5ba-f6fb9dc6a92c",
"indicator--f7d7cc8b-f8de-4624-9b07-d21cf7259079",
"indicator--31d40fd7-6ce6-4e58-8f4a-76ec3c35b02e",
"indicator--0a68d01e-2dd8-4440-9cc1-9aa6c50ad6bc",
"indicator--babedccb-a76d-4a03-886f-6e60a2cacb5e",
"indicator--329bc61c-e575-48e9-b583-07e369f29f58",
"indicator--f99d45ed-6b8c-4733-afea-005c560c7bff",
"indicator--c3babb5b-b413-4b25-bb85-f0377d423db7",
"indicator--09d6eaa4-1888-43f8-896f-3bec781e0541",
"indicator--6e523ad4-0b68-463d-ade4-82b29aad2e88",
"indicator--7a10f783-320a-453a-871d-4d88c8111daa",
"indicator--0ba646f0-02cb-4633-81e6-410b2696624a",
"indicator--bec4b36a-3ce1-49fe-b4bc-b97124cca47e",
"indicator--a2715236-1d52-4f3a-8e36-73806b779fed",
"indicator--f06745cf-a0b5-48a0-8d96-878a015599f0",
"indicator--04c2c7ca-30af-4e03-9a5a-8dbe248668d0",
"indicator--86c5bff7-477e-4da9-b4a1-a1d44d1f81ca",
"indicator--4847ec30-4f53-4b19-8408-44e816491a43",
"indicator--d96b9837-842b-46bf-aa96-86a51e47cdca",
"indicator--343c0c05-315d-4d1c-9dae-788108dea0ad",
"indicator--4075c448-8392-4ecf-b17f-d002868ae0d5",
"indicator--7762bc38-a6bf-457b-97a8-0a5863b3a01f",
"indicator--97c21d86-a8a9-46af-bda2-5a3afed3aa39",
"indicator--c4ccc306-740e-45b2-beca-25249a9db638",
"indicator--15cf26ab-c2c7-48e5-9ca7-fc5e08e288a4",
"indicator--4fd03574-8a04-41ef-90fa-08d7c33be726",
"indicator--44dde33b-8a63-45a9-9752-7757b7e161d0",
"indicator--a6fb75da-98ea-4f63-9edc-5ef7a58ce5e6",
"indicator--bfb49304-bab5-465a-90f8-18c395566085",
"indicator--7422a969-383b-426d-9bf4-25aaef2ade9a",
"indicator--b386587f-020f-4444-bd69-5c382052e43d",
"indicator--aae03945-d37f-492f-843b-a52ed9e8b82a",
"indicator--7088652f-541a-4609-9d6c-c65f6f31c066",
"indicator--1953f225-df30-4b24-a9a2-917466edfe61",
"indicator--93e4ce38-97e0-4dab-9c9c-01e906630a4e",
"indicator--252296d6-0a35-44d2-9d9a-a4695900085b",
"indicator--82948f4c-8f24-477d-9454-26c9e09171d1",
"indicator--d3fce3d8-5668-4d98-ad54-84c4cad0e4e4",
"indicator--e49699df-ceab-4402-bae3-d847f798e146",
"indicator--b3bf090b-987d-4fd8-aad9-4ac8a3bd07ae",
"indicator--ed5a5d98-b84d-4956-9bdf-0fe7a1942317",
"indicator--46127a4b-0f87-4dd3-b21d-9608b2132a2f",
"indicator--8579e91a-49f4-4d30-9470-61d96287dbd2",
"indicator--20d561a8-6174-40cc-978f-4559b59a3af0",
"indicator--8d0540de-2449-40b5-b7a4-5f82a4d030c1",
"indicator--43fe4f9d-21a2-4eab-982c-35063e1cdc4a",
"indicator--852c0b21-020e-4af6-bf9b-144cc8ff0169",
"indicator--2bb5b698-3e83-4534-bfb9-712be0f79827",
"indicator--7743d3da-4b1f-4882-b0ce-b420483fdf8b",
"indicator--a1ea2887-8dd1-402e-a26f-6d01a1837425",
"indicator--2472f179-de92-4d29-8689-ef542330adf2",
"indicator--fd3b068e-af7e-45d5-995b-ec9320c592c1",
"indicator--693e5fbc-a928-4762-8d89-b9b40a6ffb33",
"indicator--535b0e96-ea61-4de7-8bd1-c557d7760ea2",
"indicator--1d85242b-440e-444f-9d27-5d6fff1963d1",
"indicator--4538b840-019d-421e-a878-5e378dbb7323",
"indicator--54ffbf0d-19a4-4378-8801-68e334507788",
"indicator--39246bc1-7625-4e67-90ab-41e05ad35a9a",
"indicator--89d7acf0-153b-474e-b5a4-7d20e1ec1733",
"indicator--70c3808b-2d68-42c9-af29-b67479bf7611",
"indicator--32e20e50-8cee-4ee7-bf17-949759ed055a",
"indicator--23922432-7036-4909-980a-1ebc15d911e1",
"indicator--9d209746-ece9-490e-9013-da712c8079fb",
"indicator--caa580c5-ea95-45d6-9484-b6c376d55f5e",
"indicator--ddd5c3ba-9730-419e-8c76-37954ed1f651",
"indicator--482f52ae-a552-48e7-9212-11fe105a6e70",
"indicator--951c4df3-7bb0-46a3-90f5-eba0c70ac8ef",
"indicator--cf1b1e74-0acd-408d-bc17-6e219c111257",
"indicator--30d20b4b-7956-4dc8-b356-7fd4f63c19c7",
"indicator--f7d43580-94b9-4d46-92d4-d9d27258db44",
"indicator--bd77dc73-7750-42e6-975b-e57f102b1813",
"indicator--dc6d1e87-c191-4790-8bcc-6e79c8d28136",
"indicator--88214a6d-8d44-4fad-a703-9ac162236468",
"indicator--5c73b189-38d8-428e-b44f-1f7b6e7a94dd",
"indicator--0b0aef8e-be9b-4e91-b01a-4781b90595be",
"indicator--af647f92-c1b6-4bd7-a889-b1c8a58ce3d2",
"indicator--0e6b8f7a-52b2-4c3e-b4f2-ee72dc221c2c",
"indicator--aaeb8272-c8a0-484a-a682-628ed3e6e184",
"indicator--3450be9f-3b1d-4853-b373-a39f8f5c2646",
"indicator--ced1e7c9-9294-40e6-be76-20bd66e8113b",
"indicator--c7486bc1-4bf8-4168-a964-d94bd466dcd0",
"indicator--dacac55d-811e-49af-8158-cb422ec21ba0",
"indicator--72d4f1ef-d0e6-434b-8b56-94bb0155f71e",
"indicator--f8acb3a8-5e24-4c74-af2c-690771852af6",
"indicator--70f2728e-e1ad-4b7e-b8de-bc894c225e82",
"indicator--7fb187f8-211e-422a-9f22-e36fac615ee7",
"indicator--0136717b-1b52-4d0d-a3fd-8202c5c9c2bb",
"indicator--dfa4412d-3a95-4a70-8289-22900b8bcefc",
"indicator--e4846c02-5493-44f4-b838-bbe04895dfb7",
"indicator--f7d04dbf-68d3-4cdd-925e-bf4502a8bce8",
"indicator--31f8c640-d970-4631-a0de-9287266d3f0c",
"indicator--b173d53c-c6c4-48f3-b43c-af4724505ab9",
"indicator--a02e4db9-2fa3-4f52-a2c5-964470edbefe",
"indicator--474fd1a4-a43a-4f3c-bfa5-b6ab250f82b7",
"indicator--7be68d76-176e-4fdb-b16c-788138ebcc26",
"indicator--fd4fd1ec-d805-41de-a500-944ddbceae71",
"indicator--9c69988d-3594-4649-9307-4337027e981f",
"indicator--d9dc2a7b-6b8a-4cc1-8dde-a98a1619c1f3",
"indicator--eda1aeee-fce4-4d94-864c-9f6f73a867aa",
"indicator--2a88fdac-c56d-4dd8-961f-5e5766b3186d",
"indicator--1d6011c4-22c8-4090-b0ab-6d8cb577c849",
"indicator--8ae15166-cbb5-45e9-baf2-fb330d70bc81",
"indicator--ec7cc9b8-2fd0-48be-b9df-3c32c410b365",
"indicator--9ccbe931-cdef-4eca-8110-aa6d201ccc77",
"indicator--32b05abe-3c7a-44ee-903d-6a520d5efafa",
"indicator--c2175d5f-a057-4d36-b362-61f24daabb7a",
"indicator--8e62d86c-5c72-47b5-bb4f-2f8d039c8719",
"indicator--d861c76e-222f-4de2-839c-4f4340ea0e39",
"indicator--6250a9d3-582a-41f2-b50f-b10150c48ccf",
"indicator--b3c9ecaf-a53f-4875-b285-0d96ab9626b2",
"indicator--f7559952-870e-455c-bf16-fdd0522427b0",
"indicator--a4c5a2ee-84d3-4cc6-bfb2-21ddf0849f35",
"indicator--d2ee928c-1da5-4ff3-aab7-d3fcdc1a4f85",
"indicator--d77691bc-dce8-4838-a94b-4d7b9d9b6e73",
"indicator--5df066fe-9159-410c-bcf7-ad25baf2ea73",
"indicator--00a7c285-2067-4d9e-b698-329377a0d653",
"indicator--d3429c37-781a-4dd3-89db-f643e16489e8",
"indicator--284f938e-10b0-4240-a855-050ab5c52ef3",
"indicator--f4330632-7dc1-47b3-850a-a8230a86b79e",
"indicator--54148e00-a523-4c0c-9803-2c8b857a17b1",
"indicator--4ea20129-4aa2-47b3-9228-ff229cfa993e",
"indicator--9d23c075-1251-482d-baee-85ada35c9b5b",
"indicator--88bf3280-ee48-435c-9cdd-9efd3d675bc7",
"indicator--5d85bacb-f0f4-4ce5-9264-2e8a6eee1652",
"indicator--91e42527-8643-4a15-b6fa-50176ab7c9b0",
"indicator--55ccd03e-9c13-4a2c-a5b4-48d6a55a9b95",
"indicator--40b184cb-7663-42aa-b78a-ec121555013c",
"indicator--46d7588f-2dcb-45c2-a279-4bd75b3c3b0b",
"indicator--fb1ce8f8-9909-41be-9584-79064e070fed",
"indicator--a04bc8a0-b3c3-4612-9288-58e81c4d8355",
"indicator--101aecf3-ab05-4c67-8bcd-e681c2c0c634",
"indicator--4b747d3a-ee11-4e28-b2e1-94ed973509be",
"indicator--82d015f4-a21d-443b-a609-ef83d2e25ccd",
"indicator--f32158c7-3fc8-49f0-a962-85c16895dbb4",
"indicator--4c647ee1-64b9-442e-a77f-2d8cf9786b26",
"indicator--e7bcde05-21bf-4d3f-b14a-dfb84c291084",
"indicator--6bea282a-54c2-40cf-a2f9-5d9c2b22d7dd",
"indicator--afd6912b-3484-4ea9-a6a9-4fdf28cb3158",
"indicator--ec234240-c7a9-4535-b646-8e074dbbb800",
"indicator--d5eb7209-d293-45a5-998d-8cac1951174f",
"indicator--7c311194-bcbb-44ff-9c06-a1425545fa15",
"indicator--7a4d70d1-469e-4dd1-b6e5-e45a072ccc63",
"indicator--e58c0648-bb27-419c-9976-4d9576de1cba",
"indicator--ae834617-91b5-48ad-a036-c72589068944",
"indicator--e1d62bf4-7fd6-4531-a13c-9496aee31df2",
"indicator--d5369813-8387-489d-9f27-40f633a90eb1",
"indicator--6d594cc2-a1d0-4e94-bbf9-a8f15124e963",
"indicator--1e2a86b5-7ebf-464f-8986-07d99191addd",
"indicator--9e90999e-1746-45b4-899c-0ed91f249bfb",
"indicator--3a7a1d8e-3ee1-4677-92b7-2b168e312a0e",
"indicator--7b41ca1b-a163-416f-b3af-deabeb4ef07f",
"indicator--753b5b14-6609-44c6-9c26-372ebb6e9376",
"indicator--1120d4a3-73bc-4db8-8ef4-5831277385cf",
"indicator--12e82dfd-c1bb-4315-b968-101436fdbc89",
"indicator--dfba97d8-dc36-481c-8081-8f5f9b26dd70",
"indicator--347b6568-c826-4ad0-a3ea-f22bdf0d1775",
"indicator--c6a7f0d3-db60-4e60-bdfc-8e162d90a1d7",
"indicator--73506f1c-cde9-410d-98fe-c1f81e63b87a",
"indicator--6046b486-39f8-4939-b8b8-d517a0657d12",
"indicator--dce27e05-9eee-4051-b1d8-2c974d9a5c3f",
"indicator--3b68eabe-c8a2-43cb-a059-481a8ee6da69",
"indicator--1d869b9c-e2bc-4b85-87f0-32cafa6d9d6b",
"indicator--034b84f4-18c4-44fa-bbb4-45a4a0966abc",
"indicator--89910d17-ab37-4ef6-9c4f-e6fa03021629",
"indicator--c95f0b95-b2ca-4902-ab2c-006b119f164e",
"indicator--d9b3fcaa-add9-4064-b118-8c15d1d4f544",
"indicator--61ff0baf-0c19-46b9-8d5c-6adb34f9bed1",
"indicator--2f5ea08b-29b0-4baf-b083-ea89f6a72177",
"indicator--1b7998b7-3724-4ced-93ad-2bf684b74c24",
"indicator--d08043a0-b2de-4c11-b987-3f29d653e78a",
"indicator--7a5bd8b1-8a48-4728-8913-cca0bb8c1c37",
"indicator--aad0927c-115d-4424-8220-384edf90118c",
"indicator--849f7b63-d899-43d2-a0a3-a650a2b62ebe",
"indicator--450a8cb8-3805-4af9-9c38-ca28d68bd1df",
"indicator--640fb10a-5786-4eaa-9954-97a042e711b5",
"indicator--def6728a-b08f-4fe6-bbb9-ccde0ee75b8a",
"indicator--10a44540-2ac2-454f-b97d-fda1e0607792",
"indicator--a765235f-b566-42eb-ae29-be94bb9ad842",
"indicator--27574dbf-1302-49f6-9360-0785840d4a4b",
"indicator--62ec0c04-da00-4dc1-85aa-888b8866ec16",
"indicator--81c28e98-9c62-4ae9-9909-37d64728c28a",
"indicator--e47cdf96-2f8e-4c55-acf0-5e98f1dc51db",
"indicator--c494b3f4-b64b-462b-bc83-208415420168",
"indicator--dee40d99-b6ad-4da8-a40a-5b7fcad243bf",
"indicator--24670c34-ba21-4807-8a90-ed5ae82a1e53",
"indicator--8a8644a6-b8ba-4147-9575-b8cee0b27e50",
"indicator--4f58a54a-70bd-4909-a347-31acb2d5706d",
"indicator--c028bd4d-69ca-48a7-a6d8-83e9f14dde0f",
"indicator--c9cee02c-3e29-4515-916a-3f31bf58126c",
"indicator--0b411a58-444d-40fd-aad5-73c145cecedd",
"indicator--922434aa-d603-4d22-b1dc-a39128d350e2",
"indicator--409f5ab8-7060-4b72-a10b-0b0be19048c5",
"indicator--16b6045f-ca74-4d51-9682-5d0c85c997e5",
"indicator--94ba7e87-0654-4786-901e-4b5050d008a4",
"indicator--75545163-91fc-4343-ad1f-e10adb036ebb",
"indicator--806ab885-8301-4b80-9ca7-f9c354c83aee",
"indicator--83206646-17e8-483e-be8f-52ab24e1a762",
"indicator--43a645e6-8d10-49d7-af46-d3db385f580b",
"indicator--5633c5dc-9e1d-411a-a39f-68bc8bbfe085",
"indicator--4f789fc6-874c-4735-bc32-f725ee9d7c57",
"indicator--8e19dcd3-9808-4ded-8432-b52ddaf1101e",
"indicator--cacaf83b-10e9-4856-9902-0bd095721c7b",
"indicator--c0e12e85-32c6-4a6a-9b52-cf9671c62617",
"indicator--e0553fb9-6462-4ac2-ab4a-1a825ac18136",
"indicator--95c5628f-e67b-48f6-b26e-e32adac74471",
"indicator--a56e7b9a-6a64-4708-bbfc-44c111e115d3",
"indicator--ca88066c-e340-4d99-a842-9d650de470e8",
"indicator--ea41d209-cce8-44dc-8c94-cb3fae306e0a",
"indicator--64b11585-1f77-427e-a13f-39c037bc8d10",
"indicator--c2b9f441-77cc-45f1-a015-a4c29b104579",
"indicator--038c50ee-f385-478d-940e-b74839e588c8",
"indicator--96ba111a-e1ee-48ae-83ed-9b833c578177",
"indicator--73bf19f1-bf70-484a-ba60-1884edab5382",
"indicator--aa39546c-4008-43b9-ac90-593124041e34",
"indicator--7e6ea32e-92b8-4d46-86f4-9e49c739d13c",
"indicator--975fb8d1-6215-4c44-862a-65583b67b3e6",
"indicator--cbfc9d02-24b8-4d8e-ab5b-f4b7e322b641",
"indicator--d57f103a-ef7b-4874-b964-7cf80478584b",
"indicator--62401a13-8283-4430-9ff2-cfb9663173b8",
"indicator--84348065-5cc9-493a-9b22-bafa9c6b5015",
"indicator--d1886e17-c396-477e-920b-1395902eab38",
"indicator--77201e27-959a-47cb-b5b8-6173ea24d6cd",
"indicator--b49cc630-c422-416b-bee0-008239e9b7dc",
"indicator--1bd13e25-a3ce-493a-be7f-cf78c2f6aaae",
"indicator--7c37cdc4-1f8f-4b85-93b7-c908d04c571f",
"indicator--c079c79d-43fa-436f-b67f-79d55d6114fc",
"indicator--208d6828-ab98-4d3b-8b5a-d6b2cf2de48f",
"indicator--906a5ef2-13e6-4081-b2a6-80cf5860f03b",
"indicator--956d46e3-bcc6-44a6-9f9a-8e8d179c1688",
"indicator--cbed91e6-b36d-4b9f-ba96-f896f67381a7",
"indicator--312f1089-b7e2-4e02-863e-d5a1d64cc747",
"indicator--cf0a8e96-59e2-4052-9969-c67953856934",
"indicator--3e650403-2065-4053-84fc-1eae72d18e34",
"indicator--350977e0-1cb4-4d3b-ae9e-03037409efbc",
"indicator--4c0feff8-1a00-4b25-87d8-c037bb605f90",
"indicator--bc632620-58ba-42f0-96c3-e13c075c196f",
"indicator--f2d925b2-31f4-4dcb-9b53-e99a93efeea2",
"indicator--178a27be-c511-47e0-9fa3-18af8422441c",
"indicator--088adf7c-cf5a-4df3-aba0-0f3bc7c9cab7",
"indicator--79dbc507-b2e1-4f62-83fd-3a8d1e0330d6",
"indicator--ef99f345-1aa1-47d5-97fb-a8019d50e8b5",
"indicator--714d92bd-69e7-4760-bf7c-b7670a5c6b6e",
"indicator--b86531e4-9fb0-4bfb-afb9-19e19f0d8233",
"indicator--5139aee3-7c32-45e0-bd1d-ed7fe490456b",
"indicator--4340037c-b6a5-4454-a5e3-fecf0f081900",
"indicator--7d551a62-0a31-4922-9090-a4da23ede89f",
"indicator--c1c2a7b4-7ac6-4167-92cc-a6da8b5603fe",
"indicator--9260b076-bad8-46b9-b425-790468d49ddf",
"indicator--7627b293-7fe0-4baf-a017-e5b4e580bb63",
"indicator--bce82b2c-f287-48cd-adb0-2495688b4850",
"indicator--a85d1713-5193-44d6-8007-bc4b382bca1b",
"indicator--68db9a6d-7846-4456-af2a-8bd445071218",
"indicator--eeca3625-b938-47ac-9531-3a65af9131eb",
"indicator--4284890c-11ff-4e01-bb7b-797f6e01dbad",
"indicator--7a38b6cb-2b9e-48c4-b64e-f5b1ca7c2b05",
"indicator--89b99a47-c136-4c5d-9069-3327bc49be35",
"indicator--6bd96a88-fa73-4794-aa40-09b621f2aaf2",
"indicator--f4499e12-2c0f-42f7-95be-a1d445dc1d5e",
"indicator--035081b6-3511-41fc-8f69-f5a499b0139b",
"indicator--72d587d8-bb1c-45d5-bd69-df59387b172d",
"indicator--ad54a1dd-dd24-4035-b1c5-0209fddc8c3b",
"indicator--490dfe50-ebf8-46ec-9192-0d38fec11db2",
"indicator--4104d499-0a94-4d90-83fa-93465cef5cfd",
"indicator--8a1a1d83-02c7-45f7-a959-18d38c55098b",
"indicator--939b7541-3f98-487a-bb38-5839db8b0e15",
"indicator--f8b4fbfa-1a6b-40d9-aa7d-d74dd8819b61",
"indicator--3d334c20-1771-4d0f-96a1-89b6e3f07b50",
"indicator--874e6a03-c6d4-4b8a-ada6-f4eb75871b4a",
"indicator--18734a78-83af-4b5b-a436-00f0cee18119",
"indicator--aacc6c90-3e0d-45ff-a184-32693fefbaab",
"indicator--123e70c3-4b54-4c6a-b3c7-8c69c6afaeca",
"indicator--28a25adf-9ee6-497f-aaa0-27dd71d2dc56",
"indicator--e060feee-aaa2-4f1f-99be-7223dd3acce6",
"indicator--db517c72-5b23-4fd9-bb2f-e059e11b2e25",
"indicator--626584f8-675d-449f-a50f-0c05806c2d5a",
"indicator--88a2a7b5-8efd-4834-b3c5-d5da19a90d07",
"indicator--ebca33da-d044-4c0c-a559-0ab0fa77bb47",
"indicator--963ebcee-9aa4-4e9c-bc99-27c8d8787409",
"indicator--d8de50a6-335c-4942-94fd-ec52735b45e8",
"indicator--0fafc38d-9dd2-49c5-8abb-efc34a2eebf6",
"indicator--0a143f0c-2744-4a66-a5c2-a500819c4a41",
"indicator--e13b3d9a-690e-4b73-97ff-b6c865037813",
"indicator--7de5453d-a75a-4d6c-9242-83718e050340",
"indicator--0f9b97b6-649d-4bcf-8d0f-083459d574e0",
"indicator--91128171-8510-4022-aa4e-d0523d8574d4",
"indicator--ad514ed7-8585-499e-8eb6-4b192966ce12",
"indicator--98c96876-e9e7-40ae-9e0f-79b6fd0bda15",
"indicator--2b7cfe27-fc55-4c0f-b415-e088d687c415",
"indicator--dfc8bd49-e30d-476d-a09b-bc09ce92d2fa",
"indicator--6585c434-e540-457d-9917-c712be7b7145",
"indicator--497f2ad6-c5a9-4c5d-bc10-abc0d9cec3f6",
"indicator--baa3f650-7c1e-4e54-9959-f002a16919a4",
"indicator--f26402e1-d6fb-4c89-9f32-45e514329223",
"indicator--1b21bbd3-ee45-4f7e-b6c5-180177712c42",
"indicator--20315b07-41a2-4142-886b-9ba93d4a5a9a",
"indicator--7276da86-78c3-48c7-96fd-132e3c3fc47b",
"indicator--a73e8a32-47f6-42d3-823b-6e2670f7eda2",
"indicator--5f3e5d29-4e4d-424a-8688-94b5d3da8af6",
"indicator--09e4d686-af78-4f5d-a844-813ce691826a",
"indicator--80f0aae0-fbb2-405a-b2d6-57c49a764d40",
"indicator--662017e4-ca26-4555-a24e-ad898be0f123",
"indicator--6ea4c004-26c9-48de-8988-8170609138af",
"indicator--c0a2c502-0cca-4937-8dc9-4292fdbca33c",
"indicator--39731264-e210-451b-891f-94d41d99ee52",
"indicator--296d968c-a0d5-4f0b-975d-08a12718eba7",
"indicator--219f70d1-2630-4cd8-904b-29fb48baa865",
"indicator--95c28e84-fd2f-44d0-85d9-56ddfff217a4",
"indicator--fe110200-3abd-44c0-8e37-42a76f80621b",
"indicator--f37139ec-f0b6-4dcf-9359-44811b6b4374",
"indicator--43e2295d-72e2-48d2-8dc1-88daf5dcb92c",
"indicator--bdd748a5-83e9-480b-9ce5-db7b7c427f32",
"indicator--4bbf331f-00df-4f27-9811-c077248ed1bc",
"indicator--9fa0c03e-a6f9-492b-a41b-6485347f58dd",
"indicator--227a591a-8e74-4e33-ba13-a29345146169",
"indicator--75f61a24-d88e-48c2-a25d-957c5fb1fa04",
"indicator--a093f8b6-cfc8-4375-b2ff-9fed810c81fc",
"indicator--a8c6be4c-c8e4-4199-b07f-14b0f00ccbab",
"indicator--93022e25-6f85-48d1-9bf1-10d8fc7984ce",
"indicator--1ad75d94-a808-47fc-ba9f-2e150f3ab485",
"indicator--a8d7509a-2927-47bc-9fde-7b1c68ce020f",
"indicator--ff3cd744-61d3-4131-80ba-d47200788fb3",
"indicator--8cc815b7-8bc8-4c36-9199-992fd1e398fc",
"indicator--01910748-31e6-4050-85c8-2e489664bc0b",
"indicator--c9d1848d-7f37-4570-9b44-f8a9ef57b782",
"indicator--4153e52c-b69e-4422-9995-0491c7ee0819",
"indicator--47edc405-c9ec-4a04-bddb-3f2ff0058af7",
"indicator--7fadd49d-41d2-42de-b185-0c8f2a7d5cea",
"indicator--0dac7190-11b4-45f5-bde6-011011bbc46c",
"indicator--41d0d1c9-e028-4d1b-9973-fcfac8db0924",
"indicator--35e4b949-f5e6-4a14-8224-bc8ac205576f",
"indicator--23d34b48-7a1f-4dac-a111-a7bfc1b240cc",
"indicator--702b6c78-c785-4688-9182-b5e6ce8c54a5",
"indicator--47e5cfae-9b6a-4576-a6f1-bd55c535bfd1",
"indicator--858930eb-f5be-45a4-9828-5d5858006a5d",
"indicator--e7aa22ef-3ad4-4e01-a1bd-66f483ef1bdb",
"indicator--a0893b92-97c0-477b-b0ff-6c73d42619f3",
"indicator--4f3b5b43-f563-456b-97bf-134bc94c2574",
"indicator--28621163-e20b-41d2-941b-891964d97783",
"indicator--5c8e5497-79e3-4aad-95d9-2e4630052185",
"indicator--3355fd17-d163-4f9a-9adf-9142e3ba6ec0",
"indicator--f44ec647-d38a-4d64-9d5f-5b80a0f095f0",
"indicator--e8e92754-db73-4cff-be00-473b00c8216d",
"indicator--29e2f188-e39c-40fe-a872-dea94feb25fd",
"indicator--47bb1cae-74ac-4632-a5d3-ad14198b4ac6",
"indicator--cde9c129-5080-4186-9f7c-2c3fd61528f6",
"indicator--30697e86-d051-46d1-933c-5350160f0999",
"indicator--48569ca6-269d-4442-8086-dfafee3966a7",
"indicator--3e23aa03-95ec-4aed-886c-c40cd9e6b9c5",
"indicator--0ef68601-3d4f-450c-9845-62ec5d3fe2f9",
"indicator--d81912f7-0267-4577-8f3a-5cbea35289cb",
"indicator--8e804c75-4826-478f-9bba-8247f45448cb",
"indicator--0129bf9a-c122-429f-b25c-1f675562aa86",
"indicator--82760aae-1fa8-441e-bbde-e277e9d9be23",
"indicator--c5bb800c-9b45-4d51-bc69-ce033752b6c2",
"indicator--b04af1fe-5278-4830-9606-c8231d0d3d22",
"indicator--94cd5094-7287-4a86-b1c9-17ff1fd7c3ff",
"indicator--5c5808ce-abab-4b48-b487-26c94058fabf",
"indicator--b1a1028f-3500-43ee-9988-260790d4480a",
"indicator--a766c8f5-a1ce-40fd-864a-0a6dd86c3556",
"indicator--9c76e32b-88f4-4943-b12d-d4cdda21a761",
"indicator--b5914a21-282c-4ddc-8dd9-f95e393562b4",
"indicator--0443c5b6-f385-4997-92e4-c8c02b7f276d",
"indicator--b57c9ea2-8748-47be-a7c0-8c1b13acbee5",
"indicator--5a1ba601-56fd-41f5-a51f-2f53769b702f",
"indicator--1b14ed33-34f6-43fb-ab57-ea021fdd533e",
"indicator--dc332d89-3e81-4d64-8f32-acc6b421d3c0",
"indicator--90c31521-b6a5-4311-aed1-d98c30e8a86b",
"indicator--a79f1ede-a17e-4d7d-94a8-32e609c754c1",
"indicator--b89b1e70-6f4c-451f-9a35-093de1bf6042",
"indicator--b9ba5105-b8df-4825-a5a6-3958b55f615c",
"indicator--6625e5cd-528d-4660-a437-4478044469e8",
"indicator--d2a9e2ad-61af-46b4-8aab-f08e1445bab9",
"indicator--34852992-488f-4d64-8405-f76fa4993410",
"indicator--5e6a7432-bcad-4a5d-9de0-8562cd07e3cb",
"indicator--16675d5a-d5c1-4f1d-b3fa-e819fecd16dd",
"indicator--7ef71494-4ab3-4c65-96dd-35dd7c4d6e58",
"indicator--5ea80a24-ac79-4c75-809c-946b03eb5ddd",
"indicator--a1ce24ff-3506-4f7b-8bd0-01cadf3fc38a",
"indicator--710f297f-6060-48cb-b3c2-e08dba785e1c",
"indicator--b8aef791-7f57-4a78-a443-590e3efc9ee9",
"indicator--7916a9da-b207-4061-89e4-0daccca4da07",
"indicator--259f72a0-4108-475e-a050-dedc086d4d0d",
"indicator--0a1a5d64-7019-4cad-87e8-b4180ba80081",
"indicator--71e3bc9e-979a-44fa-9a40-3845fa661273",
"indicator--08b33068-32ba-4c1b-bc95-092c308c5b72",
"indicator--60d4f133-53fc-401a-a5c4-a99d8edde86c",
"indicator--feb3c23d-431d-4e57-994b-fd960afe8742",
"indicator--f2c02e43-6c2e-4d4f-afd9-6c5c8355d7de",
"indicator--9dc396b0-8482-4856-b7d4-2ef98cc07f78",
"indicator--20ebe5c9-06ca-467f-888d-4a6cdde5103c",
"indicator--ab1e9441-e95c-49fa-8d4f-5b80710b30e1",
"indicator--abedc7d3-adf4-44e3-b77e-3074a889c65a",
"indicator--3bf5012c-38d6-4cc9-a91b-db48defbacd3",
"indicator--a02f09db-267a-4be1-95e0-4aeb2b3ff934",
"indicator--047574f1-6ea1-4ebc-860a-cc2690f15aca",
"indicator--dc27706c-41f7-4b9c-8cce-33805b2b4102",
"indicator--1949f9a0-b81f-4f53-8fd9-b2caa910876f",
"indicator--6084e4a1-ed44-4291-b52e-b7e658f4cd2d",
"indicator--3fc11220-b06a-4d00-adfe-51b2b8efd2b8",
"indicator--232f0f1b-279f-4b4c-807b-51438e657bf7",
"indicator--2c45f488-bf17-435e-bda0-39b4c3ba93d0",
"indicator--60e27794-2ea8-4b7d-b876-93c944692ff9",
"x-misp-object--62d87168-ecd2-46aa-b749-057e78ef86fb",
"indicator--5e4b3ebd-ca0a-464f-ad10-70aea4b7ae7d",
"x-misp-object--00e2ce66-809e-426b-a464-03a3c73515af",
"indicator--ac882397-2143-439d-a35c-29d75328afc1",
"x-misp-object--2fd08d36-d4b0-46d2-b04b-e73b5d0dab09",
"indicator--6fd4b80d-ab64-4af1-a3a8-ad9b6d395c75",
"x-misp-object--9b52878f-f520-4816-a7e5-7d612600a435",
"indicator--b6522bbe-f37c-489b-8e4c-c2876a8dbbe4",
"x-misp-object--529bb072-ec45-4bc8-9cbe-327e2a8c87fb",
"indicator--3f2c3c0f-8e53-4526-97e6-2f13c526f330",
"x-misp-object--576829d7-5640-4605-910e-d1d6874e0686",
"indicator--908358ba-5ed0-4297-b786-12a4289242f8",
"x-misp-object--b43ea474-a729-4dfd-9e40-0822f358eb91",
"indicator--ead61ca6-0171-45e8-866e-d771f0dff221",
"x-misp-object--75db51bf-03f3-48b7-b91e-a61105c01f5e",
"indicator--d29baa9f-3cb5-417d-8a99-0036be91261f",
"x-misp-object--72cae686-0ad4-42f7-938e-640b8cf6c173",
"indicator--b1f6ca3d-e038-406a-84a1-16f010a477fb",
"x-misp-object--7449d241-4e95-4a07-b3d4-e5aaf770bf80",
"indicator--63c96554-bdeb-460e-a6fc-f34d987c6f9a",
"x-misp-object--fc3eeb39-1a76-4f90-b349-5b18765ffbc6",
"indicator--7cc421fe-a7f7-4ce1-8350-e097b2d323a4",
"x-misp-object--8007aa8a-ca37-4ade-927f-5a18d2494e6c",
"indicator--88bb68aa-24a7-43b4-aa66-2664b2d7a6fe",
"x-misp-object--4deb19ef-d3a2-469c-8867-ec0068cdecd0",
"indicator--87954ab5-4409-4ea3-94f8-165babf4c710",
"x-misp-object--088808e2-c340-49e6-96a5-9b0bc41b85c4",
"indicator--2a2dd0a7-5011-4981-9b67-f02c12b8f45e",
"x-misp-object--31caa127-b831-4dba-a175-597008420dfd",
"indicator--8bb6b5f9-1eec-437c-b4e4-9f383f4cda2c",
"x-misp-object--c14b090b-a2e7-4aa9-88dc-22ce1ec164f5",
"indicator--ad88c285-5054-45f9-ace8-cdcfa5353a47",
"x-misp-object--a5bb37a9-4148-4e6d-af0a-9f0236e9081c",
"indicator--c2cc0844-2ef9-4a4f-8073-8d562ec641b4",
"x-misp-object--2e469fab-9d51-49a5-8853-f1d932426d8e",
"indicator--c0afae13-062d-49a7-a713-9a51b448b3a9",
"x-misp-object--d578e159-ed9c-4d51-b571-5222bd7c89b9",
"indicator--d024baa3-1fec-4c1a-8553-0e6f98f25421",
"x-misp-object--313aaa43-c6cf-4b04-bbd2-2445367ac02c",
"indicator--26310581-f95c-4206-abc1-7bf5c0a488ac",
"x-misp-object--798d4c42-9a74-4124-9c97-4d480a05aec4",
"indicator--e8b4a663-ff85-43cb-8398-8f1fbbc197cf",
"x-misp-object--55b4925d-4e59-40cf-918c-5cdf333dacfb",
"indicator--ac1d0ce6-08f6-4b69-8614-6ab3044ecc44",
"x-misp-object--7ceb59f0-3fa1-43ec-aeb8-16a783f01fe3",
"indicator--e1ca9c54-2ce8-44bb-bfca-350de81502ba",
"x-misp-object--aa951bc9-ef07-4251-aa0f-4538eee478de",
"indicator--6fc8fff8-49cf-4081-a039-736633c0ed58",
"x-misp-object--383142fa-6e3a-4f81-9235-567eeb5b0ab6",
"indicator--3481a175-cb01-4840-9abe-cbd87234807a",
"x-misp-object--8e613b40-bd32-45a9-93f9-f3339ef5265a",
"indicator--ee57c4f1-12e8-4d02-9d9b-7aff080fb603",
"x-misp-object--09432c45-43fc-42cd-be4f-dadab4fedd84",
"indicator--b78c654a-eb99-40d0-8b4f-598364a838d0",
"x-misp-object--b9366adb-2b69-4fa3-9d43-aa29ebe4b2cd",
"indicator--2a3fb881-8056-4765-aa9a-27a80acc6bf2",
"x-misp-object--4bd2979b-dbc0-40c3-9479-14121d9d47c7",
"indicator--aef19916-9097-40ef-a7d3-243415f3d0d8",
"x-misp-object--2b85fa93-dc70-4992-81eb-df1175ee277e",
"indicator--cd330673-923f-4a4b-8ceb-46b108f3e454",
"x-misp-object--e2c9a6cc-d8c4-4f67-8c61-5d407dcbba9a",
"indicator--0de8f154-20b4-4cbb-bff4-8387a4018315",
"x-misp-object--176ed5ae-6f90-4672-9199-96121aaf2700",
"indicator--7648e2bb-97f3-4136-8638-19438312c1f0",
"x-misp-object--bb073d81-1582-4442-96c3-3154f7c5175a",
"indicator--f3f44c88-aac0-4659-ba55-ec85914a6a43",
"x-misp-object--223881fc-7e22-4e6e-8e2e-5ef678fe01fa",
"indicator--d96379c5-a04f-450d-a1fa-5130b7a9cb47",
"x-misp-object--1a591c5c-22e2-4927-b929-cd9648cce64f",
"indicator--a18de543-51a8-473e-bce8-8bd40a06da42",
"x-misp-object--41054227-3150-48aa-9ff9-e4107aead60e",
"indicator--57592eb5-8a8b-469e-bf60-91c626a922a2",
"x-misp-object--71ba1cdd-c76a-4bad-98db-d57286d9b019",
"indicator--efafad91-2966-44fa-8c60-ddae7045e5d7",
"x-misp-object--7bd9928c-6e1b-442f-a824-4e2734b88c6b",
"indicator--b5ad9db6-0a4e-469b-8ac0-253343f5ad6c",
"x-misp-object--bf16277d-9e5c-4ccb-9be4-d9cfbb73d9dc",
"indicator--3aa019cf-6f11-4c11-8dc3-8fc6362cc78f",
"x-misp-object--6ee0e6f3-3dc6-4bad-9153-ed89aa3bd203",
"indicator--2e764a7c-ecba-4130-9a68-3133b53bf5df",
"x-misp-object--e3bd6581-d6d2-4b6f-a9a9-e1b31abb699e",
"indicator--d7dfa178-99ac-4825-a28b-5cb6880e06cd",
"x-misp-object--e4dcecdb-c624-4a3c-8204-66150147aa90",
"indicator--b6b91a9e-68d7-4ba3-8166-f504e3be3b6b",
"x-misp-object--21e7e39a-bd74-415d-8e88-f25186436c50",
"indicator--e87a965f-c0f1-4f03-897a-b5361fb2d880",
"x-misp-object--025f1bca-c27e-471f-85ef-03184b237b0a",
"indicator--918be153-49bb-4879-b579-a382954e498c",
"x-misp-object--a29d49c3-f6e7-4100-b436-0c41692ab3a2",
"indicator--f7385be0-aa1d-4ef4-9157-6daec20898c1",
"x-misp-object--ff796147-94b9-4bb1-92e8-2a6fd814e7da",
"indicator--62c0a296-7be7-4cf1-984a-4b46b085caa4",
"x-misp-object--a9f7b81f-7604-443e-b586-0d3cf4805b56",
"indicator--2dbadbc3-f1de-4ffb-92ad-bf50f91c6a19",
"x-misp-object--bf998784-79f9-4511-a2b2-498c898e185a",
"indicator--d331b125-a13e-4057-b5ce-bf053af711cf",
"x-misp-object--de27aef4-ed60-404f-9ba4-597005687128",
"indicator--f2784493-71c7-4b60-ad28-ad9a09f8cdc0",
"x-misp-object--00ea0bff-a83d-406f-8b8f-a77c7be4c548",
"indicator--bd853739-de6d-4768-8a0a-ce7724eec488",
"x-misp-object--2730a41a-4db9-4941-b48d-74b906548f6c",
"indicator--e910ee1e-2815-4633-b427-104b225074f5",
"x-misp-object--e068d586-bfea-47d5-93c3-350f8e62500d",
"indicator--815fd311-7b72-48a8-b229-17fd3b51ee79",
"x-misp-object--8c70d678-a6ce-40f3-91f0-6f607cf17d29",
"indicator--0405a5d7-db95-4327-95c0-b6a0a20542cf",
"x-misp-object--484616fd-564a-41cc-ab11-b27601894e64",
"indicator--3789b1a0-f5cd-4797-ac5e-3d0818ba37b7",
"x-misp-object--5579c4b5-b230-43d8-9886-a6121ec0cb5b",
"indicator--fc290971-f01f-4a27-b43c-07cd460da553",
"x-misp-object--a32edaaa-09b9-4070-9659-6f65980fa8c7",
"indicator--a3b413be-28f2-4493-a5ea-7ce2ddf052cf",
"x-misp-object--d355ca07-12b1-4d4b-ae89-aedc781725c1",
"indicator--df33d0fa-6d8d-438b-b826-144b187ece1c",
"x-misp-object--74b71387-2317-4822-b0f2-01ad97f9047e",
"indicator--9af3492c-af01-4736-86e1-3430a33b492a",
"x-misp-object--3177bc73-b1ec-43db-bdde-4042d60c51cd",
"indicator--eaac6baa-ed1f-4dbf-b0d6-438bf4ce64b5",
"x-misp-object--86b6ea9e-9699-4e6e-b2e4-5d289359ccc7",
"indicator--f3344dbd-f6a7-484d-a4d9-75fb5e9b9acf",
"x-misp-object--f00111c5-411a-4b56-8240-726b65b12afb",
"indicator--29e91ca5-7461-4a16-b343-c0fb04e0ce3c",
"x-misp-object--58c39a24-6350-4af2-ab12-ad1a4af2e1db",
"indicator--12b3a3a2-6f5a-4654-b899-6a56b204da23",
"x-misp-object--09e6d590-7b5e-405c-b4fc-55538d5ed355",
"indicator--959930b1-e452-4086-8de7-f4eb2211867a",
"x-misp-object--075a0a66-ea46-4d51-93a6-8b806b4e06e4",
"indicator--48526a88-0d80-4ddd-b72c-eff9063d9336",
"x-misp-object--9ce1ccb1-8ae7-4ac8-abb6-3d1526ae1fdb",
"indicator--4b8826a4-1cb6-4ce6-b5a7-2ea20fafcfb4",
"x-misp-object--d3c98553-110e-4c61-a5e7-048641e3c170",
"indicator--34884b9e-28f3-4729-8ca3-8875cae378cb",
"x-misp-object--a309d336-b26a-445f-93f0-fce29cdc5fb3",
"indicator--b61b3d4a-28e6-44ef-b1b2-a2b36a4eae64",
"x-misp-object--0e1f1a26-a52d-4079-96b3-0db6699c2ac5",
"indicator--1c0f1467-b600-477e-b547-2f3fab94e40c",
"x-misp-object--493ee987-5bd4-4447-a109-50c6fdeeae8c",
"indicator--8ebf900e-115e-4b27-b918-a07645b68a14",
"x-misp-object--fb7fb320-1174-403e-b929-eb9db6eed7b3",
"indicator--2a4282df-4e58-4422-bee3-ed2865b6b284",
"x-misp-object--7c97fc9c-4c09-4493-adf7-12e22ac2594a",
"indicator--7d7d4a70-ee4c-43b8-aa5d-42b62e4aa777",
"x-misp-object--2e02e67e-0651-4277-94da-242d2e623fa6",
"indicator--c57ba634-6efb-408a-8c09-2a0e293ca19f",
"x-misp-object--3df16408-ad08-4c07-b8ed-013fb5e5776a",
"indicator--38d1cb99-e855-4370-a0a8-e182a278c949",
"x-misp-object--3f5d58f8-14e3-4c42-a101-615cd46b331e",
"indicator--255c13ee-0a73-4ee2-8a83-faa9dd470949",
"x-misp-object--55e00e7a-0bd7-454a-a2ea-89b3f6657ffc",
"indicator--1e2f2b4a-6d4c-4a60-84ff-7ea3d7593836",
"x-misp-object--7ab00ac0-8a31-4970-a44a-af22ef8267dc",
"indicator--9dab14e9-110e-4e3c-b6ef-077e8b271b1c",
"x-misp-object--a0ef52a5-9179-4e7d-8599-c91ce3cbc3ed",
"indicator--de2c6a1f-b0fd-4c3a-8046-6e259ecd7e33",
"x-misp-object--5a11630a-39c6-4a6e-aacf-d681532964d8",
"indicator--c27ef6ef-3a71-4749-8719-49947bb36071",
"x-misp-object--f9421198-639e-495d-97f0-7db5082ce37d",
"indicator--ba8d598d-5a7d-410c-9c54-b214aa1962f9",
"x-misp-object--b2f94bd9-50fd-45f2-acc4-46affe62f4f0",
"indicator--b3350403-f5e2-45ef-b079-da4b4a602c6a",
"x-misp-object--a1b404d6-436d-4d0a-b71d-6513a816eae6",
"indicator--bd1a17c8-d750-4cb6-9d25-2be9e7d6768e",
"x-misp-object--ff1e3b2c-f241-4015-ad25-70421a2bc582",
"indicator--0a8550e5-8efd-4a4f-b363-3dca1c72adf9",
"x-misp-object--035e778c-2641-4fce-8b5f-2125d049695e",
"indicator--c25b971a-bcba-4e8c-bfaf-0b5e6d94b9fb",
"x-misp-object--d20df19b-04e9-40d8-a031-3e91fa73ce1d",
"indicator--ec94d76e-bd10-4c4e-80e7-1dca0cfdbf6c",
"x-misp-object--bb2c2496-37da-47ac-b78b-c312d9b49cff",
"indicator--bd495716-d98e-47e4-9809-d662914add7a",
"x-misp-object--a4e3943d-0dde-454f-a5da-bfb3cfff5774",
"indicator--844f6bfd-26af-4c70-b0fb-96bcfc467213",
"x-misp-object--20b5b91c-4222-4eb4-bcb0-1d2b5d65c5af",
"indicator--9e938956-b84c-4ad6-b6e9-c76e7c257f19",
"x-misp-object--6bdce9b4-2073-493d-affe-89faec431d92",
"indicator--1b4abf9b-20e1-4991-9a0f-fa6d85844664",
"x-misp-object--707daa2e-319e-4217-9e9e-66961f0944f4",
"indicator--3bff3fad-617f-469b-ab76-31ef8d37182f",
"x-misp-object--84d87567-a187-4d13-8e8e-fe4968ec7317",
"indicator--299df689-5b87-4dfd-ace4-1a5fe47cf0ef",
"x-misp-object--f0944434-11e8-4a3f-9db9-3712f278b0bd",
"indicator--45436868-f318-44a7-80ef-cfc59e1b067a",
"x-misp-object--fa571e37-157d-47a7-b2df-e512c796d8d0",
"indicator--7e0b9f43-bbfe-4c48-8bed-9a88843b88f3",
"x-misp-object--eabe87b8-0d05-49a7-8df4-7611845f7b86",
"indicator--35f19c22-bb54-4118-8e2a-a6d6b78fa536",
"x-misp-object--f61a9f17-4183-432a-a0a9-34929221e1bf",
"indicator--9bd33707-6cad-4531-9575-2b257af4239e",
"x-misp-object--97ca49c9-5479-48e1-b609-7bbde22a44a6",
"indicator--7c7d0cab-6614-4d6e-844f-b96a60b80a05",
"x-misp-object--e6de3c5f-55bc-47c9-9266-a8c981902df9",
"indicator--647f4bff-0d89-4940-b1ff-f68625083a1c",
"x-misp-object--af3a4fd1-9f79-401b-a42c-d05b1e190cae",
"indicator--9fbbec2e-0c24-457a-b241-dd5313c196a8",
"x-misp-object--2fa4890a-b3e8-4140-9c6a-ced8d3f1b4a7",
"indicator--3ad9b9d2-d784-42ae-b8c5-09d4ed4ae102",
"x-misp-object--fcbdfa58-feca-47b8-8443-d6856341c139",
"indicator--7dbc825d-6f73-4c96-8b7a-8cd5a9030b0d",
"x-misp-object--319be5ee-9dbe-4d32-9558-174535d5eb76",
"indicator--c60a6e18-6be9-41a5-af8b-044a261e8842",
"x-misp-object--fec89932-b6e3-4f90-bfeb-b12aa3d8e4d6",
"indicator--8ebdeb3d-585a-402e-ac4c-e74d4e7e28b3",
"x-misp-object--c4ed2cef-0abb-442d-a321-7f528925ef43",
"indicator--a0ba4a94-ca04-4194-8f44-7e109a1d571d",
"x-misp-object--90a85fa2-2cd3-44ed-9800-47036fbea5ed",
"indicator--448163b9-d56e-4197-b219-7701771f0b9f",
"x-misp-object--edf1b1b2-a646-4d36-89fc-2bd73036558a",
"indicator--e9731d60-0ae4-4dde-898e-cac8b04a92ae",
"x-misp-object--e6bc3456-c3f9-4350-acc0-327d026ebb77",
"indicator--398aa11c-cf88-4719-8a67-281a237f5842",
"x-misp-object--06b39d87-d102-40a2-be42-99983372e8c2",
"indicator--5df60d5d-8222-40a0-8283-c1b60986313f",
"x-misp-object--5b646f32-311e-4fe3-b55f-ba211ee379fc",
"indicator--0657a83d-6055-4d0e-b18c-e66524986913",
"x-misp-object--486237b5-0bca-4be0-b0a9-cf97bad7ec7e",
"indicator--8ff99259-70f6-4ec1-8b53-ec2640ff4f76",
"x-misp-object--8e77f1b3-ff7e-4e6d-ad68-6908c1a0961d",
"indicator--2e76b14d-770a-4609-b3b5-b5ea2d40411f",
"x-misp-object--afab1a16-e49a-41dc-8cb3-00b0eb5056e1",
"indicator--3ef484d7-e18a-4268-9d64-57a0dc11ec90",
"x-misp-object--23503f7a-ba91-4d93-aace-c0bfd9228e8a",
"indicator--20f652f2-5da6-4d98-a7ab-ca7e2f1a46d2",
"x-misp-object--2891de56-5536-4798-beb4-ebe8f7d526f6",
"indicator--94194fbd-1c7b-48a3-9397-78690a14965c",
"x-misp-object--11e9099a-5624-4972-a948-fedaf267e4e4",
"indicator--da3156db-d5bd-42c1-8acf-fcba17565f99",
"x-misp-object--3c47eb42-f907-41c4-a214-ea3bea07bad4",
"indicator--c6b32ce3-eb60-458e-a9c4-79c6323bf988",
"x-misp-object--a3ed0c52-f5a7-4eca-b69d-7e6c7df2c44f",
"indicator--d2983ca3-9223-4a87-b04f-6de51ace37a7",
"x-misp-object--eab302f5-7a18-4f5e-b606-4a7411472846",
"indicator--522f5599-7a15-4eaf-bc74-74ad5dd77996",
"x-misp-object--4cd9d948-55ef-4f84-8e84-b0eb3b3f63f8",
"indicator--590167ef-b668-496f-8970-7bd7d16826bf",
"x-misp-object--a8374917-93c1-457e-996e-c942d50f31d3",
"indicator--1f2972d3-a2b9-4e33-b097-362ad59cf22a",
"x-misp-object--ea2bb670-0be4-494b-8513-325713ffa7b3",
"indicator--878ff7cd-c5c0-4ad7-a9fc-9fac552d4b7a",
"x-misp-object--7529b90e-54c5-43da-858e-524ab68604bb",
"indicator--d7304186-e248-49e9-a821-d4e1b2bfff31",
"x-misp-object--2f5b67f5-2eb1-45a4-8067-e0619f071a9a",
"indicator--bcb35d45-3b99-4de3-952c-eaccba4124e5",
"x-misp-object--ec28b665-f612-473f-9512-fd6f869b06fe",
"indicator--8e934a55-9f8c-431c-85c8-f52a2574eb6d",
"x-misp-object--93b3d657-1591-445c-9a59-22b998db2f98",
"indicator--61def0f6-fcdb-4c6c-9557-89fa5c3fd142",
"x-misp-object--bb4fb207-7951-414d-ac6c-cc6ab057787c",
"indicator--3688243c-dba5-4425-83df-05469b53270e",
"x-misp-object--83e74766-26ae-4c43-b22c-d0f6f6871b9a",
"indicator--9da3fb39-1b7f-45b9-9c2b-18f02edb7a13",
"x-misp-object--984012d5-eb26-486d-ba47-720d981b8305",
"indicator--8c2d5422-b02d-4ad5-9eda-e19b2f8520d3",
"x-misp-object--1d8386a5-94a3-418f-bd81-ba11f4d870fe",
"indicator--7e5e847c-9c77-4184-8d70-9c5e59739b82",
"x-misp-object--cb350869-f30b-4548-bd9f-9835eba3747a",
"indicator--0cf779f9-164d-457d-ad04-ea623e3076d3",
"x-misp-object--1197e5b8-cd16-493f-a5b8-8f9491c300f9",
"indicator--7169c4a0-202c-4276-aa95-4209b3d9e92a",
"x-misp-object--ac2f44f8-9449-4acb-8612-7068a7fb9c88",
"indicator--39872eaa-fca6-44e8-942d-07104ec61f98",
"x-misp-object--b5a4ef02-e2a8-4ff5-941f-82a9b7be9f9b",
"indicator--85318a94-ab67-4089-9af3-32be44d7c131",
"x-misp-object--259af175-f2fb-4292-ba82-692fb829126d",
"indicator--b16b9ea1-7e8a-4dd7-ace1-1ce87d453a89",
"x-misp-object--a5ae663f-2dfa-4b90-bc5d-ead300eb2441",
"indicator--4bada252-c578-43d6-9196-94b816fd373e",
"x-misp-object--59a33fb7-bbfb-4df0-bade-05bd106312c2",
"indicator--c09dc808-4138-4d16-9516-df61205371e0",
"x-misp-object--56d3a112-940d-4480-85de-d34f6cd6ebdb",
"indicator--3b583c88-393d-49f8-9b29-3773a8ee7f92",
"x-misp-object--5fb79bae-c985-40ec-822e-48bcd90ef8f8",
"indicator--0160b000-c718-4bc9-adc4-40fdaadbfe06",
"x-misp-object--cf6f7ae6-d0d1-4846-bd3f-eada735297bb",
"indicator--2f72d335-4d2e-446b-b91c-9f3ec0c5825f",
"x-misp-object--671d9a9c-557b-4954-afb7-84116dfaafdf",
"indicator--a5d51c54-9186-434c-9370-1b043a73527e",
"x-misp-object--b1c3a402-f547-4396-982a-95a61fc14c24",
"indicator--39ae68e0-13ea-4711-b214-3af059803286",
"x-misp-object--36c61803-2877-405f-b6b0-5acbe905782e",
"indicator--2a42886a-67dc-44e5-bdec-bca5c3b4aaf3",
"x-misp-object--09d1177b-e3e6-4f3d-925b-ac25620cad00",
"indicator--be44f41e-6b44-4cc5-9f3d-8bf5755c4e91",
"x-misp-object--90c6a983-0097-405d-816a-d7d0aa604363",
"indicator--c2b35c06-e9fb-4bc9-be25-fc70417cedf4",
"x-misp-object--8a87830e-ecc9-495e-84ba-a143f2bcd94f",
"indicator--4e1bef3c-5152-40f7-b83f-b29b1737af98",
"x-misp-object--6a445163-58d2-473d-9100-c9b17e1d420b",
"indicator--059a2690-75da-4ce5-aa90-f93ab97f530f",
"x-misp-object--fbaaca08-1b6c-44c6-9aec-171935d04e5c",
"indicator--1e10c051-b1b1-44b5-9c28-8dd9e3752a6c",
"x-misp-object--8dfb30ca-fe11-45b7-96df-67e092866720",
"indicator--1253fc5b-4990-4d6b-957f-c0df3912a373",
"x-misp-object--e186fa28-a483-46dc-841d-47cf32443adf",
"indicator--80f3ef4a-a9a5-4329-9597-21fb85287468",
"x-misp-object--d6ecedb2-858f-4080-8238-1e674aaa6d83",
"indicator--9bfa8642-f8fe-4e9e-a37f-5d43e5aeaf03",
"x-misp-object--9e583e66-b14c-47cb-815e-a0b0d1e85b4a",
"indicator--ee861cc7-1104-4b21-8c06-d0f92bef929c",
"x-misp-object--35cc2bf0-ecbe-4b5e-9db6-912ebeefb488",
"indicator--3645e877-e229-407e-9b05-f50f5bc924de",
"x-misp-object--b73a48db-798e-497b-9654-9467f848615f",
"indicator--8d9e3f84-afe5-459f-a511-733d0a6c73a1",
"x-misp-object--f7bf32fc-5b23-410b-8f1d-0e5408c44680",
"indicator--3fb984a2-e658-4433-a266-93ade5cca32b",
"x-misp-object--c7153b15-1d40-4e08-908c-7c2a0d374c12",
"relationship--a6d7616a-5c1f-4bd9-b690-bd28054ee949",
"relationship--b8b1c556-da5b-4727-8353-646069232cba",
"relationship--3999939e-e100-4e50-ad29-d846b9f77d03",
"relationship--ef1357c5-1a7b-4547-8465-83ca557386dc",
"relationship--4111c250-83ce-4451-9ea7-8dd756e62bff",
"relationship--d9228cc6-bc87-446c-aa08-527b51bff6f8",
"relationship--92464582-7a20-4273-8f34-9115c7733867",
"relationship--44716ac7-1019-4987-985e-78995e083e20",
"relationship--e6f77b0a-ef79-4fac-a69f-32e086904979",
"relationship--77978e30-f4fd-4b65-9b41-781fd4da5592",
"relationship--042805e5-1ad9-454d-b434-125c84158831",
"relationship--17388fa8-a307-4e12-a273-b4a07840a3ea",
"relationship--6fd1616c-d67e-44c5-b9f0-0b55774f65a6",
"relationship--180a1d50-c4cf-40b1-909b-f605fa8c837f",
"relationship--f3f9820b-49c6-452a-9550-2a84e847621f",
"relationship--96d37e42-8e36-478a-83a1-1e11f1eb131e",
"relationship--593322a6-0b7a-4753-b086-15ba5ccfa9a1",
"relationship--a2ff093b-dcce-4a92-87aa-c79fae778af9",
"relationship--ea42f6d8-2da9-4e51-aca7-f1662ec139b2",
"relationship--28170603-3b68-4f4e-9afd-76952aabad72",
"relationship--00403748-1ce1-4177-bb99-c77282225299",
"relationship--95cd2a0e-bb1d-4609-9f55-d6bcca049d76",
"relationship--a1f7e9fd-bb55-4da3-b22f-c868bda454f6",
"relationship--6ad5c4ae-3bce-4bee-b947-4b6fdf0ae135",
"relationship--83828282-065b-4e08-b125-94f9d8554562",
"relationship--d18021cd-2d25-4527-b388-6e96d949286e",
"relationship--9ae4fce0-8d28-4bee-a1b6-a739e8a61596",
"relationship--26be1584-3a97-4c16-9f29-082499a61704",
"relationship--99a2d9c0-c8ab-417e-b3c5-dfb8402e21e6",
"relationship--d151436e-ce51-4345-8f02-b8e790cdbf6a",
"relationship--bd062c67-f996-4b48-8bd3-2d30180064e0",
"relationship--53dc9dc4-6b37-41c7-a46a-7d0b877f8cb3",
"relationship--338c3aa2-6131-441d-9515-5ea10b0e1ad6",
"relationship--0a312471-4a9b-4a4d-952b-c151b3761315",
"relationship--c2da820e-b640-49ab-b868-512d4f7563a9",
"relationship--e7133f21-fef8-4250-87cb-5d245d67e920",
"relationship--3db3a239-e663-430d-a07d-dcfd388e6281",
"relationship--438f081c-8d00-47e1-97bd-9bc22eb2f30b",
"relationship--0ade779d-ec26-4fc0-86ba-88eb973f55ed",
"relationship--4676dab1-1a6a-4708-88dc-aa9b350460db",
"relationship--7b7ab3c7-5cf4-4df7-a324-f5628e782098",
"relationship--36e280ae-529a-471c-8489-c96b72d7858d",
"relationship--2bd656f0-1136-4f6b-bf53-ed4decc2ecdb",
"relationship--5555ff2a-add7-47d6-9f40-57995bd28cc6",
"relationship--884289ad-e924-4af5-b99a-34ed4ac797f2",
"relationship--4fc88818-539a-43c9-8e97-e1e58a96accd",
"relationship--1f249fb6-a038-4729-ab9d-d2bbab999da1",
"relationship--876f264a-09a4-465a-9d72-0db83f0f2477",
"relationship--f4a8d9ff-0bba-492c-9f0f-af148c499749",
"relationship--1f2126a4-a529-4bc3-88cf-0a1f38552235",
"relationship--c16c3ca0-f4ee-4802-b7cf-4d76917ae482",
"relationship--468056c6-72a0-41ac-a561-1666ad32d022",
"relationship--e357a381-6ba0-4d93-b45e-c59bb6ce0d65",
"relationship--3994f4a5-c100-4522-88d7-fef143c42b6f",
"relationship--f2d8e1b6-d5d3-4a7c-8a4b-8f263bd52e60",
"relationship--1633a995-0651-4378-b4fb-fa76b64446d4",
"relationship--71ae709c-0ccc-407b-b988-5398f6fe9b55",
"relationship--cb83cdd5-0089-4e19-9304-1063d5598377",
"relationship--92bdc046-587a-4c65-9005-9e54d46cb12e",
"relationship--c4651cac-40bf-45fe-a7fd-83f704e28c82",
"relationship--3ebcf321-becf-4251-b2fa-21c427240824",
"relationship--600c7eca-b4a0-42c8-ab90-58ed8e07d36a",
"relationship--73823034-1b0a-4e9f-9ef9-048fdcb7fae5",
"relationship--da132f92-d2ee-49b3-a946-56d6b6409f16",
"relationship--a2bd1d62-e8d4-4015-8d53-65ec5db5901f",
"relationship--6f072fb5-557f-4655-854a-0b28890a8591",
"relationship--44eecea9-9ab8-4116-bc52-d137f49bed1b",
"relationship--39e27925-68f6-480d-a7e5-dfe8485fcbd0",
"relationship--5c934902-7969-4060-a149-f46c2137cbd2",
"relationship--585c0cb3-553c-4682-99c7-ab8182be09b4",
"relationship--587457cd-d73d-441d-9744-115466e9bde9",
"relationship--a00768a1-9aa2-4606-aabc-1265884c086f",
"relationship--cee9e88f-8449-4123-b1ea-c84d7a4e78e7",
"relationship--9d32ee28-22d8-49b4-96f1-6109d407d698",
"relationship--c5c5d27b-5f63-4c97-8f78-258304579ec6",
"relationship--6bb5bc85-477f-4bf7-8a10-8ffb224e665f",
"relationship--a59701e1-4c6c-46f9-a149-e405cd94eb70",
"relationship--e3ab8512-9855-4579-b1fe-a653277a8e55",
"relationship--fe9cb29e-cab7-402f-9947-33a4ac7c0308",
"relationship--def62f35-4560-4dbe-a3e4-dc4d9ed8f061",
"relationship--dcd875af-f42d-46d6-8779-57944e660822",
"relationship--a1819c78-b939-4b8a-bf0c-66575f920530",
"relationship--fc08213e-3515-4b7d-ae1d-985f5e500925",
"relationship--b44cd33f-3d64-4b34-99ff-26f4bd14175d",
"relationship--fa347709-a91a-44b3-ae20-19a4d277b98f",
"relationship--91a76a3e-cad0-4ad9-98d1-abfb63c675b3",
"relationship--73b2f4a6-3904-4805-93f1-abf498537795",
"relationship--c9640417-aaa5-4cb8-915d-109246637d2e",
"relationship--1e947ebd-d9e2-47c0-a6bd-f94b929b4fc7",
"relationship--c8f6e377-1846-4690-a525-997cd8638382",
"relationship--c8e3fb7a-61f5-4f2f-99c5-cae03a9632b2",
"relationship--3fa8dc94-721d-4025-9286-2d67137b63cf",
"relationship--d8e04569-76f4-42bd-a45c-d5100cfe6107",
"relationship--2048e3dd-505c-4078-b27e-3562a633f2b8",
"relationship--20f2ff58-cd8f-49a6-8840-860732e3c2e8",
"relationship--d43892d4-ea37-48e9-9954-e9a83da4655f",
"relationship--cc553b85-811a-44e4-b38f-4b6fd26f57ee",
"relationship--66e2ca11-0a77-4017-950f-c2693a3d318e",
"relationship--e5c2a9d9-a5bd-4d1c-9cd1-aff02db3da81",
"relationship--e8a512d1-f6fc-4c44-9b69-923b26aa61a0",
"relationship--175fc67a-4a36-406a-bcb2-9cf271bfdf68",
"relationship--14812834-4f70-4eed-af1f-8aebdf9f18ba",
"relationship--2d93cc59-646b-4fa7-a91d-cf03c3452bd7",
"relationship--4c21a772-d955-4031-ab75-197a11285a6a",
"relationship--0099e4f1-68e7-4ee4-94b5-0d7ecae70d6a",
"relationship--481a1957-24ed-44a8-bffb-990630343513",
"relationship--e66a4226-89bc-4c0d-86b0-21b855f129f5",
"relationship--44cb3611-35ea-40db-95fd-8fa9bf044125",
"relationship--6ac573b7-4af8-42aa-b9c2-e8f1a0047d17",
"relationship--b274aa8d-9697-47f1-8a0d-a3aea3b0b2ee",
"relationship--5e26243b-69f3-4db6-8dbf-a6ecde37603c",
"relationship--14f8d24c-493e-4a8a-9cca-8848030602e9",
"relationship--a6d4704c-8bf1-45b0-ba6a-0fc0b88842c0",
"relationship--dbbfc427-9061-44d4-9b0e-6bbc56a16e11",
"relationship--2d328dac-757f-4bb3-9d17-6d69e2a65d78",
"relationship--9248f40c-0279-41c9-b677-844230ac6c67",
"relationship--ea3d798b-7e58-4a2c-a566-ea656e68d63e",
"relationship--d2e83f47-6f31-4d9b-bd79-bb49cf82636b",
"relationship--cce3d3e7-28ee-4e44-81f8-96dfc168f8e4",
"relationship--ae43726b-5a3f-4f3b-afbb-061858a35711",
"relationship--50686d50-a495-4552-a018-cf4bf1baba27",
"relationship--4eb6964c-9e8e-4527-8d9f-a20f08bbb81f",
"relationship--a7e26585-4cff-41a7-ba0e-8c8cd13c2bff",
"relationship--7aafdb3c-02cc-48ec-b011-b72c81435195",
"relationship--d633e2b9-1a2e-491c-ad7a-09b260a44e23",
"relationship--b9d8a703-4c3c-4830-bf0b-78a55fef666b",
"relationship--28797d2b-f581-4186-a0fd-4086acd322fd",
"relationship--ff825a5d-5f88-4898-9bfa-b7ac2450b1d7",
"relationship--b7c1c9af-b910-4251-807d-ddf575430b06",
"relationship--1ccd6580-2e2f-44ab-9a0a-828a61247612",
"relationship--a4c53056-df8b-463e-a791-76f33e248c5e",
"relationship--5e3504b2-0fab-4271-b2aa-6632ce4eaaab",
"relationship--fac718e0-7402-4033-9686-ad31481a4355",
"relationship--52c29b0e-e0db-427b-9cee-63caa009842b",
"relationship--edb7de3b-af28-4ce6-8e75-ff7cdcc02c50",
"relationship--6e951244-de09-4d1d-9f54-1ff072ee0ddd",
"relationship--b9ba2d8e-ed92-46ed-bd47-62d71147e006",
"relationship--26ac8daa-cc44-4807-9dbf-4690e661e922",
"relationship--91d33ce7-2fa1-45e9-bcf7-9551f7042ecd",
"relationship--58a98739-15c4-4b9f-94b8-4707f6b9f529",
"relationship--530a8e29-bc64-48fb-afd4-9e8ba0d2c65c",
"relationship--f5a629fc-337a-4fb3-8ceb-2792e3e7ed89",
"relationship--f3460ba3-b5cf-4b83-9493-1912b7f4bf89",
"relationship--434449c9-f171-4d7e-bb1a-bbe85a801d27",
"relationship--312ce06f-6a57-4a4f-8886-28c18e70ddf7",
"relationship--4d20f652-dcee-45e9-8a80-2292e2f76790",
"relationship--ae71c7e5-630f-40b2-989f-1159bb699725",
"relationship--77b55f4e-d5cc-4ee7-8f91-7a9f22787de5",
"relationship--3d504ff5-93f8-4840-80a7-24e91d617ffe",
"relationship--e349210b-5f60-45bf-903c-9605648cb6da",
"relationship--0812c1f3-9793-4bbf-b2a5-419101b9a875",
"relationship--cf5de492-c250-46a9-8a6e-fdd7437a265a"
],
"labels": [
"Threat-Report",
"misp:tool=\"MISP-STIX-Converter\"",
"type:OSINT",
"osint:lifetime=\"perpetual\"",
"osint:certainty=\"50\"",
"misp-galaxy:ransomware=\"Ryuk ransomware\""
],
"object_marking_refs": [
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8dfed048-c049-4ca3-8c61-18e849312303",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:03.000Z",
"modified": "2020-10-30T07:38:03.000Z",
"pattern": "[domain-name:value = 'ns1.aaatus.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b88500ac-0313-4587-a31d-1169f2cb698a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:03.000Z",
"modified": "2020-10-30T07:38:03.000Z",
"pattern": "[domain-name:value = 'ns2.aaatus.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--165a272e-1ca2-471c-a546-7d280a93c8d8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:03.000Z",
"modified": "2020-10-30T07:38:03.000Z",
"pattern": "[domain-name:value = 'ns1.avrenew.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--55cdea8b-75a6-4ab0-93dc-d455cb2d5a85",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:03.000Z",
"modified": "2020-10-30T07:38:03.000Z",
"pattern": "[domain-name:value = 'ns2.avrenew.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f086465e-1c86-4f39-90b2-0f29a3889061",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:03.000Z",
"modified": "2020-10-30T07:38:03.000Z",
"pattern": "[domain-name:value = 'ns1.besttus.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b2776b50-8071-4a5b-b2b8-a139a6bcc5ed",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:03.000Z",
"modified": "2020-10-30T07:38:03.000Z",
"pattern": "[domain-name:value = 'ns2.besttus.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b115a272-f614-4d78-8db3-4f5993dfb048",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:03.000Z",
"modified": "2020-10-30T07:38:03.000Z",
"pattern": "[domain-name:value = 'ns1.bigtus.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--85aceed2-4f89-486b-870c-1400dee522c1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:03.000Z",
"modified": "2020-10-30T07:38:03.000Z",
"pattern": "[domain-name:value = 'ns2.bigtus.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--015f2f6f-df45-465b-95d1-928bf070e005",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:03.000Z",
"modified": "2020-10-30T07:38:03.000Z",
"pattern": "[domain-name:value = 'ns1.checkwinupdate.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--602bf525-e5b4-4dc5-a505-94329b5db176",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:03.000Z",
"modified": "2020-10-30T07:38:03.000Z",
"pattern": "[domain-name:value = 'ns2.checkwinupdate.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--02443c02-506b-4958-abd0-daccb7f77ef5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:03.000Z",
"modified": "2020-10-30T07:38:03.000Z",
"pattern": "[domain-name:value = 'ns1.ciscocheckapi.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a199f61e-5141-47ea-8425-dc0e924d7774",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:03.000Z",
"modified": "2020-10-30T07:38:03.000Z",
"pattern": "[domain-name:value = 'ns2.ciscocheckapi.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f820ed47-f5a5-442e-9848-81df9b3bc31a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:03.000Z",
"modified": "2020-10-30T07:38:03.000Z",
"pattern": "[domain-name:value = 'ns1.cleardefencewin.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7e54e76d-8e4c-4e7f-936c-83097ecffad3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:03.000Z",
"modified": "2020-10-30T07:38:03.000Z",
"pattern": "[domain-name:value = 'ns2.cleardefencewin.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--bdb8d512-4b26-4ea4-a1b2-84731b47df17",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:03.000Z",
"modified": "2020-10-30T07:38:03.000Z",
"pattern": "[domain-name:value = 'ns1.cmdupdatewin.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--15f3bc4c-a33a-4cef-b36d-e064ff92a6b3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:03.000Z",
"modified": "2020-10-30T07:38:03.000Z",
"pattern": "[domain-name:value = 'ns2.cmdupdatewin.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4b82b465-a2f5-4646-beb6-875bc34ec338",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:03.000Z",
"modified": "2020-10-30T07:38:03.000Z",
"pattern": "[domain-name:value = 'ns1.comssite.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0aa27621-17cc-414e-9b59-bc6db1b99199",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:03.000Z",
"modified": "2020-10-30T07:38:03.000Z",
"pattern": "[domain-name:value = 'ns2.comssite.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--15f46a6e-675b-46ef-a3dd-383e253be58b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:03.000Z",
"modified": "2020-10-30T07:38:03.000Z",
"pattern": "[domain-name:value = 'ns1.cylenceprotect.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8c5e3e2c-3a04-47e5-aa2d-7352d33420e1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:03.000Z",
"modified": "2020-10-30T07:38:03.000Z",
"pattern": "[domain-name:value = 'ns2.cylenceprotect.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--11c24aa3-d669-42b5-b6d7-d062392832be",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:03.000Z",
"modified": "2020-10-30T07:38:03.000Z",
"pattern": "[domain-name:value = 'ns1.defenswin.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c6c924b0-5c08-44d6-aef0-992614080b49",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:03.000Z",
"modified": "2020-10-30T07:38:03.000Z",
"pattern": "[domain-name:value = 'ns2.defenswin.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b8fe84f9-053c-40aa-8435-1601ae67c504",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:03.000Z",
"modified": "2020-10-30T07:38:03.000Z",
"pattern": "[domain-name:value = 'ns1.easytus.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3f74ca97-6061-4964-8a06-14d22e059efe",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:03.000Z",
"modified": "2020-10-30T07:38:03.000Z",
"pattern": "[domain-name:value = 'ns2.easytus.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--52829006-ac3e-43b6-b6e2-43535645482a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:03.000Z",
"modified": "2020-10-30T07:38:03.000Z",
"pattern": "[domain-name:value = 'ns1.findtus.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e7ebb555-7a77-4f0b-8d44-0b7cfa514a43",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:03.000Z",
"modified": "2020-10-30T07:38:03.000Z",
"pattern": "[domain-name:value = 'ns2.findtus.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--606abae5-2d9e-41d0-b4c5-eebd578d9c1e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:03.000Z",
"modified": "2020-10-30T07:38:03.000Z",
"pattern": "[domain-name:value = 'ns1.firsttus.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5485ef1f-0fb4-432b-8a21-5fef00d02258",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:03.000Z",
"modified": "2020-10-30T07:38:03.000Z",
"pattern": "[domain-name:value = 'ns2.firsttus.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4b8851f4-ced5-4804-b807-9e0e066350bc",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:03.000Z",
"modified": "2020-10-30T07:38:03.000Z",
"pattern": "[domain-name:value = 'ns1.freeallsafe.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--795556f3-4f6d-4064-ab59-2f72a50eca6d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:03.000Z",
"modified": "2020-10-30T07:38:03.000Z",
"pattern": "[domain-name:value = 'ns2.freeallsafe.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8b83d295-3da3-4e07-b5b9-b803ab88ac08",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:03.000Z",
"modified": "2020-10-30T07:38:03.000Z",
"pattern": "[domain-name:value = 'ns1.freeoldsafe.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0bd721f4-1b9a-40b3-ad43-180f45a36d95",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:03.000Z",
"modified": "2020-10-30T07:38:03.000Z",
"pattern": "[domain-name:value = 'ns2.freeoldsafe.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8d9a797d-2eb4-4a10-8271-936eead18812",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:03.000Z",
"modified": "2020-10-30T07:38:03.000Z",
"pattern": "[domain-name:value = 'ns1.greattus.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--da1fdbf7-bc84-459a-83f9-4bdc4550ff51",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:03.000Z",
"modified": "2020-10-30T07:38:03.000Z",
"pattern": "[domain-name:value = 'ns2.greattus.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--fddcdca8-e126-4f6a-ada0-6f38a7ee051a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:03.000Z",
"modified": "2020-10-30T07:38:03.000Z",
"pattern": "[domain-name:value = 'ns1.havesetup.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7650875e-7717-4bf7-8f38-47eb8930c14f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:03.000Z",
"modified": "2020-10-30T07:38:03.000Z",
"pattern": "[domain-name:value = 'ns2.havesetup.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d06f51f3-1b03-48f7-9d5f-73df56bbfc75",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:03.000Z",
"modified": "2020-10-30T07:38:03.000Z",
"pattern": "[domain-name:value = 'ns1.iexploreservice.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--681a21c2-28ad-48ff-ab8e-2d1cf815c0fb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:03.000Z",
"modified": "2020-10-30T07:38:03.000Z",
"pattern": "[domain-name:value = 'ns2.iexploreservice.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--fa210e30-4f71-46b9-af7d-0b129852b5c7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:03.000Z",
"modified": "2020-10-30T07:38:03.000Z",
"pattern": "[domain-name:value = 'ns1.jomamba.best']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--eac77d1c-f26e-428f-b03f-78d93a350784",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:03.000Z",
"modified": "2020-10-30T07:38:03.000Z",
"pattern": "[domain-name:value = 'ns2.jomamba.best']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--72080da5-bc9b-47b3-8031-9afcc0eeeba4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:03.000Z",
"modified": "2020-10-30T07:38:03.000Z",
"pattern": "[domain-name:value = 'ns1.livecheckpointsrs.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c007fc23-e8cc-4d0c-8a29-0ca57d381d77",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:03.000Z",
"modified": "2020-10-30T07:38:03.000Z",
"pattern": "[domain-name:value = 'ns2.livecheckpointsrs.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4344efe7-991e-4604-a520-63d2567a078a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:03.000Z",
"modified": "2020-10-30T07:38:03.000Z",
"pattern": "[domain-name:value = 'ns1.livetus.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5f1013e5-083a-4326-af9c-bb28524d2eeb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:03.000Z",
"modified": "2020-10-30T07:38:03.000Z",
"pattern": "[domain-name:value = 'ns2.livetus.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d6544a02-ef46-4609-b4ef-ee0374d91797",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:03.000Z",
"modified": "2020-10-30T07:38:03.000Z",
"pattern": "[domain-name:value = 'ns1.lsassupdate.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--975d6a1a-5bee-4809-8870-79217305825d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:03.000Z",
"modified": "2020-10-30T07:38:03.000Z",
"pattern": "[domain-name:value = 'ns2.lsassupdate.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--dd0686ad-2784-4f96-82cc-da8564528dd8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:03.000Z",
"modified": "2020-10-30T07:38:03.000Z",
"pattern": "[domain-name:value = 'ns1.lsasswininfo.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--175bc9fe-05f9-4068-855e-6db13795dcbf",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:03.000Z",
"modified": "2020-10-30T07:38:03.000Z",
"pattern": "[domain-name:value = 'ns2.lsasswininfo.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9994427a-0fb4-4bed-9bee-5e2f71e7b667",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:03.000Z",
"modified": "2020-10-30T07:38:03.000Z",
"pattern": "[domain-name:value = 'ns1.microsoftupdateswin.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--73ac4089-6ea4-4f33-8573-86797c5d35d8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:03.000Z",
"modified": "2020-10-30T07:38:03.000Z",
"pattern": "[domain-name:value = 'ns2.microsoftupdateswin.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ffecfa3c-00bf-4bb4-b5ea-5fe1c628c1f5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:03.000Z",
"modified": "2020-10-30T07:38:03.000Z",
"pattern": "[domain-name:value = 'ns1.renovatesystem.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a1e41a23-057b-4eb5-89b6-98f536f79b67",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:03.000Z",
"modified": "2020-10-30T07:38:03.000Z",
"pattern": "[domain-name:value = 'ns2.renovatesystem.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0f198735-03ab-4348-bbdf-ff72cedb77b2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:03.000Z",
"modified": "2020-10-30T07:38:03.000Z",
"pattern": "[domain-name:value = 'ns1.sophosdefence.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--bbb42dd3-05c7-45fb-8950-e561fa3ab255",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:04.000Z",
"modified": "2020-10-30T07:38:04.000Z",
"pattern": "[domain-name:value = 'ns2.sophosdefence.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9a28462d-55c5-4a75-a966-798612124f22",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:04.000Z",
"modified": "2020-10-30T07:38:04.000Z",
"pattern": "[domain-name:value = 'ns1.taskshedulewin.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4eae81e3-eaaa-4904-926e-1d37ddabcddc",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:04.000Z",
"modified": "2020-10-30T07:38:04.000Z",
"pattern": "[domain-name:value = 'ns2.taskshedulewin.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f7a3c7e8-a390-4557-b3c9-475656c0bfae",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:04.000Z",
"modified": "2020-10-30T07:38:04.000Z",
"pattern": "[domain-name:value = 'ns1.timesshifts.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--42a05067-6199-420e-afa8-e1dfe1746234",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:04.000Z",
"modified": "2020-10-30T07:38:04.000Z",
"pattern": "[domain-name:value = 'ns2.timesshifts.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1ba50b46-2a36-4c76-a90e-4ed70698e904",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:04.000Z",
"modified": "2020-10-30T07:38:04.000Z",
"pattern": "[domain-name:value = 'ns1.update-wind.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--cb6fb378-09ad-4dc4-b6ea-e746b51cb95f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:04.000Z",
"modified": "2020-10-30T07:38:04.000Z",
"pattern": "[domain-name:value = 'ns2.update-wind.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f1850f72-bb08-48f6-921d-b3147514be67",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:04.000Z",
"modified": "2020-10-30T07:38:04.000Z",
"pattern": "[domain-name:value = 'ns1.update-wins.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9add5703-dedb-414c-8973-805eefeaf3ac",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:04.000Z",
"modified": "2020-10-30T07:38:04.000Z",
"pattern": "[domain-name:value = 'ns2.update-wins.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a37702ca-0505-49ba-9b2a-e49bd3580576",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:04.000Z",
"modified": "2020-10-30T07:38:04.000Z",
"pattern": "[domain-name:value = 'ns1.updatewinlsass.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ad26464a-7b56-46f2-a2b9-ab10fa2d146b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:04.000Z",
"modified": "2020-10-30T07:38:04.000Z",
"pattern": "[domain-name:value = 'ns2.updatewinlsass.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--773eeab1-23b9-4237-93ee-68828651f077",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:04.000Z",
"modified": "2020-10-30T07:38:04.000Z",
"pattern": "[domain-name:value = 'ns1.updatewinsoftr.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--be110bd7-63b1-4daa-bfa2-cfb1d64de018",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:04.000Z",
"modified": "2020-10-30T07:38:04.000Z",
"pattern": "[domain-name:value = 'ns2.updatewinsoftr.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3993b733-9172-4d58-ba15-594082a437f8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:04.000Z",
"modified": "2020-10-30T07:38:04.000Z",
"pattern": "[domain-name:value = 'ns1.vnuret.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--39373f2a-bbf4-4cd7-99d7-267d7c213f17",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:04.000Z",
"modified": "2020-10-30T07:38:04.000Z",
"pattern": "[domain-name:value = 'ns2.vnuret.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--63ae4a7d-c2bc-4bdd-92cc-6ef9e90cabbc",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:04.000Z",
"modified": "2020-10-30T07:38:04.000Z",
"pattern": "[domain-name:value = 'ns3.vnuret.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--35e82e18-c868-455a-8010-dbd448cebbb5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:04.000Z",
"modified": "2020-10-30T07:38:04.000Z",
"pattern": "[domain-name:value = 'ns1.windefenceinfo.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--bdd77e67-4199-4199-a388-f4a328a868ef",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:04.000Z",
"modified": "2020-10-30T07:38:04.000Z",
"pattern": "[domain-name:value = 'ns2.windefenceinfo.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--511b7913-beb5-4d2c-8d39-1c5f700797d5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:04.000Z",
"modified": "2020-10-30T07:38:04.000Z",
"pattern": "[domain-name:value = 'ns1.windefens.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--92cbf44e-1374-4f0d-9854-85d5238cbf43",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:04.000Z",
"modified": "2020-10-30T07:38:04.000Z",
"pattern": "[domain-name:value = 'ns2.windefens.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--36818da6-d744-4079-88a4-849896fca8e7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:04.000Z",
"modified": "2020-10-30T07:38:04.000Z",
"pattern": "[domain-name:value = 'ns1.winsysteminfo.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1cbc00bf-ec64-4444-9420-c7ae09525e69",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:04.000Z",
"modified": "2020-10-30T07:38:04.000Z",
"pattern": "[domain-name:value = 'ns2.winsysteminfo.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--aa9a22d1-b0b8-41cf-962f-711ce5619da7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:04.000Z",
"modified": "2020-10-30T07:38:04.000Z",
"pattern": "[domain-name:value = 'ns1.winsystemupdate.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--369e8d63-60fa-4323-a401-336435f1754e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:04.000Z",
"modified": "2020-10-30T07:38:04.000Z",
"pattern": "[domain-name:value = 'ns2.winsystemupdate.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f1a33675-c93c-45f6-a07c-4ddcf0582e0b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:49.000Z",
"modified": "2020-10-30T07:38:49.000Z",
"description": "Less Common Subdomain Pairings",
"pattern": "[domain-name:value = 'an.service1boost.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4dd3e70c-38bd-4a61-a00f-3c971d4e158b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:49.000Z",
"modified": "2020-10-30T07:38:49.000Z",
"description": "Less Common Subdomain Pairings",
"pattern": "[domain-name:value = 'nm.service1boost.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--290a87ac-c4a5-44ed-af8c-cc850a488d2c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:49.000Z",
"modified": "2020-10-30T07:38:49.000Z",
"description": "Less Common Subdomain Pairings",
"pattern": "[domain-name:value = 'an.gtrsqer.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--cefbdf5f-3879-4529-b8e1-6e2cd25da0a1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:49.000Z",
"modified": "2020-10-30T07:38:49.000Z",
"description": "Less Common Subdomain Pairings",
"pattern": "[domain-name:value = 'kl.gtrsqer.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--83d0c686-5335-4552-bf94-d9a70ed54ff0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:49.000Z",
"modified": "2020-10-30T07:38:49.000Z",
"description": "Less Common Subdomain Pairings",
"pattern": "[domain-name:value = 'yn.gtrsqer.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--032d3e2e-0f00-4a9c-aad5-d6412ffb9210",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:49.000Z",
"modified": "2020-10-30T07:38:49.000Z",
"description": "Less Common Subdomain Pairings",
"pattern": "[domain-name:value = 'ns1.gtrsqer.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--6dbdc417-87e9-49eb-92e3-ee5bbfe52575",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:49.000Z",
"modified": "2020-10-30T07:38:49.000Z",
"description": "Less Common Subdomain Pairings",
"pattern": "[domain-name:value = 'ns2.gtrsqer.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f4374331-ed4e-436b-8a04-97f22c9dcca0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:49.000Z",
"modified": "2020-10-30T07:38:49.000Z",
"description": "Less Common Subdomain Pairings",
"pattern": "[domain-name:value = 'asd.errvghu.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--07f1e4da-457e-4213-976b-e3a8f410b2cf",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:49.000Z",
"modified": "2020-10-30T07:38:49.000Z",
"description": "Less Common Subdomain Pairings",
"pattern": "[domain-name:value = 'nj.errvghu.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--68593fe6-0a49-4f73-83ba-97bbfd5caff1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:49.000Z",
"modified": "2020-10-30T07:38:49.000Z",
"description": "Less Common Subdomain Pairings",
"pattern": "[domain-name:value = 'ns1.errvghu.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--88061115-36e4-4c93-9339-924593946e2b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:49.000Z",
"modified": "2020-10-30T07:38:49.000Z",
"description": "Less Common Subdomain Pairings",
"pattern": "[domain-name:value = 'ns2.errvghu.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d57cf63c-4fd6-4b01-b9f3-b590e7a619fd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:49.000Z",
"modified": "2020-10-30T07:38:49.000Z",
"description": "Less Common Subdomain Pairings",
"pattern": "[domain-name:value = 'uj.errvghu.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--adbfff19-7a7b-4685-95e3-8b0a848e130a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:49.000Z",
"modified": "2020-10-30T07:38:49.000Z",
"description": "Less Common Subdomain Pairings",
"pattern": "[domain-name:value = 'ga.kungfupandasa.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f31a9872-23e9-4e1a-9970-2cf7fcc74ad0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:49.000Z",
"modified": "2020-10-30T07:38:49.000Z",
"description": "Less Common Subdomain Pairings",
"pattern": "[domain-name:value = 'rd.kungfupandasa.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1579a174-dee9-4bfc-88ca-71cec352fe12",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:49.000Z",
"modified": "2020-10-30T07:38:49.000Z",
"description": "Less Common Subdomain Pairings",
"pattern": "[domain-name:value = 'qy.kungfupandasa.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2df701d9-7887-4db5-888a-e023ed683f24",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:49.000Z",
"modified": "2020-10-30T07:38:49.000Z",
"description": "Less Common Subdomain Pairings",
"pattern": "[domain-name:value = 'ga.biliyilish.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--256321b4-eb04-4efa-a496-df6fbd82589c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:49.000Z",
"modified": "2020-10-30T07:38:49.000Z",
"description": "Less Common Subdomain Pairings",
"pattern": "[domain-name:value = 'uhj.biliyilish.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--bacaa3a7-2d51-45bf-b9c2-a9ed18bee217",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:49.000Z",
"modified": "2020-10-30T07:38:49.000Z",
"description": "Less Common Subdomain Pairings",
"pattern": "[domain-name:value = 'yq.biliyilish.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--fc3d7250-dbd4-4167-bac8-190931fe2412",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:49.000Z",
"modified": "2020-10-30T07:38:49.000Z",
"description": "Less Common Subdomain Pairings",
"pattern": "[domain-name:value = 'ha.blackhoall.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7a90fefc-2491-4a36-b24c-5194b886d57a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:49.000Z",
"modified": "2020-10-30T07:38:49.000Z",
"description": "Less Common Subdomain Pairings",
"pattern": "[domain-name:value = 'nz.blackhoall.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b7b8f26d-b2eb-4c82-b56f-928b76b528b5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:49.000Z",
"modified": "2020-10-30T07:38:49.000Z",
"description": "Less Common Subdomain Pairings",
"pattern": "[domain-name:value = 'yqs.blackhoall.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--bd9960f4-8621-4c55-8e96-2cb9501a12bc",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:49.000Z",
"modified": "2020-10-30T07:38:49.000Z",
"description": "Less Common Subdomain Pairings",
"pattern": "[domain-name:value = 'hs.bouths.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--927fb907-9d4a-4e40-8865-e6a6d1e0609e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:49.000Z",
"modified": "2020-10-30T07:38:49.000Z",
"description": "Less Common Subdomain Pairings",
"pattern": "[domain-name:value = 'ohn.bouths.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d6b84255-5094-47f1-b00c-7f96e74b31a5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:49.000Z",
"modified": "2020-10-30T07:38:49.000Z",
"description": "Less Common Subdomain Pairings",
"pattern": "[domain-name:value = 'yn.bouths.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--30ee0742-9861-43bc-95d2-74e2c73736ed",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:49.000Z",
"modified": "2020-10-30T07:38:49.000Z",
"description": "Less Common Subdomain Pairings",
"pattern": "[domain-name:value = 'mn.idrivehepler.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0aeb53e8-43e7-4d86-9d8f-c24eabdd20b8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:49.000Z",
"modified": "2020-10-30T07:38:49.000Z",
"description": "Less Common Subdomain Pairings",
"pattern": "[domain-name:value = 'mn.harddagger.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a10e8c06-b76e-499d-9c4f-96350482590d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:49.000Z",
"modified": "2020-10-30T07:38:49.000Z",
"description": "Less Common Subdomain Pairings",
"pattern": "[domain-name:value = 'nv.harddagger.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a351cd4c-a1c2-4485-aad5-d1f1f6fe4c1c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:49.000Z",
"modified": "2020-10-30T07:38:49.000Z",
"description": "Less Common Subdomain Pairings",
"pattern": "[domain-name:value = 'mv.check1domains.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3dbf2098-d724-4816-8b53-9595dacf5bcf",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:49.000Z",
"modified": "2020-10-30T07:38:49.000Z",
"description": "Less Common Subdomain Pairings",
"pattern": "[domain-name:value = 'qwe.check1domains.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e0e38055-b973-4daf-ba07-5d2132ee036c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:49.000Z",
"modified": "2020-10-30T07:38:49.000Z",
"description": "Less Common Subdomain Pairings",
"pattern": "[domain-name:value = 'tt.check1domains.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--410552aa-12e6-4b34-808c-8a15eaeeaaa4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:49.000Z",
"modified": "2020-10-30T07:38:49.000Z",
"description": "Less Common Subdomain Pairings",
"pattern": "[domain-name:value = 'nv.moonshardd.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2dffd5d0-95a9-4167-a20f-efbce37cd813",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:49.000Z",
"modified": "2020-10-30T07:38:49.000Z",
"description": "Less Common Subdomain Pairings",
"pattern": "[domain-name:value = 'rd.moonshardd.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e668cb26-80fa-476f-9b95-dccc8f157733",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:49.000Z",
"modified": "2020-10-30T07:38:49.000Z",
"description": "Less Common Subdomain Pairings",
"pattern": "[domain-name:value = 'qw.chalengges.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--36faefa9-2de7-4c9c-ad3a-4d23a2414bd1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:49.000Z",
"modified": "2020-10-30T07:38:49.000Z",
"description": "Less Common Subdomain Pairings",
"pattern": "[domain-name:value = 'tasa.chalengges.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ebb228ec-865e-4a14-94cd-1d74ae55532b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:50.000Z",
"modified": "2020-10-30T07:38:50.000Z",
"description": "Less Common Subdomain Pairings",
"pattern": "[domain-name:value = 'tva.chalengges.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ea6cab36-4618-4308-9f76-bc9fd5d6c545",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:50.000Z",
"modified": "2020-10-30T07:38:50.000Z",
"description": "Less Common Subdomain Pairings",
"pattern": "[domain-name:value = 'qwer.toyotacamryy.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--98ad36bb-19fd-4fb4-b15c-7ae2211a91c7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:50.000Z",
"modified": "2020-10-30T07:38:50.000Z",
"description": "Less Common Subdomain Pairings",
"pattern": "[domain-name:value = 'te.toyotacamryy.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f4090866-08a5-4340-8573-42cf1b8eb8ba",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:50.000Z",
"modified": "2020-10-30T07:38:50.000Z",
"description": "Less Common Subdomain Pairings",
"pattern": "[domain-name:value = 'ty.toyotacamryy.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--72877c2d-4103-438e-824c-157865180902",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:50.000Z",
"modified": "2020-10-30T07:38:50.000Z",
"description": "Less Common Subdomain Pairings",
"pattern": "[domain-name:value = 'pl.reginds.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3304e7de-d1da-4dd7-a9a1-979a7c7e053e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:50.000Z",
"modified": "2020-10-30T07:38:50.000Z",
"description": "Less Common Subdomain Pairings",
"pattern": "[domain-name:value = 'un.reginds.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0d2be2f7-4e5b-4396-b2d0-dd9676b3e0f5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:38:50.000Z",
"modified": "2020-10-30T07:38:50.000Z",
"description": "Less Common Subdomain Pairings",
"pattern": "[domain-name:value = 'ys.reginds.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T07:38:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f53772f6-4e4b-4f4d-9b9d-a3886377993f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:12:43.000Z",
"modified": "2020-10-30T08:12:43.000Z",
"pattern": "[x509-certificate:hashes.SHA1 = '0684ad4cab1e7a0f7b0abb0984e5b95eb8a5b1a4']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:12:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"x509-fingerprint-sha1\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--baa84abe-4146-4f4f-986a-3b4c2faa592c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:12:43.000Z",
"modified": "2020-10-30T08:12:43.000Z",
"pattern": "[x509-certificate:hashes.SHA1 = '13373c1eaa04fcf71bd4ad098560a387fe0d6a45']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:12:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"x509-fingerprint-sha1\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9da3863e-53c5-45e2-b5e8-8f0d0f2e0c0d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:12:43.000Z",
"modified": "2020-10-30T08:12:43.000Z",
"pattern": "[x509-certificate:hashes.SHA1 = '4cd315fa97ea12b98430d3da639529e974010a17']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:12:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"x509-fingerprint-sha1\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--576076c6-f558-427f-871c-1d5e9d4020ac",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:12:43.000Z",
"modified": "2020-10-30T08:12:43.000Z",
"pattern": "[x509-certificate:hashes.SHA1 = '68d2fb8240ea91a1195777eff11b50a5873191b9']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:12:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"x509-fingerprint-sha1\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--af6a0a9f-5403-4a8b-9de0-a26b300de9b2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:12:43.000Z",
"modified": "2020-10-30T08:12:43.000Z",
"pattern": "[x509-certificate:hashes.SHA1 = '84f1b30a3897f65c4ab7a13fa01db71a00293e9d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:12:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"x509-fingerprint-sha1\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--de48181e-908e-4d42-8445-2a2dfa37baf6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:12:43.000Z",
"modified": "2020-10-30T08:12:43.000Z",
"pattern": "[x509-certificate:hashes.SHA1 = '9acd231253a98af6e43319e1d1de2fed828e09d3']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:12:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"x509-fingerprint-sha1\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a6e460ab-064c-4099-8fa8-ff496465126b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:12:43.000Z",
"modified": "2020-10-30T08:12:43.000Z",
"pattern": "[x509-certificate:hashes.SHA1 = '9fad5c0e0ef9be03767d14105f416871ccc96745']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:12:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"x509-fingerprint-sha1\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5ead3dda-2e81-46fa-8eec-56865a7e61ac",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:12:43.000Z",
"modified": "2020-10-30T08:12:43.000Z",
"pattern": "[x509-certificate:hashes.SHA1 = 'a07c36bd830e2514f169bc079817c63378a16b05']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:12:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"x509-fingerprint-sha1\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--83b1fe49-47af-4705-9362-ca671564c57e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:12:43.000Z",
"modified": "2020-10-30T08:12:43.000Z",
"pattern": "[x509-certificate:hashes.SHA1 = 'b4018842f1f8ff0e62686fea3bfe3909956ce192']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:12:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"x509-fingerprint-sha1\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--547a2b4a-1eb2-4fd1-a357-f0d2d9459c53",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:12:43.000Z",
"modified": "2020-10-30T08:12:43.000Z",
"pattern": "[x509-certificate:hashes.SHA1 = 'b47c230daebf8c94b85b1f49bf105d21fb708d29']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:12:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"x509-fingerprint-sha1\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f258f723-fa2b-489e-97ff-ab7653b15e51",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:12:43.000Z",
"modified": "2020-10-30T08:12:43.000Z",
"pattern": "[x509-certificate:hashes.SHA1 = 'bf1862fcb564e3e730eaae320e6c79c579979233']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:12:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"x509-fingerprint-sha1\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f389df0e-5d92-4e07-8ebe-42dbe36efe9c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:12:43.000Z",
"modified": "2020-10-30T08:12:43.000Z",
"pattern": "[x509-certificate:hashes.SHA1 = 'c6223becc004d859f0c63af41c88d7b76462d292']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:12:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"x509-fingerprint-sha1\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--47b240f5-3693-495c-a208-93b7cd2a4b76",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:35.000Z",
"modified": "2020-10-30T08:13:35.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'ad.cantliee.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ff964ad0-0b8c-4ebd-8aad-2fcc1fb74c9f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:35.000Z",
"modified": "2020-10-30T08:13:35.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'af.cantliee.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--aa3ccdc6-7443-45d0-b57a-3039e0a41849",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:35.000Z",
"modified": "2020-10-30T08:13:35.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'as.cantliee.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b86c3c84-4d71-48a2-9bb7-e563a6d0e02a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:35.000Z",
"modified": "2020-10-30T08:13:35.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'ad.hungrrybaby.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b7889f44-e9cf-478b-8062-7eaf815965d0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:35.000Z",
"modified": "2020-10-30T08:13:35.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'af.hungrrybaby.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9f4f70d9-f493-4571-b959-350a5050c1c0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:35.000Z",
"modified": "2020-10-30T08:13:35.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'as.hungrrybaby.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a5b30b0d-b1aa-4c56-ae8e-854032be31e7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:35.000Z",
"modified": "2020-10-30T08:13:35.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'ad.imagodd.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3e402d85-6649-4da8-a2dd-0d54392fc5f1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:35.000Z",
"modified": "2020-10-30T08:13:35.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'af.imagodd.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5e8eeda8-8f3d-4abf-9444-25991d122df7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:35.000Z",
"modified": "2020-10-30T08:13:35.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'as.imagodd.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--29e3bf99-346a-4f40-a106-7ab26fbf1b14",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:35.000Z",
"modified": "2020-10-30T08:13:35.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'ad.maybebaybe.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--cbf06367-9ff3-401e-ab0a-eb6346be4eaf",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:35.000Z",
"modified": "2020-10-30T08:13:35.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'af.maybebaybe.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--6b94de3f-e060-48b8-b8ba-2fe9531f469a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:35.000Z",
"modified": "2020-10-30T08:13:35.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'as.maybebaybe.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--37894cf8-9159-4928-a53b-950949ac7b53",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:35.000Z",
"modified": "2020-10-30T08:13:35.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'ad.raaidboss.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--be60ff22-b0f8-49a8-9486-8a7f7a8e6e3c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:35.000Z",
"modified": "2020-10-30T08:13:35.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'af.raaidboss.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--40d81876-ef8d-474e-b1b1-6398ab83a431",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:35.000Z",
"modified": "2020-10-30T08:13:35.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'as.raidbossa.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1e4e6cbc-8d53-443b-9b74-f3033a036693",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:35.000Z",
"modified": "2020-10-30T08:13:35.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'ad.saynoforbubble.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3f4de579-e03b-40c6-b4f8-c309c08ed0c0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:35.000Z",
"modified": "2020-10-30T08:13:35.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'af.saynoforbubble.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--28b771d4-b6e2-4dbf-8418-aa6b2706a8dc",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:35.000Z",
"modified": "2020-10-30T08:13:35.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'as.saynoforbubble.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c5da1e0d-1fcb-4247-b696-0a428276af4f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:35.000Z",
"modified": "2020-10-30T08:13:35.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'ad.sunofgodd.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f5de0613-fc28-4f6d-b025-2de50ceabd60",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:35.000Z",
"modified": "2020-10-30T08:13:35.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'af.sunofgodd.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7a8cb9ee-dd34-417c-8c8d-bf5684f297b4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:35.000Z",
"modified": "2020-10-30T08:13:35.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'as.sunofgodd.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f03331c7-48fe-4f1b-a89a-d5fc4d80af00",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:35.000Z",
"modified": "2020-10-30T08:13:35.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'ad.tarhungangster.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3df4a1e1-82ea-41da-92f5-bf2a0bbd3fab",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:35.000Z",
"modified": "2020-10-30T08:13:35.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'af.tarhungangster.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ecf423bc-426c-422e-a9bc-42cdc56a2110",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:35.000Z",
"modified": "2020-10-30T08:13:35.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'as.tarhungangster.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3c55a5b2-fca8-4af7-82fc-58413a5ca35f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:35.000Z",
"modified": "2020-10-30T08:13:35.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'an.idrivecheck.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c4cce24e-07c9-4b05-94a1-e2c053167ece",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:35.000Z",
"modified": "2020-10-30T08:13:35.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'mn.idrivecheck.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--fa6be0dc-10ba-42ca-acca-6d51a68367d9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:35.000Z",
"modified": "2020-10-30T08:13:35.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'nm.idrivecheck.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9e6684e7-a420-40d1-a192-e5b179fd4214",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:35.000Z",
"modified": "2020-10-30T08:13:35.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'an.idrivedownload.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ca3275a0-10bf-4eb1-a087-973ef0b94bcb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:35.000Z",
"modified": "2020-10-30T08:13:35.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'mn.idrivedownload.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--fac56ded-07f7-4090-903d-d70af2a53246",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:35.000Z",
"modified": "2020-10-30T08:13:35.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'nm.idrivedownload.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--39081399-833c-432d-853c-a3090d8d4dc2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:35.000Z",
"modified": "2020-10-30T08:13:35.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'an.idrivedwn.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--cc39f74b-3b97-43b3-a98a-0c076d64f7a1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:35.000Z",
"modified": "2020-10-30T08:13:35.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'mn.idrivedwn.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e3c72c6c-c1ed-4531-997a-7fc1f8b83ddf",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:35.000Z",
"modified": "2020-10-30T08:13:35.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'nm.idrivedwn.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8aa3b76c-83b1-4da6-bad3-364c1e2319c7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:35.000Z",
"modified": "2020-10-30T08:13:35.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'an.idrivefinder.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--adab092e-dd01-499d-b58e-e42ceb7d60d2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:35.000Z",
"modified": "2020-10-30T08:13:35.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'nm.idrivefinder.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--dba8d556-e4d2-410a-a6cf-586eae184fe7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:35.000Z",
"modified": "2020-10-30T08:13:35.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'mn.idrivefinder.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--91633569-0baf-4a30-bb64-358c82f86730",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:35.000Z",
"modified": "2020-10-30T08:13:35.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'an.idriveupdate.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e1414f2b-a6de-417c-b9e3-b9027af50e88",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:35.000Z",
"modified": "2020-10-30T08:13:35.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'nm.idriveupdate.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f0321d25-371a-4104-9d3a-486bd8864023",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:35.000Z",
"modified": "2020-10-30T08:13:35.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'mn.idriveupdate.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2dce37d3-2e3c-406a-9ab5-d84d4c3d4428",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:35.000Z",
"modified": "2020-10-30T08:13:35.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'as.ayiyas.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--29035d3f-d8f0-4581-86c9-e83357b64078",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:35.000Z",
"modified": "2020-10-30T08:13:35.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'qw.ayiyas.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1f498b54-d70c-42b4-a6d6-dbc378cb4e05",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:35.000Z",
"modified": "2020-10-30T08:13:35.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'zx.ayiyas.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--943e1000-b7ba-4460-918d-f701357684c3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:35.000Z",
"modified": "2020-10-30T08:13:35.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'as.bithunterr.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2c39abc9-6e7a-47c7-b8b3-d887fe1e7116",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:35.000Z",
"modified": "2020-10-30T08:13:35.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'qw.bithunterr.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8b62d131-8b8e-46ef-9bb3-d469937aa372",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'zx.bithunterr.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ae128ae7-0822-4733-b51b-bdbc7e036398",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'as.chainnss.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1c99be5c-a7dd-434f-8590-e698af8df024",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'qw.chainnss.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--6cd822f2-21fb-404c-8f77-04b10bc00229",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'zx.chainnss.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--55b4a0ff-26d0-44ef-a53a-193fbed78f8a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'as.giveasees.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--483db1e7-349e-4a9b-b46d-140eea2b6ee5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'qw.giveasees.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9fad4bd9-0fd9-4af4-b2c7-646d8dc51df6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'zx.giveasees.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--51a26adf-fbe4-4f71-9aae-02908402ca8e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'as.havemosts.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--124f9ccf-6639-45f7-8b61-129f4e36465f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'qw.havemosts.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1282af98-c3c5-45fd-81ab-af3c8a779880",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'zx.havemosts.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1a17ec2f-d2de-4bf9-baa1-428a0108c195",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'as.lindasak.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--6fbeee56-250c-45cb-91df-edf160abe828",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'qw.lindasak.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c3b5e848-4ac9-4cec-87b9-6c452d732ad3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'zx.lindasak.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--67b7dec0-893f-4204-834e-ef9d0230d45b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'as.loockfinderrs.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0fa39974-e9f6-464e-b65a-e9952b710c6a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'qw.loockfinderrs.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--6e0bfab4-696e-4d35-a448-ac472c0d48fd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'zx.loockfinderrs.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--075a4cc8-c45c-455f-8ce0-0626cc2ca2b8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'as.mountasd.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e83931df-921b-43b9-ab82-e6f5711aa8e4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'qw.mountasd.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--80b58a77-a699-4018-b0f6-aa319287d841",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'zx.mountasd.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--60bdd54e-25a8-4525-b766-3bc7890724bd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'as.puckhunterrr.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8e09d384-12dd-45a7-83ea-5a5323538849",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'qw.puckhunterrr.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--68374fd6-d4f3-48b8-8940-9541e72dcfa7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'zx.puckhunterrr.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--aef6e6a4-b46c-4052-a332-7111b1790071",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'qw.raidbossa.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5fefac5b-1a26-4768-926b-fd7d6acd21d0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'zx.raidbossa.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--04706cd7-5cc2-4aec-b58f-e1175b264a10",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'as.rapirasa.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e5f6efa7-1ed6-4f27-ae43-0d80cea155d1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'qw.rapirasa.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--65dea4f8-3d75-4f9b-a9b8-2f700f729c2c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'zx.rapirasa.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--afa03e80-3c53-43ee-93c3-60403b7e9cb5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'as.serviceboosterr.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--48e5002a-8537-4fe5-a2c5-5ae8a1199351",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'qw.serviceboosterr.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8b15f06d-d26b-4894-9c2b-2d37a00ca135",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'zx.serviceboosterr.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1fe74af2-21ce-4178-950b-d1b7f1f6465e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'as.servicemount.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1242cd21-1499-4019-aa19-23514930741d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'qw.servicemount.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e073bfb0-a049-4ea3-8e9e-e50ce5410dce",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'zx.servicemount.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3e48c676-87c3-4652-9c72-0600ac303b24",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'as.serviceupdatter.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5feae022-0583-4ed6-bca5-4cd8970fad14",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'qw.serviceupdatter.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--665179fb-5237-4996-8d56-1fc35091923f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'zx.serviceupdatter.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1b230e00-45b1-43e5-9d42-53055806a644",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'as.servicewikii.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4e0a416a-50a2-41a2-adb3-42e713489b8f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'qw.servicewikii.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1d5aa17a-e809-49c3-b633-951c90003a9f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'zx.servicewikii.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--05d632a7-b1d2-4685-b416-1778613cfba5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'as.sibalsakie.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--473fa15f-360f-43ae-bd6a-9c31b49c8e68",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'qw.sibalsakie.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3645c172-c292-4368-9643-6b252cee1257",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'zx.sibalsakie.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d21048f9-2e2c-444e-aafd-473c46b26ec4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'as.shabihere.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4af5d025-269b-4298-a13d-00588707a71d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'nm.shabihere.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f4f0bd51-d065-4cd6-aaf4-8bd1b82e7ce5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'sm.shabihere.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1ba8521f-0e89-46d8-a991-3f75fd0e015d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'as.tiancaii.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f075191a-e863-43d8-9bb2-f1f640422f06",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'qw.tiancaii.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--81c12345-d963-4c76-8987-9b9fd296a309",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'zx.tiancaii.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a534ac2b-7ddf-4639-8648-bc3dba854d72",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'as.voiddas.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--efa2a49d-bef6-462d-b481-fbc88edc05af",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'qw.voiddas.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--28dfe41e-37d7-4ecc-b7ea-be2e0c72411c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'zx.voiddas.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f334e275-65ec-4c04-b537-e53379fef535",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'bn.chekingking.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--61988f14-72cb-49d5-b71f-57a460e9aa7e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'gh.chekingking.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--04145b55-019d-4d6f-afe5-925b37158fcb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'ty.chekingking.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--70e5fbb9-9818-47ba-b256-f3f38e4170c0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'bn.jonsonsbabyy.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ed59cb9b-0c69-4481-8285-3071d8cc0b25",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'gh.jonsonsbabyy.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d9a80c4e-d479-4134-941c-41b47a8d805e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'ty.jonsonsbabyy.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--23671ff8-f711-448c-9a22-d0ee4c53510b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'bn.loxliver.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--67db0811-0a9f-4b29-8207-6c2437d5d5e6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'gh.loxliver.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d26eef13-27ab-4dd1-975d-77cdf75592c6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'ty.loxliver.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5be3bcf0-03c2-4e13-8934-2e441ee4cb51",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'bn.martahzz.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e873c894-bdf3-4f15-badc-df0fe552d37c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'gh.martahzz.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--bd9b2dd8-8723-4f38-acc5-b03db726c673",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'ty.martahzz.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0053eef9-d437-4b9e-b834-e28ed2f804d5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'bn.realgamess.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--883c34b2-e7c4-477d-941c-1a1115f6bb71",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'gh.realgamess.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f2a055dd-2a84-4d95-99cd-eef573fa5134",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'ty.realgamess.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d1de6e94-d388-492e-8f90-8e1168fdeafa",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'bn.servicegungster.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d26d6450-4f1f-48da-a8dc-0cb5cc66339b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'gh.servicegungster.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f1e9646c-5240-402c-a28f-4266c48dd6e7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:36.000Z",
"modified": "2020-10-30T08:13:36.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'ty.servicegungster.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--01af9203-2a60-4cb8-b72b-905e0a3b5ee5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'bn.wondergodst.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d9e61e6a-0f25-4e4d-b2f8-329e1037aa49",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'gh.wondergodst.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e63f987b-4248-4814-8e68-6667e1d43cef",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'ty.wondergodst.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8575a3b7-823b-430b-87b1-1ccdd78d0f3d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'bn.zetrexx.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2639130e-2748-4eb6-8bec-f45b86cb6470",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'gh.zetrexx.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8e21e7da-790d-424a-8afb-609653b003d1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'ty.zetrexx.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5e9c8341-24e1-4522-95b4-87f379ae457e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'bn.zhameharden.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ba27dc70-f8c0-4999-8a43-5cadec6411a3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'gh.zhameharden.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2c8d0b84-8cd7-49da-a48b-c6d6da430eaa",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'ty.zhameharden.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--fd800e1f-eb59-4bfc-8337-d9e72a6cdfef",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'bv.backup1services.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--08489cc5-6d5c-4c9b-9a2f-14750957a95d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'gf.backup1services.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f906b453-4d6d-4706-a046-4cc3b954ba47",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'tr.backup1services.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b5ee1de0-94a4-4fdb-bb78-a9bc6a14c890",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'bv.backupmaster-service.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--aecbbbd4-1257-4067-8dc5-8be4136281d9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'gf.backupmaster-service.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8724a1aa-943b-40ff-86b9-4ca5c7d7a1ec",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'tr.backupmaster-service.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f181f1d9-fff3-4688-b6e4-8d84db72558a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'bv.backupmasterservice.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f3422730-966d-4129-9a32-de5fe08c2e37",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'gf.backupmasterservice.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ad412593-3a56-459a-953a-344bc0426abc",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'tr.backupmasterservice.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b382511d-15c8-478b-9d6f-ad7d8296a8c3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'bv.simple-backupbooster.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f29c1079-29b7-4381-ab49-5b0fa4563fe2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'gf.simple-backupbooster.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--502531c8-7dbe-42d9-bcf1-14b8cd98d67f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'tr.simple-backupbooster.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ecdeed69-b119-4f1a-904c-68c885c6ccec",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'bv.top3-services.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8fadb0d4-9a3a-4f41-840e-2166080c086f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'gf.top3-services.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c7ca6976-2d6e-457e-8d0d-93804111cf71",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'tr.top3-services.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--cda14ca5-af0e-440c-b5ba-77fc94982e69",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'bv.topbackup-helper.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--af10b7c7-431d-4c39-92fd-5fa9ec897faf",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'gf.topbackup-helper.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--36b3c11d-4825-498b-87db-816b2400ca3d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'tr.topbackup-helper.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7b237f58-b13c-4a9c-97be-e35ffa69881e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'bv.topbackupintheworld.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f5e4adc9-2cf9-44b1-ada4-3a6dc0b954c8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'gf.topbackupintheworld.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--35b6feb7-d983-48cc-83e1-ff4ea7169d71",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'tr.topbackupintheworld.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--90e7b7d6-2fc5-447e-a87e-08bba3918f85",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'bv.topservice-masters.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--05035135-ea33-42b2-bb12-ea174b206403",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'gf.topservice-masters.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3ab2f9cd-1f4c-4fbe-8f0d-c7e08c350f09",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'tr.topservice-masters.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--29dbfcb1-a550-4a8b-b48b-705550774e76",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'bv.topservicebooster.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5ea3bc25-b6f4-4260-8f28-c82a32d3a2a0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'gf.topservicebooster.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--40c3a2b4-8680-4efe-857a-528de382814f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'tr.topservicebooster.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--16532aa5-331c-4f39-a6cf-637854d434c7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'cv.bugsbunnyy.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7336f89a-8705-42ce-837f-1155c9d7b44f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'df.bugsbunnyy.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9e0497e7-3d23-4c21-a0ce-dbfec579dbe9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'er.bugsbunnyy.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--eca175c7-477b-40cc-87d0-45da6e6fcaaf",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'cv.mixunderax.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d65ee8a5-1728-4d91-a01a-cdda8bf91f23",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'df.mixunderax.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--65a2bdc2-3c35-4424-a876-bdd00cd8c93f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'er.mixunderax.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58200074-00f6-4fbf-a5ba-f6fb9dc6a92c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'cv.qascker.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f7d7cc8b-f8de-4624-9b07-d21cf7259079",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'df.qascker.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--31d40fd7-6ce6-4e58-8f4a-76ec3c35b02e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'er.qascker.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0a68d01e-2dd8-4440-9cc1-9aa6c50ad6bc",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'cv.sweetmonsterr.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--babedccb-a76d-4a03-886f-6e60a2cacb5e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'df.sweetmonsterr.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--329bc61c-e575-48e9-b583-07e369f29f58",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'er.sweetmonsterr.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f99d45ed-6b8c-4733-afea-005c560c7bff",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'cv.wodemayaa.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c3babb5b-b413-4b25-bb85-f0377d423db7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'df.wodemayaa.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--09d6eaa4-1888-43f8-896f-3bec781e0541",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'er.wodemayaa.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--6e523ad4-0b68-463d-ade4-82b29aad2e88",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'fg.cheapshhot.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7a10f783-320a-453a-871d-4d88c8111daa",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'vb.cheapshhot.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0ba646f0-02cb-4633-81e6-410b2696624a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'fg.gungameon.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--bec4b36a-3ce1-49fe-b4bc-b97124cca47e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'rt.gungameon.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a2715236-1d52-4f3a-8e36-73806b779fed",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'vb.gungameon.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f06745cf-a0b5-48a0-8d96-878a015599f0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'fg.gunsdrag.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--04c2c7ca-30af-4e03-9a5a-8dbe248668d0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'rt.gunsdrag.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--86c5bff7-477e-4da9-b4a1-a1d44d1f81ca",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'vb.gunsdrag.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4847ec30-4f53-4b19-8408-44e816491a43",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'fg.hybriqdjs.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d96b9837-842b-46bf-aa96-86a51e47cdca",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'rt.hybriqdjs.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--343c0c05-315d-4d1c-9dae-788108dea0ad",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'vb.hybriqdjs.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4075c448-8392-4ecf-b17f-d002868ae0d5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'fg.luckyhunterrs.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7762bc38-a6bf-457b-97a8-0a5863b3a01f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'rt.luckyhunterrs.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--97c21d86-a8a9-46af-bda2-5a3afed3aa39",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'vb.luckyhunterrs.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c4ccc306-740e-45b2-beca-25249a9db638",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'fg.quwasd.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--15cf26ab-c2c7-48e5-9ca7-fc5e08e288a4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'rt.quwasd.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4fd03574-8a04-41ef-90fa-08d7c33be726",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'vb.quwasd.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--44dde33b-8a63-45a9-9752-7757b7e161d0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'fg.remotessa.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a6fb75da-98ea-4f63-9edc-5ef7a58ce5e6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'rt.remotessa.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--bfb49304-bab5-465a-90f8-18c395566085",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'vb.remotessa.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7422a969-383b-426d-9bf4-25aaef2ade9a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'fg.secondlivve.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b386587f-020f-4444-bd69-5c382052e43d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:37.000Z",
"modified": "2020-10-30T08:13:37.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'rt.secondlivve.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--aae03945-d37f-492f-843b-a52ed9e8b82a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'vb.secondlivve.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7088652f-541a-4609-9d6c-c65f6f31c066",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'fg.sobcase.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1953f225-df30-4b24-a9a2-917466edfe61",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'rt.sobcase.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--93e4ce38-97e0-4dab-9c9c-01e906630a4e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'vb.sobcase.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--252296d6-0a35-44d2-9d9a-a4695900085b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'fg.unlockwsa.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--82948f4c-8f24-477d-9454-26c9e09171d1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'rt.unlockwsa.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d3fce3d8-5668-4d98-ad54-84c4cad0e4e4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'vb.unlockwsa.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e49699df-ceab-4402-bae3-d847f798e146",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'hg.backups1helper.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b3bf090b-987d-4fd8-aad9-4ac8a3bd07ae",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'nb.backups1helper.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ed5a5d98-b84d-4956-9bdf-0fe7a1942317",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'yt.backups1helper.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--46127a4b-0f87-4dd3-b21d-9608b2132a2f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'hg.driver-boosters.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8579e91a-49f4-4d30-9470-61d96287dbd2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'nb.driver-boosters.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--20d561a8-6174-40cc-978f-4559b59a3af0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'yt.driver-boosters.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8d0540de-2449-40b5-b7a4-5f82a4d030c1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'hg.driver1downloads.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--43fe4f9d-21a2-4eab-982c-35063e1cdc4a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'nb.driver1downloads.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--852c0b21-020e-4af6-bf9b-144cc8ff0169",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'yt.driver1downloads.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2bb5b698-3e83-4534-bfb9-712be0f79827",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'hg.driverjumper.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7743d3da-4b1f-4882-b0ce-b420483fdf8b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'nb.driverjumper.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a1ea2887-8dd1-402e-a26f-6d01a1837425",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'yt.driverjumper.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2472f179-de92-4d29-8689-ef542330adf2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'hg.service-hel.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--fd3b068e-af7e-45d5-995b-ec9320c592c1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'nb.service-hel.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--693e5fbc-a928-4762-8d89-b9b40a6ffb33",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'yt.service-hel.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--535b0e96-ea61-4de7-8bd1-c557d7760ea2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'hg.service1update.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1d85242b-440e-444f-9d27-5d6fff1963d1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'nb.service1update.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4538b840-019d-421e-a878-5e378dbb7323",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'yt.service1update.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--54ffbf0d-19a4-4378-8801-68e334507788",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'hg.service1view.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--39246bc1-7625-4e67-90ab-41e05ad35a9a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'nb.service1view.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--89d7acf0-153b-474e-b5a4-7d20e1ec1733",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'yt.service1view.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--70c3808b-2d68-42c9-af29-b67479bf7611",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'hg.servicehel.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--32e20e50-8cee-4ee7-bf17-949759ed055a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'nb.servicehel.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--23922432-7036-4909-980a-1ebc15d911e1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'yt.servicehel.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9d209746-ece9-490e-9013-da712c8079fb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'hg.servicereader.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--caa580c5-ea95-45d6-9484-b6c376d55f5e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'nb.servicereader.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ddd5c3ba-9730-419e-8c76-37954ed1f651",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'yt.servicereader.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--482f52ae-a552-48e7-9212-11fe105a6e70",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'hg.top3servicebooster.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--951c4df3-7bb0-46a3-90f5-eba0c70ac8ef",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'nb.top3servicebooster.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--cf1b1e74-0acd-408d-bc17-6e219c111257",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'yt.top3servicebooster.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--30d20b4b-7956-4dc8-b356-7fd4f63c19c7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'hg.view-backup.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f7d43580-94b9-4d46-92d4-d9d27258db44",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'nb.view-backup.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--bd77dc73-7750-42e6-975b-e57f102b1813",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'yt.view-backup.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--dc6d1e87-c191-4790-8bcc-6e79c8d28136",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'jh.best-backup.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--88214a6d-8d44-4fad-a703-9ac162236468",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'mn.best-backup.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5c73b189-38d8-428e-b44f-1f7b6e7a94dd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'uy.best-backup.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0b0aef8e-be9b-4e91-b01a-4781b90595be",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'jh.best-nas.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--af647f92-c1b6-4bd7-a889-b1c8a58ce3d2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'mn.best-nas.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0e6b8f7a-52b2-4c3e-b4f2-ee72dc221c2c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'uy.best-nas.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--aaeb8272-c8a0-484a-a682-628ed3e6e184",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'jh.bestservicehelper.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3450be9f-3b1d-4853-b373-a39f8f5c2646",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'mn.bestservicehelper.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ced1e7c9-9294-40e6-be76-20bd66e8113b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'uy.bestservicehelper.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c7486bc1-4bf8-4168-a964-d94bd466dcd0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'jh.top-backuphelper.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--dacac55d-811e-49af-8158-cb422ec21ba0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'mn.top-backuphelper.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--72d4f1ef-d0e6-434b-8b56-94bb0155f71e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'uy.top-backuphelper.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f8acb3a8-5e24-4c74-af2c-690771852af6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'jh.top-backupservice.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--70f2728e-e1ad-4b7e-b8de-bc894c225e82",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'mn.top-backupservice.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7fb187f8-211e-422a-9f22-e36fac615ee7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'uy.top-backupservice.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0136717b-1b52-4d0d-a3fd-8202c5c9c2bb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'mn.backup-helper.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--dfa4412d-3a95-4a70-8289-22900b8bcefc",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'nm.backup-helper.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e4846c02-5493-44f4-b838-bbe04895dfb7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'ws.backup-helper.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f7d04dbf-68d3-4cdd-925e-bf4502a8bce8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'mn.backup-leader.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--31f8c640-d970-4631-a0de-9287266d3f0c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'nm.backup-leader.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b173d53c-c6c4-48f3-b43c-af4724505ab9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'ws.backup-leader.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a02e4db9-2fa3-4f52-a2c5-964470edbefe",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'mn.backup-simple.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--474fd1a4-a43a-4f3c-bfa5-b6ab250f82b7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'nm.backup-simple.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7be68d76-176e-4fdb-b16c-788138ebcc26",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'ws.backup-simple.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--fd4fd1ec-d805-41de-a500-944ddbceae71",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'mn.bakcup-checker.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9c69988d-3594-4649-9307-4337027e981f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'nm.bakcup-checker.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d9dc2a7b-6b8a-4cc1-8dde-a98a1619c1f3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:38.000Z",
"modified": "2020-10-30T08:13:38.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'ws.bakcup-checker.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--eda1aeee-fce4-4d94-864c-9f6f73a867aa",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'mn.bakcup-monster.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2a88fdac-c56d-4dd8-961f-5e5766b3186d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'nm.bakcup-monster.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1d6011c4-22c8-4090-b0ab-6d8cb577c849",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'ws.bakcup-monster.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8ae15166-cbb5-45e9-baf2-fb330d70bc81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'mn.boost-servicess.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ec7cc9b8-2fd0-48be-b9df-3c32c410b365",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'nm.boost-servicess.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9ccbe931-cdef-4eca-8110-aa6d201ccc77",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'ws.boost-servicess.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--32b05abe-3c7a-44ee-903d-6a520d5efafa",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'mn.nas-leader.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c2175d5f-a057-4d36-b362-61f24daabb7a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'nm.nas-leader.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8e62d86c-5c72-47b5-bb4f-2f8d039c8719",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'ws.nas-leader.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d861c76e-222f-4de2-839c-4f4340ea0e39",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'mn.nas-simple-helper.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--6250a9d3-582a-41f2-b50f-b10150c48ccf",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'nm.nas-simple-helper.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b3c9ecaf-a53f-4875-b285-0d96ab9626b2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'ws.nas-simple-helper.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f7559952-870e-455c-bf16-fdd0522427b0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'mn.service-checker.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a4c5a2ee-84d3-4cc6-bfb2-21ddf0849f35",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'nm.service-checker.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d2ee928c-1da5-4ff3-aab7-d3fcdc1a4f85",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'ws.service-checker.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d77691bc-dce8-4838-a94b-4d7b9d9b6e73",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'mn.service-leader.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5df066fe-9159-410c-bcf7-ad25baf2ea73",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'nm.service-leader.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--00a7c285-2067-4d9e-b698-329377a0d653",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'ws.service-leader.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d3429c37-781a-4dd3-89db-f643e16489e8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'mn.backup1helper.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--284f938e-10b0-4240-a855-050ab5c52ef3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'nm.backup1helper.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f4330632-7dc1-47b3-850a-a8230a86b79e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'rf.backup1helper.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--54148e00-a523-4c0c-9803-2c8b857a17b1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'mn.backup1master.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4ea20129-4aa2-47b3-9228-ff229cfa993e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'nm.backup1master.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9d23c075-1251-482d-baee-85ada35c9b5b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'rf.backup1master.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--88bf3280-ee48-435c-9cdd-9efd3d675bc7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'mn.boost-yourservice.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5d85bacb-f0f4-4ce5-9264-2e8a6eee1652",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'nm.boost-yourservice.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--91e42527-8643-4a15-b6fa-50176ab7c9b0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'rf.boost-yourservice.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--55ccd03e-9c13-4a2c-a5b4-48d6a55a9b95",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'mn.checktodrivers.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--40b184cb-7663-42aa-b78a-ec121555013c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'nm.checktodrivers.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--46d7588f-2dcb-45c2-a279-4bd75b3c3b0b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'rf.checktodrivers.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--fb1ce8f8-9909-41be-9584-79064e070fed",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'mn.driver1master.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a04bc8a0-b3c3-4612-9288-58e81c4d8355",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'nm.driver1master.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--101aecf3-ab05-4c67-8bcd-e681c2c0c634",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'rf.driver1master.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4b747d3a-ee11-4e28-b2e1-94ed973509be",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'mn.driver1updater.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--82d015f4-a21d-443b-a609-ef83d2e25ccd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'nm.driver1updater.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f32158c7-3fc8-49f0-a962-85c16895dbb4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'rf.driver1updater.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4c647ee1-64b9-442e-a77f-2d8cf9786b26",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'mn.driverdwl.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e7bcde05-21bf-4d3f-b14a-dfb84c291084",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'nm.driverdwl.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--6bea282a-54c2-40cf-a2f9-5d9c2b22d7dd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'rf.driverdwl.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--afd6912b-3484-4ea9-a6a9-4fdf28cb3158",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'mn.service1updater.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ec234240-c7a9-4535-b646-8e074dbbb800",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'nm.service1updater.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d5eb7209-d293-45a5-998d-8cac1951174f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'rf.service1updater.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7c311194-bcbb-44ff-9c06-a1425545fa15",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'mn.viewdrivers.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7a4d70d1-469e-4dd1-b6e5-e45a072ccc63",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'nm.viewdrivers.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e58c0648-bb27-419c-9976-4d9576de1cba",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'rf.viewdrivers.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ae834617-91b5-48ad-a036-c72589068944",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'mn.regbed.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e1d62bf4-7fd6-4531-a13c-9496aee31df2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'nm.regbed.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d5369813-8387-489d-9f27-40f633a90eb1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'tt.regbed.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--6d594cc2-a1d0-4e94-bbf9-a8f15124e963",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'ns1.regbed.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1e2a86b5-7ebf-464f-8986-07d99191addd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'ns2.regbed.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9e90999e-1746-45b4-899c-0ed91f249bfb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'ns3.regbed.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3a7a1d8e-3ee1-4677-92b7-2b168e312a0e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'mn.serviceswork.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7b41ca1b-a163-416f-b3af-deabeb4ef07f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'nm.serviceswork.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--753b5b14-6609-44c6-9c26-372ebb6e9376",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'tt.serviceswork.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1120d4a3-73bc-4db8-8ef4-5831277385cf",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'mn.vnuret.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--12e82dfd-c1bb-4315-b968-101436fdbc89",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'nm.vnuret.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--dfba97d8-dc36-481c-8081-8f5f9b26dd70",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'tt.vnuret.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--347b6568-c826-4ad0-a3ea-f22bdf0d1775",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'mn.fastbloodhunter.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c6a7f0d3-db60-4e60-bdfc-8e162d90a1d7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'nv.fastbloodhunter.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--73506f1c-cde9-410d-98fe-c1f81e63b87a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'qw.fastbloodhunter.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--6046b486-39f8-4939-b8b8-d517a0657d12",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'mn.caonimas.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--dce27e05-9eee-4051-b1d8-2c974d9a5c3f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'nv.caonimas.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3b68eabe-c8a2-43cb-a059-481a8ee6da69",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'qw.caonimas.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1d869b9c-e2bc-4b85-87f0-32cafa6d9d6b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'mn.nomadfunclub.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--034b84f4-18c4-44fa-bbb4-45a4a0966abc",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'nv.nomadfunclub.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--89910d17-ab37-4ef6-9c4f-e6fa03021629",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'qw.nomadfunclub.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c95f0b95-b2ca-4902-ab2c-006b119f164e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'mn.razorses.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d9b3fcaa-add9-4064-b118-8c15d1d4f544",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'nv.razorses.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--61ff0baf-0c19-46b9-8d5c-6adb34f9bed1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'qw.razorses.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2f5ea08b-29b0-4baf-b083-ea89f6a72177",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'sd.backup1service.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1b7998b7-3724-4ced-93ad-2bf684b74c24",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'xc.backup1service.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d08043a0-b2de-4c11-b987-3f29d653e78a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'we.backup1service.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7a5bd8b1-8a48-4728-8913-cca0bb8c1c37",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'sd.elephantdrrive.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--aad0927c-115d-4424-8220-384edf90118c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'xc.elephantdrrive.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--849f7b63-d899-43d2-a0a3-a650a2b62ebe",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'we.elephantdrrive.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--450a8cb8-3805-4af9-9c38-ca28d68bd1df",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'sd.nasmastrservice.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--640fb10a-5786-4eaa-9954-97a042e711b5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'xc.nasmastrservice.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--def6728a-b08f-4fe6-bbb9-ccde0ee75b8a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'we.nasmastrservice.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--10a44540-2ac2-454f-b97d-fda1e0607792",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'sd.service-hellper.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a765235f-b566-42eb-ae29-be94bb9ad842",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'xc.service-hellper.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--27574dbf-1302-49f6-9360-0785840d4a4b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:13:39.000Z",
"modified": "2020-10-30T08:13:39.000Z",
"description": "Common Subdomain Pairings:",
"pattern": "[domain-name:value = 'we.service-hellper.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:13:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--62ec0c04-da00-4dc1-85aa-888b8866ec16",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:05.000Z",
"modified": "2020-10-30T08:14:05.000Z",
"pattern": "[file:hashes.SHA256 = '01ad70e688a4eb070e90538728de699efbaa6bbfeaa728976053384587e45d18']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--81c28e98-9c62-4ae9-9909-37d64728c28a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:05.000Z",
"modified": "2020-10-30T08:14:05.000Z",
"pattern": "[file:hashes.SHA256 = '032a087b0f7c722a64bbced9612e84bb0a7f1872a8b94406ca49827d56aa466d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e47cdf96-2f8e-4c55-acf0-5e98f1dc51db",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:05.000Z",
"modified": "2020-10-30T08:14:05.000Z",
"pattern": "[file:hashes.SHA256 = '04a4a9ff0af9fde923fb8203c89be6a57a3c42a517c9d9a047fb7d4b20e24a9f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c494b3f4-b64b-462b-bc83-208415420168",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:05.000Z",
"modified": "2020-10-30T08:14:05.000Z",
"pattern": "[file:hashes.SHA256 = '062fc14064495f558e1192b675c1f0eeeb87c5ced5c01f81a38fc6b2591508d6']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--dee40d99-b6ad-4da8-a40a-5b7fcad243bf",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:05.000Z",
"modified": "2020-10-30T08:14:05.000Z",
"pattern": "[file:hashes.SHA256 = '0856b3c06805d3935b1db325c4e9c9131572b4cf09f07d989911495807775cab']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--24670c34-ba21-4807-8a90-ed5ae82a1e53",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:05.000Z",
"modified": "2020-10-30T08:14:05.000Z",
"pattern": "[file:hashes.SHA256 = '087d2b51bec315fdbd938405c9cdcdf63f0d0bda42c7db89062ef3cccc45b525']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8a8644a6-b8ba-4147-9575-b8cee0b27e50",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:05.000Z",
"modified": "2020-10-30T08:14:05.000Z",
"pattern": "[file:hashes.SHA256 = '093ac1213b112c7eb7c46000f04160af37339ce0d6fff514f0941f2b5ab48829']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4f58a54a-70bd-4909-a347-31acb2d5706d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:05.000Z",
"modified": "2020-10-30T08:14:05.000Z",
"pattern": "[file:hashes.SHA256 = '0e464ad7bde50e55aa42dac985295e22deb78c1a48809563f18cd4a6f47a104a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c028bd4d-69ca-48a7-a6d8-83e9f14dde0f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:05.000Z",
"modified": "2020-10-30T08:14:05.000Z",
"pattern": "[file:hashes.SHA256 = '10f0cb6dc3bb42145482fd3b353b11626283edd62b6a6a6b1505927d6d71a914']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c9cee02c-3e29-4515-916a-3f31bf58126c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:05.000Z",
"modified": "2020-10-30T08:14:05.000Z",
"pattern": "[file:hashes.SHA256 = '118611de57551faa4b7c029e50317cd6f596275725f61a9f9a11fb59e1ad70df']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0b411a58-444d-40fd-aad5-73c145cecedd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:05.000Z",
"modified": "2020-10-30T08:14:05.000Z",
"pattern": "[file:hashes.SHA256 = '11d2e042f172811cd155e07a8f7a3830e590997b87be68cd9b076477bbc98dcd']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--922434aa-d603-4d22-b1dc-a39128d350e2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:05.000Z",
"modified": "2020-10-30T08:14:05.000Z",
"pattern": "[file:hashes.SHA256 = '151983eab306e5fcd22b110cf36ddc2357564d40399d08ce8a70d7f78b0bfbbf']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--409f5ab8-7060-4b72-a10b-0b0be19048c5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:05.000Z",
"modified": "2020-10-30T08:14:05.000Z",
"pattern": "[file:hashes.SHA256 = '15305978d7c42e26d908feca9aed4efa3df89ae6524ecce10752a2ee3cdf813f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--16b6045f-ca74-4d51-9682-5d0c85c997e5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:05.000Z",
"modified": "2020-10-30T08:14:05.000Z",
"pattern": "[file:hashes.SHA256 = '15fcb756a05b69518be5e32b98b25f398e999d4ec971364fe01f9dd0f78747e3']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--94ba7e87-0654-4786-901e-4b5050d008a4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:05.000Z",
"modified": "2020-10-30T08:14:05.000Z",
"pattern": "[file:hashes.SHA256 = '1925d5e283a220497385b4d8ca268665c729d1e029692e23431c327a8378fe23']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--75545163-91fc-4343-ad1f-e10adb036ebb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:05.000Z",
"modified": "2020-10-30T08:14:05.000Z",
"pattern": "[file:hashes.SHA256 = '1bc061bbde8e89345da6461916fc70a4b2b50126ba25f553e15fa692bc22e92e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--806ab885-8301-4b80-9ca7-f9c354c83aee",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:05.000Z",
"modified": "2020-10-30T08:14:05.000Z",
"pattern": "[file:hashes.SHA256 = '1c05380af47696f7d7ef84b452fa4f662158d9f1caf7ad01a455061081d13653']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--83206646-17e8-483e-be8f-52ab24e1a762",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:05.000Z",
"modified": "2020-10-30T08:14:05.000Z",
"pattern": "[file:hashes.SHA256 = '1c1397233114820f366607896cb9f3d3d412270e79947ce1558fc8db7dcbb602']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--43a645e6-8d10-49d7-af46-d3db385f580b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:05.000Z",
"modified": "2020-10-30T08:14:05.000Z",
"pattern": "[file:hashes.SHA256 = '1dae20a13c71c11f3c2a2010d2577cd2b3601c1092a980c1305991681b178c46']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5633c5dc-9e1d-411a-a39f-68bc8bbfe085",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:05.000Z",
"modified": "2020-10-30T08:14:05.000Z",
"pattern": "[file:hashes.SHA256 = '1f9194a46385dfef7bd1098b3c5da2b8f2d2552c9c1d1b6bf3f7313ee970b9a4']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4f789fc6-874c-4735-bc32-f725ee9d7c57",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:05.000Z",
"modified": "2020-10-30T08:14:05.000Z",
"pattern": "[file:hashes.SHA256 = '21ead6c4722d06207332710f2dff6005bc5095034cffa7f60e57a77f651efa1c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8e19dcd3-9808-4ded-8432-b52ddaf1101e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:05.000Z",
"modified": "2020-10-30T08:14:05.000Z",
"pattern": "[file:hashes.SHA256 = '22caa1e9f4b2e88b7bcd633e4e12104f4d3556c05fc4db1ee6b620a9d5fa6213']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--cacaf83b-10e9-4856-9902-0bd095721c7b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:05.000Z",
"modified": "2020-10-30T08:14:05.000Z",
"pattern": "[file:hashes.SHA256 = '2376a8da650c124b3d916765f82929b4109f20bc4f211a39a4d1cd4391780d1f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c0e12e85-32c6-4a6a-9b52-cf9671c62617",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:05.000Z",
"modified": "2020-10-30T08:14:05.000Z",
"pattern": "[file:hashes.SHA256 = '243408d1fa0c8a7a778d8bb224532c649409d0db76fc0ca2be385d193da22b1e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e0553fb9-6462-4ac2-ab4a-1a825ac18136",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:05.000Z",
"modified": "2020-10-30T08:14:05.000Z",
"pattern": "[file:hashes.SHA256 = '24e8413c8743a2349be66e1df415f8e8c8326b3e9fb8b4f158f8fde4409626af']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--95c5628f-e67b-48f6-b26e-e32adac74471",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:05.000Z",
"modified": "2020-10-30T08:14:05.000Z",
"pattern": "[file:hashes.SHA256 = '25f051fad96d0996708561ce734bb836c4a576f8cb4d6f96927975a08eff9e19']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a56e7b9a-6a64-4708-bbfc-44c111e115d3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:05.000Z",
"modified": "2020-10-30T08:14:05.000Z",
"pattern": "[file:hashes.SHA256 = '2788d54e094014cd18ec11263659c344330b55ff3b0a14941215f14557b77777']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ca88066c-e340-4d99-a842-9d650de470e8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:05.000Z",
"modified": "2020-10-30T08:14:05.000Z",
"pattern": "[file:hashes.SHA256 = '2a2e39586e7232a3339d52453b477454bc44b6305c711dd9eb5ecf4394c55b10']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ea41d209-cce8-44dc-8c94-cb3fae306e0a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:05.000Z",
"modified": "2020-10-30T08:14:05.000Z",
"pattern": "[file:hashes.SHA256 = '2af2ab80575400c191925d15f83726718655b8adad1c7bd02e4abe21d1004b95']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--64b11585-1f77-427e-a13f-39c037bc8d10",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:05.000Z",
"modified": "2020-10-30T08:14:05.000Z",
"pattern": "[file:hashes.SHA256 = '2cd01dab44247dee9c0f9511b3b1d11d5a69afcc87efc59446238021d5343aad']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c2b9f441-77cc-45f1-a015-a4c29b104579",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:05.000Z",
"modified": "2020-10-30T08:14:05.000Z",
"pattern": "[file:hashes.SHA256 = '2dcb2f1fe7fc145529c31328c150cd9a00a8b02e57a69f09211db334f78fe784']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--038c50ee-f385-478d-940e-b74839e588c8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:05.000Z",
"modified": "2020-10-30T08:14:05.000Z",
"pattern": "[file:hashes.SHA256 = '2facd367c1299ef200934cfd06279f177f9e3145164e4bd595e2b94a403a1b02']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--96ba111a-e1ee-48ae-83ed-9b833c578177",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:05.000Z",
"modified": "2020-10-30T08:14:05.000Z",
"pattern": "[file:hashes.SHA256 = '31045ab2d2e8f7074e2d0f312b4b79387a6794c4455100d501f6c5ea220ad207']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--73bf19f1-bf70-484a-ba60-1884edab5382",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:05.000Z",
"modified": "2020-10-30T08:14:05.000Z",
"pattern": "[file:hashes.SHA256 = '31e9c92d7dce8b65dded9c40e67d9cfca33bf8870d460e73b02df8a035ca719f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--aa39546c-4008-43b9-ac90-593124041e34",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:05.000Z",
"modified": "2020-10-30T08:14:05.000Z",
"pattern": "[file:hashes.SHA256 = '32839e342815cda42bef871d999d76db91dd465972a2b39d4e29fb367a57cfd5']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7e6ea32e-92b8-4d46-86f4-9e49c739d13c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:05.000Z",
"modified": "2020-10-30T08:14:05.000Z",
"pattern": "[file:hashes.SHA256 = '328456cc7c585d290ba0543f6183afb0f8e31a1cfd24019644ea6471129bad9d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--975fb8d1-6215-4c44-862a-65583b67b3e6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:05.000Z",
"modified": "2020-10-30T08:14:05.000Z",
"pattern": "[file:hashes.SHA256 = '33a2b228186f8391a15442fc1333827fc2af5468c40d1a1552723245922a6812']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--cbfc9d02-24b8-4d8e-ab5b-f4b7e322b641",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:05.000Z",
"modified": "2020-10-30T08:14:05.000Z",
"pattern": "[file:hashes.SHA256 = '38bfb870f8e127f2170175fdd902c0891c9a6c044d8fae6dc9e8ef6d5a9497ab']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d57f103a-ef7b-4874-b964-7cf80478584b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:05.000Z",
"modified": "2020-10-30T08:14:05.000Z",
"pattern": "[file:hashes.SHA256 = '395173829ff0e957a2d8abbb3c979f470701cd3fd381e7af23b13e7573cca5c1']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--62401a13-8283-4430-9ff2-cfb9663173b8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:05.000Z",
"modified": "2020-10-30T08:14:05.000Z",
"pattern": "[file:hashes.SHA256 = '3c484486d455b4c13e8fbbf612b4ab3c4cfc519dd5a81c2478a7e4ab9c08e83a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--84348065-5cc9-493a-9b22-bafa9c6b5015",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:05.000Z",
"modified": "2020-10-30T08:14:05.000Z",
"pattern": "[file:hashes.SHA256 = '429650c8e59459c0150ad5cb8853cb46415b70afb92f45ebc04e8c5fbd382bf2']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d1886e17-c396-477e-920b-1395902eab38",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:05.000Z",
"modified": "2020-10-30T08:14:05.000Z",
"pattern": "[file:hashes.SHA256 = '42d914b10255499859ee5919b183ca521ae483ac3edc2f1653d52487f9098342']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--77201e27-959a-47cb-b5b8-6173ea24d6cd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:05.000Z",
"modified": "2020-10-30T08:14:05.000Z",
"pattern": "[file:hashes.SHA256 = '4544b478b2029ec38eb4bda111741a10f0684e38f1b29ce092b93df882d11f9e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b49cc630-c422-416b-bee0-008239e9b7dc",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:05.000Z",
"modified": "2020-10-30T08:14:05.000Z",
"pattern": "[file:hashes.SHA256 = '484418a9516fbe04de0d99704ac521b04825bfdbc4abbcbf1ba88a28c26373ea']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1bd13e25-a3ce-493a-be7f-cf78c2f6aaae",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:05.000Z",
"modified": "2020-10-30T08:14:05.000Z",
"pattern": "[file:hashes.SHA256 = '4e4eb3f6f85c8b14003168e9cd9d82c716cf5c04f1d7cb2f003d1ca233d75eed']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7c37cdc4-1f8f-4b85-93b7-c908d04c571f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:05.000Z",
"modified": "2020-10-30T08:14:05.000Z",
"pattern": "[file:hashes.SHA256 = '52951e174db7986b334417d5641b06a80464c9665bf82393857fa6700beef006']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c079c79d-43fa-436f-b67f-79d55d6114fc",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:05.000Z",
"modified": "2020-10-30T08:14:05.000Z",
"pattern": "[file:hashes.SHA256 = '57b75ed78a4b94749fe25b14e7a6e3b357089b060b88aeb7a30144c6713e5afc']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--208d6828-ab98-4d3b-8b5a-d6b2cf2de48f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:05.000Z",
"modified": "2020-10-30T08:14:05.000Z",
"pattern": "[file:hashes.SHA256 = '5929962b379c56626a04052bc8e983732b807c34fab6c1ac420d73a8fff9e9a6']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--906a5ef2-13e6-4081-b2a6-80cf5860f03b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:05.000Z",
"modified": "2020-10-30T08:14:05.000Z",
"pattern": "[file:hashes.SHA256 = '5b02e00797b0f396b40dbb8223d034a7aa42798a39a89a41ea70a314ceab478e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--956d46e3-bcc6-44a6-9f9a-8e8d179c1688",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:05.000Z",
"modified": "2020-10-30T08:14:05.000Z",
"pattern": "[file:hashes.SHA256 = '5c3569c166654eed781b9a2a563adec8e2047078fdcbafcdef712fabf2dd3f57']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--cbed91e6-b36d-4b9f-ba96-f896f67381a7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:05.000Z",
"modified": "2020-10-30T08:14:05.000Z",
"pattern": "[file:hashes.SHA256 = '5eddf95ec34e512d6db1058fdd9fa886e3fc1e7d4090d1999f1764627db5c1ee']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--312f1089-b7e2-4e02-863e-d5a1d64cc747",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:05.000Z",
"modified": "2020-10-30T08:14:05.000Z",
"pattern": "[file:hashes.SHA256 = '5fc68cab9ed345259fa2b452f63e9bc9b1c61285fb0445e60b2744c211bddeb8']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--cf0a8e96-59e2-4052-9969-c67953856934",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:05.000Z",
"modified": "2020-10-30T08:14:05.000Z",
"pattern": "[file:hashes.SHA256 = '5fc95870132e4709a5a0086593490cd04eb121f2f238b44cb19679125e842115']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3e650403-2065-4053-84fc-1eae72d18e34",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:05.000Z",
"modified": "2020-10-30T08:14:05.000Z",
"pattern": "[file:hashes.SHA256 = '609401cd35b4ede77bb717005bd2875f0a018442e194ec8af78595f185665f12']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--350977e0-1cb4-4d3b-ae9e-03037409efbc",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:05.000Z",
"modified": "2020-10-30T08:14:05.000Z",
"pattern": "[file:hashes.SHA256 = '60a45919ec5e67c2843fd08745f26437934ae3ceae76133a23aa0690d6a72f86']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4c0feff8-1a00-4b25-87d8-c037bb605f90",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:05.000Z",
"modified": "2020-10-30T08:14:05.000Z",
"pattern": "[file:hashes.SHA256 = '625bd1db4f5fbd8fa9a4c78bc7f1ffe421dead5b0b0b4b2a65be879f9a123a23']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--bc632620-58ba-42f0-96c3-e13c075c196f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:05.000Z",
"modified": "2020-10-30T08:14:05.000Z",
"pattern": "[file:hashes.SHA256 = '641a07800e1e9542d0756a7bb740f80ec49aed633af0add108a6e00671e10757']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f2d925b2-31f4-4dcb-9b53-e99a93efeea2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:05.000Z",
"modified": "2020-10-30T08:14:05.000Z",
"pattern": "[file:hashes.SHA256 = '65783de1310a32a96a2f2ca60093be27ddb32562f91104d7886fac7479ad8afe']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--178a27be-c511-47e0-9fa3-18af8422441c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:05.000Z",
"modified": "2020-10-30T08:14:05.000Z",
"pattern": "[file:hashes.SHA256 = '68547344839166ef8e28dd31b40b35d94759eda2949eab654bf737dfe9d3edae']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--088adf7c-cf5a-4df3-aba0-0f3bc7c9cab7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:05.000Z",
"modified": "2020-10-30T08:14:05.000Z",
"pattern": "[file:hashes.SHA256 = '694818ba3bbbd14949fea1441dd15ec721adc61f7f7de4cc728f449a2ef2c3c8']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--79dbc507-b2e1-4f62-83fd-3a8d1e0330d6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:05.000Z",
"modified": "2020-10-30T08:14:05.000Z",
"pattern": "[file:hashes.SHA256 = '6abf2716ace0464a488e5ed4d1935865d4d12886ff54fbb5dd659bf32f1cf23a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ef99f345-1aa1-47d5-97fb-a8019d50e8b5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:05.000Z",
"modified": "2020-10-30T08:14:05.000Z",
"pattern": "[file:hashes.SHA256 = '6f55f3b1415b5bf9dda57158f05fe628edb92b436887ad72f3d4bd108e8542d2']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--714d92bd-69e7-4760-bf7c-b7670a5c6b6e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:05.000Z",
"modified": "2020-10-30T08:14:05.000Z",
"pattern": "[file:hashes.SHA256 = '70ffcd7e8663a2aab204eaea3daf86e9cff73872d23ad3da2e91382f8593501a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b86531e4-9fb0-4bfb-afb9-19e19f0d8233",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:05.000Z",
"modified": "2020-10-30T08:14:05.000Z",
"pattern": "[file:hashes.SHA256 = '7187ec55dcd998f3ee207a0733a162604c40dc6920ef47424bcbaaa1dba68da3']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5139aee3-7c32-45e0-bd1d-ed7fe490456b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = '71fe1f1ce713e265b2c6693f83ed94a359e43e6aa60322baee599ba74a2f2ac0']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4340037c-b6a5-4454-a5e3-fecf0f081900",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = '728a8ea36c4dcaa030c2a8674bd4b65eb636253435c5d43e74d8a176a92f7679']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7d551a62-0a31-4922-9090-a4da23ede89f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = '75d9c67b853fb26ba28ae5dcfc0631fd9fc4addc69d579edfd98bbbbdb4d9187']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c1c2a7b4-7ac6-4167-92cc-a6da8b5603fe",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = '7753fd8c401e0efd8e5d0db07ea7b60eb45d034b7685b656d708f3885d8e7906']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9260b076-bad8-46b9-b425-790468d49ddf",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = '798d9d960b1a6dba959831983573ce7de2ea376f13f1e0fe7968beeca37f0540']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7627b293-7fe0-4baf-a017-e5b4e580bb63",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = '7b8f932ca62ecc8e0a071177075118ba4b050f785857925a3dac6835e230d602']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--bce82b2c-f287-48cd-adb0-2495688b4850",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = '7bdaaf431bbf0880b0f1276042bd1adeb192d183795c30834b61e2335d279230']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a85d1713-5193-44d6-8007-bc4b382bca1b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = '7c64c488a58473d9456d4f2f64b7bcb5eea03c32bd99650c59e38b0993eba7b3']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--68db9a6d-7846-4456-af2a-8bd445071218",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = '7f901d8f673d5e1fde07676b3287aa9a24dc92fb48e7ca82a163e0b0581ee7ad']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--eeca3625-b938-47ac-9531-3a65af9131eb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = '8074bbc62a36ff2c0037634d3c45fdf40bfc372a7123f64c38f159c04d2391c6']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4284890c-11ff-4e01-bb7b-797f6e01dbad",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = '82ccc3e53246b4b931c7d6642b70de245d9896b6481b273ee50aca3c58614027']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7a38b6cb-2b9e-48c4-b64e-f5b1ca7c2b05",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = '836db6bde6f664fa42b020c7b4549713022eac87410c1ed1104b6d4df615a599']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--89b99a47-c136-4c5d-9069-3327bc49be35",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = '841680207f8c57f4e183610f022f01642d86c5a2fd0323463039b751e5559dc4']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--6bd96a88-fa73-4794-aa40-09b621f2aaf2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = '8447befbf1643aae5219fc13354628f00c61683fb7b86bb0294a95b3eb62a344']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f4499e12-2c0f-42f7-95be-a1d445dc1d5e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = '849c4687f36eecc3e3e5f68da5ee1b2b5c1fe75811db66633962af9a749ff355']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--035081b6-3511-41fc-8f69-f5a499b0139b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = '86c18925097fed036b2f63a8c50891266b6d5f0ddde84ee57f6c4da06e77100b']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--72d587d8-bb1c-45d5-bd69-df59387b172d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = '88da60e5764ac7ead4db3a9ad0aa9f40e509a1d2df0380fa2e55cfdc8e3ad70a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ad54a1dd-dd24-4035-b1c5-0209fddc8c3b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = '8a4515c285fd0779292f0ac7d08f6bb5b6fca00a23ce98133e52625ee11bbf36']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--490dfe50-ebf8-46ec-9192-0d38fec11db2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = '8b6c3018958e7ae20989045811358b1225606000c879000c779444cc50290d9e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4104d499-0a94-4d90-83fa-93465cef5cfd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = '8dde9b01b0e4eb47afff7daf5d59abf72e68ec6d944a9404f78ba69fcbd5310d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8a1a1d83-02c7-45f7-a959-18d38c55098b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = '8ddf1b190498bcc66f510005f0e1efc2562e189887924ddb7e584f04437e78a2']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--939b7541-3f98-487a-bb38-5839db8b0e15",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = '8e421c6145b4ee499c747c7544d16f331d0bfd282b40efddcf66d8eb3fbf51cd']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f8b4fbfa-1a6b-40d9-aa7d-d74dd8819b61",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = '93193c90f568ae1ebdbdd5607c00ce250f6c886cec60724bdcf5e25c6ba82554']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3d334c20-1771-4d0f-96a1-89b6e3f07b50",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = '956cd22a033de80926083810a0946ad764e0df61dfc0ad09af5e1947327281c9']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--874e6a03-c6d4-4b8a-ada6-f4eb75871b4a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = '959e289a72a49a27d173d5c020969e27aa078a1521b3632ceb5e8c77fa01a342']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--18734a78-83af-4b5b-a436-00f0cee18119",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = '95d4c0e642a3b2c9fab0a2d90b2d127ed12d9ae1e8e721806e9eefc75d77ee3c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--aacc6c90-3e0d-45ff-a184-32693fefbaab",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = '98266835a238797f34d1a252e6af0f029c7823af757df10609f534c4f987e70f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--123e70c3-4b54-4c6a-b3c7-8c69c6afaeca",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = '991a222bdbeb5d25b9f9445496112af904ac7b677b6296810727e6e403f5f5eb']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--28a25adf-9ee6-497f-aaa0-27dd71d2dc56",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = '9bf2fd111962a5634e7b1a5821b08584002cf304d657840a904d3388967a9a65']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e060feee-aaa2-4f1f-99be-7223dd3acce6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = '9d8cbb2bf4801276de2143ccd64a7d0f66263809a90bea0b664282a15d121d9e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--db517c72-5b23-4fd9-bb2f-e059e11b2e25",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = '9dce80e3b848c6a52a89e89b4d8904635a7a0a6a069f6c164b2becb5eda4d814']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--626584f8-675d-449f-a50f-0c05806c2d5a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = '9df20496f03f1e916dbaecbe7e99db411cd8044c13572d691febf13c22b7c572']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--88a2a7b5-8efd-4834-b3c5-d5da19a90d07",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = '9e513f9876410f792a0f97c8bead2122c9f26cf07136fe8afbac8da48120953b']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ebca33da-d044-4c0c-a559-0ab0fa77bb47",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = '9e99facf8ea4c39a5d2bfc404fbae99b37bae36ab589a2a67acf23d03de96512']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--963ebcee-9aa4-4e9c-bc99-27c8d8787409",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = '9f74293d070390a2f783030eed5de4c64b1d32e2046b8c440cc39984b453b12f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d8de50a6-335c-4942-94fd-ec52735b45e8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = 'a14e3907f7a12b56bb67b178c722d92d2ee64fb0514daadd902683c799bfdc94']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0fafc38d-9dd2-49c5-8abb-efc34a2eebf6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = 'ab99e91e1b0951feabd09d049e0ac9d9412c67603415c10cbeadde5842ca02d2']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0a143f0c-2744-4a66-a5c2-a500819c4a41",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = 'ad0ee372226ace062473e01b15b52d99eb61a6f3b265bead8f2c534f75d05cea']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e13b3d9a-690e-4b73-97ff-b6c865037813",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = 'ae696adba9e93dbc97b2f0a0c13c962cd90e5b03943e68f06e6e1b8f8d6cbd00']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7de5453d-a75a-4d6c-9242-83718e050340",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = 'af29f3aad49a10827b338f156d4f748bcd9d987f1400c52f979efcb4ef4e5e46']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0f9b97b6-649d-4bcf-8d0f-083459d574e0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = 'b0a5775907994eea4adf0faa505b28160d22507c1690ca508820e26fb4ca3bca']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--91128171-8510-4022-aa4e-d0523d8574d4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = 'b1232c4080121ac93b5c6f3982f79ee1ed4238d568cefd6eb88e7dfb072f0db8']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ad514ed7-8585-499e-8eb6-4b192966ce12",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = 'b1798973f8dfce5777905452271f3b3ff23fb2148978ba2943654a72fe5b6387']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--98c96876-e9e7-40ae-9e0f-79b6fd0bda15",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = 'b1eb0565b958d4819138a72cf38b16d058cfee00097461c5dad3fae500aa4296']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2b7cfe27-fc55-4c0f-b415-e088d687c415",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = 'b2891d26b7b66dca32f02681a0f1f3866a2efae49d8b5ec6bf4cbbdf5ff35260']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--dfc8bd49-e30d-476d-a09b-bc09ce92d2fa",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = 'b294f8636f7ac5318560f3b8f949c1004340923d6aaaceed93481c3ba916d407']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--6585c434-e540-457d-9917-c712be7b7145",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = 'b43bb3af257e2c29ecf9add2ef4ad41c62e6b1298dc9af220ab0a285e23cb9db']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--497f2ad6-c5a9-4c5d-bc10-abc0d9cec3f6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = 'b485bcb29c5bf53269960a243b051d4fafcd4ae2b17839e96afbf8f8fec8b244']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--baa3f650-7c1e-4e54-9959-f002a16919a4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = 'b62ba19f3f6ab6200a764a14a268cbf21efe3b48030f7a8bccd96300d56ec950']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f26402e1-d6fb-4c89-9f32-45e514329223",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = 'b89742731932a116bd973e61628bbe4f5d7d92b53df3402e404f63003bac5104']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1b21bbd3-ee45-4f7e-b6c5-180177712c42",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = 'b91b4d45b41d0d0ca1bdfac917c4cd732d32754bcfd7590ac521dc4fe414ebd5']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--20315b07-41a2-4142-886b-9ba93d4a5a9a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = 'b95be82b7682341cf7e2b8e33f1ca0c8915ee005bd71c50ad877da99c7ec39f6']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7276da86-78c3-48c7-96fd-132e3c3fc47b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = 'ba2a96dae66324df5bbb0751a04c538722ad49daa12d51625f8a1890608b1168']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a73e8a32-47f6-42d3-823b-6e2670f7eda2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = 'bb412455c3988a845ee04cd9f665df285bb00dfb62af377ff9a06d6f032e3aa1']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5f3e5d29-4e4d-424a-8688-94b5d3da8af6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = 'bc08bc584b06c8866c6b4feeeef745e187a8ce0e924d159d5044e6368e4bf31a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--09e4d686-af78-4f5d-a844-813ce691826a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = 'bc84fa150decef8b33811a646be2fe517f2550bfa03036b8766ff338c3d37df1']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--80f0aae0-fbb2-405a-b2d6-57c49a764d40",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = 'c0595bfea597e67c4e7291e60ed124c5b6fd47eca5d2a2dee4ac61864ac6dc5f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--662017e4-ca26-4555-a24e-ad898be0f123",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = 'c0af45fb5b5ecaff8130bed61a8cdb4bac98f2c9ccc774bd6034576f865aaf6f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--6ea4c004-26c9-48de-8988-8170609138af",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = 'c498a138ca1fb1ae1c834cbe5f76eda226b0fa7b29bc6cbd8b92478e394b287f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c0a2c502-0cca-4937-8dc9-4292fdbca33c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = 'c9b06152ac1c851eaed84ee052c374341ed89d9a6e5a5d97bd0e4b941c01a274']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--39731264-e210-451b-891f-94d41d99ee52",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = 'c9ffb0e9c3df23bba54debf0f6875ade683fe29f4ca720d2abc780179a2781cf']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--296d968c-a0d5-4f0b-975d-08a12718eba7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = 'ca4963745454cc8584cec4e53d27d78c86a4766a4f69b0b37617efcd915621c8']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--219f70d1-2630-4cd8-904b-29fb48baa865",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = 'ca8d8d55c30ed37ce1bc36e514a3fee5b0bc00ef5c88b8d07d51dbd9a141ff33']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--95c28e84-fd2f-44d0-85d9-56ddfff217a4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = 'cb039efaebc29c1cc5c0fcf8567de534993f447245a45db03c927af56f7096d7']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--fe110200-3abd-44c0-8e37-42a76f80621b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = 'ceb4bfe175798179b0947da1ffd8eda13777b9d7b02bc75599b6f6907cf2c2c0']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f37139ec-f0b6-4dcf-9359-44811b6b4374",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = 'd22cfa87be0f204ae7da13897dfcd075c9f25414e1792762412e9ae61d0ce3f0']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--43e2295d-72e2-48d2-8dc1-88daf5dcb92c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = 'd6f97c6dbe021f02adb2139fc990996ca0d670ceab0189017e69171298ea9c27']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--bdd748a5-83e9-480b-9ce5-db7b7c427f32",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = 'd8ab0c6982ea7674ed4e53e4bfc7234a56b018090819b79f67a9cc6034fc98e2']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4bbf331f-00df-4f27-9811-c077248ed1bc",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = 'd931fe8da243e359e9e14f529eafe590b8c2dd1e76ca1ad833dd0f927648f88b']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9fa0c03e-a6f9-492b-a41b-6485347f58dd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = 'd9dc572d6e446ec7629479eb60119b57a135e77aae22ea9f5a29a543af85b7da']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--227a591a-8e74-4e33-ba13-a29345146169",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = 'dd913d2b8a29eae792097e2d2b81a94e62b3e90636a9564f56dc302b50901ccb']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--75f61a24-d88e-48c2-a25d-957c5fb1fa04",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:06.000Z",
"modified": "2020-10-30T08:14:06.000Z",
"pattern": "[file:hashes.SHA256 = 'dee7fbf9d55f5ed197463d65694accc6861a181248f3e79b99f5444183d39805']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a093f8b6-cfc8-4375-b2ff-9fed810c81fc",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:07.000Z",
"modified": "2020-10-30T08:14:07.000Z",
"pattern": "[file:hashes.SHA256 = 'e1e154590062bab331805d1657cbdea323053e25e0c5efe4a93d2deeca689452']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:07Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a8c6be4c-c8e4-4199-b07f-14b0f00ccbab",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:07.000Z",
"modified": "2020-10-30T08:14:07.000Z",
"pattern": "[file:hashes.SHA256 = 'e5da410cbba9e76ea9510985653984b63e5af501a2e542c9c29def8c1ded23c3']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:07Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--93022e25-6f85-48d1-9bf1-10d8fc7984ce",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:07.000Z",
"modified": "2020-10-30T08:14:07.000Z",
"pattern": "[file:hashes.SHA256 = 'ede75c0a88d80043f79025dfd8ef91c3d1b01a1613f4a0347b2ceb29f8b19578']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:07Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1ad75d94-a808-47fc-ba9f-2e150f3ab485",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:07.000Z",
"modified": "2020-10-30T08:14:07.000Z",
"pattern": "[file:hashes.SHA256 = 'eeadc13b1d59ada3851f56162796ef9d901a1fd74c457ced14d72b8df54e79ba']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:07Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a8d7509a-2927-47bc-9fde-7b1c68ce020f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:07.000Z",
"modified": "2020-10-30T08:14:07.000Z",
"pattern": "[file:hashes.SHA256 = 'f0bb1027787cd589b6c6ff6eba755d916f837d8753342f9ffa391fbbab718841']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:07Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ff3cd744-61d3-4131-80ba-d47200788fb3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:07.000Z",
"modified": "2020-10-30T08:14:07.000Z",
"pattern": "[file:hashes.SHA256 = 'f20c78fb33d42d874ed6fdf7096a4dad9b3637e05ccc8ae52ee6cc4e5dd8a0bf']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:07Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8cc815b7-8bc8-4c36-9199-992fd1e398fc",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:07.000Z",
"modified": "2020-10-30T08:14:07.000Z",
"pattern": "[file:hashes.SHA256 = 'f6b74d7a2b2e2c1f2b0f088c6b5cd7d26d4d40b756e76bcb7ad06cd7c6c17ded']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:07Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--01910748-31e6-4050-85c8-2e489664bc0b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:07.000Z",
"modified": "2020-10-30T08:14:07.000Z",
"pattern": "[file:hashes.SHA256 = 'f6f3d1d060274e114c80bcd35c3f5e97909cf6ffd793bdab27d1eb913a0d391e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:07Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c9d1848d-7f37-4570-9b44-f8a9ef57b782",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:07.000Z",
"modified": "2020-10-30T08:14:07.000Z",
"pattern": "[file:hashes.SHA256 = 'f7a66c1ed76f696c0d3d3d5c49e88b6cebf35ff232c5094d3284f7fe484a90a3']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:07Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4153e52c-b69e-4422-9995-0491c7ee0819",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:07.000Z",
"modified": "2020-10-30T08:14:07.000Z",
"pattern": "[file:hashes.SHA256 = 'f9507a76801d5b1b83704a5019cdc312de18b004f16c5547b91b7dba086b2e29']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:07Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--47edc405-c9ec-4a04-bddb-3f2ff0058af7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:07.000Z",
"modified": "2020-10-30T08:14:07.000Z",
"pattern": "[file:hashes.SHA256 = 'f9c459824e223d5523ac6edfea7b842cf168ae135045258b04b4760f4002a86f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:07Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7fadd49d-41d2-42de-b185-0c8f2a7d5cea",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:07.000Z",
"modified": "2020-10-30T08:14:07.000Z",
"pattern": "[file:hashes.SHA256 = 'f9c6dca22e336cf71ce4be540905b34b5a63a7d02eb9bbd8a40fc83e37154c22']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:07Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0dac7190-11b4-45f5-bde6-011011bbc46c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:07.000Z",
"modified": "2020-10-30T08:14:07.000Z",
"pattern": "[file:hashes.SHA256 = 'fb780f623a78c9b5aa8a279430731b84d0efe937ea5684f80182e4f896e8e288']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:07Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--41d0d1c9-e028-4d1b-9973-fcfac8db0924",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:07.000Z",
"modified": "2020-10-30T08:14:07.000Z",
"pattern": "[file:hashes.SHA256 = 'fec4655a9f99931692ecc28d35e2e17ae03f0acbfe8bdf9de00a05437049ce69']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:07Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--35e4b949-f5e6-4a14-8224-bc8ac205576f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:07.000Z",
"modified": "2020-10-30T08:14:07.000Z",
"pattern": "[file:hashes.SHA256 = 'ff5e6fbf14c5eb35c1b4f24e4b08b30ba2e512a4b25ab7b652f0567edb94097e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:07Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--23d34b48-7a1f-4dac-a111-a7bfc1b240cc",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:07.000Z",
"modified": "2020-10-30T08:14:07.000Z",
"pattern": "[file:hashes.SHA256 = 'ffd51f3de4ba08508ca7c19dd15676c2c8f4a61891c1dea297bb648633485bcd']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:07Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--702b6c78-c785-4688-9182-b5e6ce8c54a5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:22.000Z",
"modified": "2020-10-30T08:14:22.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '134.122.114.248']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--47e5cfae-9b6a-4576-a6f1-bd55c535bfd1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:22.000Z",
"modified": "2020-10-30T08:14:22.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '142.93.122.23']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--858930eb-f5be-45a4-9828-5d5858006a5d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:22.000Z",
"modified": "2020-10-30T08:14:22.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '149.28.215.46']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e7aa22ef-3ad4-4e01-a1bd-66f483ef1bdb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:22.000Z",
"modified": "2020-10-30T08:14:22.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '157.245.88.69']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a0893b92-97c0-477b-b0ff-6c73d42619f3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:22.000Z",
"modified": "2020-10-30T08:14:22.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '159.89.53.108']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4f3b5b43-f563-456b-97bf-134bc94c2574",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:22.000Z",
"modified": "2020-10-30T08:14:22.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '192.81.211.69']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--28621163-e20b-41d2-941b-891964d97783",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:22.000Z",
"modified": "2020-10-30T08:14:22.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '213.252.246.185']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5c8e5497-79e3-4aad-95d9-2e4630052185",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:22.000Z",
"modified": "2020-10-30T08:14:22.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '45.138.172.51']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3355fd17-d163-4f9a-9adf-9142e3ba6ec0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:22.000Z",
"modified": "2020-10-30T08:14:22.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '45.141.86.136']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f44ec647-d38a-4d64-9d5f-5b80a0f095f0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:22.000Z",
"modified": "2020-10-30T08:14:22.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '45.141.86.146']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e8e92754-db73-4cff-be00-473b00c8216d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:22.000Z",
"modified": "2020-10-30T08:14:22.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '45.141.86.194']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--29e2f188-e39c-40fe-a872-dea94feb25fd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:22.000Z",
"modified": "2020-10-30T08:14:22.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '45.141.86.207']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--47bb1cae-74ac-4632-a5d3-ad14198b4ac6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:22.000Z",
"modified": "2020-10-30T08:14:22.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '45.147.228.77']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--cde9c129-5080-4186-9f7c-2c3fd61528f6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:22.000Z",
"modified": "2020-10-30T08:14:22.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '45.147.229.128']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--30697e86-d051-46d1-933c-5350160f0999",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:22.000Z",
"modified": "2020-10-30T08:14:22.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '45.147.230.241']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--48569ca6-269d-4442-8086-dfafee3966a7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:22.000Z",
"modified": "2020-10-30T08:14:22.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '45.147.230.30']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3e23aa03-95ec-4aed-886c-c40cd9e6b9c5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:22.000Z",
"modified": "2020-10-30T08:14:22.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '45.32.134.62']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0ef68601-3d4f-450c-9845-62ec5d3fe2f9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:22.000Z",
"modified": "2020-10-30T08:14:22.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '5.2.70.149']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d81912f7-0267-4577-8f3a-5cbea35289cb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:22.000Z",
"modified": "2020-10-30T08:14:22.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '64.44.131.107']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8e804c75-4826-478f-9bba-8247f45448cb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:22.000Z",
"modified": "2020-10-30T08:14:22.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '88.119.174.129']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0129bf9a-c122-429f-b25c-1f675562aa86",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:22.000Z",
"modified": "2020-10-30T08:14:22.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '88.119.174.130']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--82760aae-1fa8-441e-bbde-e277e9d9be23",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:22.000Z",
"modified": "2020-10-30T08:14:22.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '88.119.174.131']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c5bb800c-9b45-4d51-bc69-ce033752b6c2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:22.000Z",
"modified": "2020-10-30T08:14:22.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '88.119.174.132']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b04af1fe-5278-4830-9606-c8231d0d3d22",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:22.000Z",
"modified": "2020-10-30T08:14:22.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '88.119.175.237']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--94cd5094-7287-4a86-b1c9-17ff1fd7c3ff",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:22.000Z",
"modified": "2020-10-30T08:14:22.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '94.177.12.161']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5c5808ce-abab-4b48-b487-26c94058fabf",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:22.000Z",
"modified": "2020-10-30T08:14:22.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '96.9.209.156']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b1a1028f-3500-43ee-9988-260790d4480a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:22.000Z",
"modified": "2020-10-30T08:14:22.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '96.9.209.161']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a766c8f5-a1ce-40fd-864a-0a6dd86c3556",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:22.000Z",
"modified": "2020-10-30T08:14:22.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '96.9.209.177']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9c76e32b-88f4-4943-b12d-d4cdda21a761",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:22.000Z",
"modified": "2020-10-30T08:14:22.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '96.9.209.215']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b5914a21-282c-4ddc-8dd9-f95e393562b4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:47.000Z",
"modified": "2020-10-30T08:14:47.000Z",
"pattern": "[domain-name:value = 'ad.daemon-update.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0443c5b6-f385-4997-92e4-c8c02b7f276d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:47.000Z",
"modified": "2020-10-30T08:14:47.000Z",
"pattern": "[domain-name:value = 'as.raingamess.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b57c9ea2-8748-47be-a7c0-8c1b13acbee5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:47.000Z",
"modified": "2020-10-30T08:14:47.000Z",
"pattern": "[domain-name:value = 'balanarr.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5a1ba601-56fd-41f5-a51f-2f53769b702f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:47.000Z",
"modified": "2020-10-30T08:14:47.000Z",
"pattern": "[domain-name:value = 'bf.primeviref.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1b14ed33-34f6-43fb-ab57-ea021fdd533e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:47.000Z",
"modified": "2020-10-30T08:14:47.000Z",
"pattern": "[domain-name:value = 'bukaguka.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--dc332d89-3e81-4d64-8f32-acc6b421d3c0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:47.000Z",
"modified": "2020-10-30T08:14:47.000Z",
"pattern": "[domain-name:value = 'bv.myobtain.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--90c31521-b6a5-4311-aed1-d98c30e8a86b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:47.000Z",
"modified": "2020-10-30T08:14:47.000Z",
"pattern": "[domain-name:value = 'cc.hotlable.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a79f1ede-a17e-4d7d-94a8-32e609c754c1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:47.000Z",
"modified": "2020-10-30T08:14:47.000Z",
"pattern": "[domain-name:value = 'cv.myobtain.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b89b1e70-6f4c-451f-9a35-093de1bf6042",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:48.000Z",
"modified": "2020-10-30T08:14:48.000Z",
"pattern": "[domain-name:value = 'cv.webxyz.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b9ba5105-b8df-4825-a5a6-3958b55f615c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:48.000Z",
"modified": "2020-10-30T08:14:48.000Z",
"pattern": "[domain-name:value = 'cx.hotlable.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--6625e5cd-528d-4660-a437-4478044469e8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:48.000Z",
"modified": "2020-10-30T08:14:48.000Z",
"pattern": "[domain-name:value = 'cx.webxyz.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d2a9e2ad-61af-46b4-8aab-f08e1445bab9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:48.000Z",
"modified": "2020-10-30T08:14:48.000Z",
"pattern": "[domain-name:value = 'cz.webxyz.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--34852992-488f-4d64-8405-f76fa4993410",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:48.000Z",
"modified": "2020-10-30T08:14:48.000Z",
"pattern": "[domain-name:value = 'daemon-update.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5e6a7432-bcad-4a5d-9de0-8562cd07e3cb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:48.000Z",
"modified": "2020-10-30T08:14:48.000Z",
"pattern": "[domain-name:value = 'ea.daemon-update.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--16675d5a-d5c1-4f1d-b3fa-e819fecd16dd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:48.000Z",
"modified": "2020-10-30T08:14:48.000Z",
"pattern": "[domain-name:value = 'er.primeviref.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7ef71494-4ab3-4c65-96dd-35dd7c4d6e58",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:48.000Z",
"modified": "2020-10-30T08:14:48.000Z",
"pattern": "[domain-name:value = 'er.starcyclone.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5ea80a24-ac79-4c75-809c-946b03eb5ddd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:48.000Z",
"modified": "2020-10-30T08:14:48.000Z",
"pattern": "[domain-name:value = 'gg.raingamess.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a1ce24ff-3506-4f7b-8bd0-01cadf3fc38a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:48.000Z",
"modified": "2020-10-30T08:14:48.000Z",
"pattern": "[domain-name:value = 'hotlable.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--710f297f-6060-48cb-b3c2-e08dba785e1c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:48.000Z",
"modified": "2020-10-30T08:14:48.000Z",
"pattern": "[domain-name:value = 'hunbabe.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b8aef791-7f57-4a78-a443-590e3efc9ee9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:48.000Z",
"modified": "2020-10-30T08:14:48.000Z",
"pattern": "[domain-name:value = 'ju.daemon-update.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7916a9da-b207-4061-89e4-0daccca4da07",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:48.000Z",
"modified": "2020-10-30T08:14:48.000Z",
"pattern": "[domain-name:value = 'mn.balanarr.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--259f72a0-4108-475e-a050-dedc086d4d0d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:48.000Z",
"modified": "2020-10-30T08:14:48.000Z",
"pattern": "[domain-name:value = 'mn.hunbabe.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0a1a5d64-7019-4cad-87e8-b4180ba80081",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:48.000Z",
"modified": "2020-10-30T08:14:48.000Z",
"pattern": "[domain-name:value = 'myobtain.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--71e3bc9e-979a-44fa-9a40-3845fa661273",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:48.000Z",
"modified": "2020-10-30T08:14:48.000Z",
"pattern": "[domain-name:value = 'nasmasterservice.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--08b33068-32ba-4c1b-bc95-092c308c5b72",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:48.000Z",
"modified": "2020-10-30T08:14:48.000Z",
"pattern": "[domain-name:value = 'nm.hunbabe.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--60d4f133-53fc-401a-a5c4-a99d8edde86c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:48.000Z",
"modified": "2020-10-30T08:14:48.000Z",
"pattern": "[domain-name:value = 'nv.balanarr.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--feb3c23d-431d-4e57-994b-fd960afe8742",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:48.000Z",
"modified": "2020-10-30T08:14:48.000Z",
"pattern": "[domain-name:value = 'po.starcyclone.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f2c02e43-6c2e-4d4f-afd9-6c5c8355d7de",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:48.000Z",
"modified": "2020-10-30T08:14:48.000Z",
"pattern": "[domain-name:value = 'primeviref.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9dc396b0-8482-4856-b7d4-2ef98cc07f78",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:48.000Z",
"modified": "2020-10-30T08:14:48.000Z",
"pattern": "[domain-name:value = 'qw.balanarr.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--20ebe5c9-06ca-467f-888d-4a6cdde5103c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:48.000Z",
"modified": "2020-10-30T08:14:48.000Z",
"pattern": "[domain-name:value = 'qw.raingamess.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ab1e9441-e95c-49fa-8d4f-5b80710b30e1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:48.000Z",
"modified": "2020-10-30T08:14:48.000Z",
"pattern": "[domain-name:value = 'qw.servicemusthave.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--abedc7d3-adf4-44e3-b77e-3074a889c65a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:48.000Z",
"modified": "2020-10-30T08:14:48.000Z",
"pattern": "[domain-name:value = 'raingamess.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3bf5012c-38d6-4cc9-a91b-db48defbacd3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:48.000Z",
"modified": "2020-10-30T08:14:48.000Z",
"pattern": "[domain-name:value = 'rt.servicemusthave.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a02f09db-267a-4be1-95e0-4aeb2b3ff934",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:48.000Z",
"modified": "2020-10-30T08:14:48.000Z",
"pattern": "[domain-name:value = 'servicemusthave.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--047574f1-6ea1-4ebc-860a-cc2690f15aca",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:48.000Z",
"modified": "2020-10-30T08:14:48.000Z",
"pattern": "[domain-name:value = 'starcyclone.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--dc27706c-41f7-4b9c-8cce-33805b2b4102",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:48.000Z",
"modified": "2020-10-30T08:14:48.000Z",
"pattern": "[domain-name:value = 'toyotacamryy.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1949f9a0-b81f-4f53-8fd9-b2caa910876f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:48.000Z",
"modified": "2020-10-30T08:14:48.000Z",
"pattern": "[domain-name:value = 'tt.servicemusthave.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--6084e4a1-ed44-4291-b52e-b7e658f4cd2d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:48.000Z",
"modified": "2020-10-30T08:14:48.000Z",
"pattern": "[domain-name:value = 'vc.myobtain.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3fc11220-b06a-4d00-adfe-51b2b8efd2b8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:48.000Z",
"modified": "2020-10-30T08:14:48.000Z",
"pattern": "[domain-name:value = 'we.primeviref.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--232f0f1b-279f-4b4c-807b-51438e657bf7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:48.000Z",
"modified": "2020-10-30T08:14:48.000Z",
"pattern": "[domain-name:value = 'webxyz.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2c45f488-bf17-435e-bda0-39b4c3ba93d0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:48.000Z",
"modified": "2020-10-30T08:14:48.000Z",
"pattern": "[domain-name:value = 'xo.starcyclone.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--60e27794-2ea8-4b7d-b876-93c944692ff9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:14:48.000Z",
"modified": "2020-10-30T08:14:48.000Z",
"pattern": "[domain-name:value = 'xx.hotlable.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:14:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--62d87168-ecd2-46aa-b749-057e78ef86fb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T07:37:17.000Z",
"modified": "2020-10-30T07:37:17.000Z",
"labels": [
"misp:name=\"report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "summary",
"value": "In service to the general public, RiskIQ is today releasing the entirety of its unique and expansive holdings relating to the Ryuk strain of ransomware, exposing all known infrastructure upon which the threat actors behind the attacks currently rely. Organizations will be able to use this intelligence to search their networks for signs of attack, as well as to prevent malicious connections to other Ryuk command-and-control servers.\r\nThe decision to release these indicators of compromise is meant to complement recent efforts made public by US federal agencies and researchers at FireEye, who have responded to a spate of reported attacks against hospitals around the country with alerts and intelligence designed to aid network defenders.\r\nAs cases of COVID-19 rise, news reports are warning that \u201cdozens\u201d of hospitals across the US have been targeted with the Ryuk strain of ransomware. The malware is thought to be deployed by Eastern European criminals and to be delivered by the same threat actors behind the Trickbot malware platform. Trickbot was the subject of a massive takedown attempt carried out by Microsoft earlier this month, reportedly in cooperation with US CYBERCOM.\r\nYesterday, federal agencies issued an alert aimed at the nation\u2019s healthcare industry, providing context on the Ryuk threat and releasing indicators of compromise. The alert was issued by the Federal Bureau of Investigation (FBI), the Department of Homeland Security\u2019s Cybersecurity & Infrastructure Security Agency (CISA), and the Department of Health and Human Services (HHS) in a joint advisory. The agencies also hosted a conference call for health care industry leaders to further advise them that ransomware attacks are actively targeting the industry, including hospital systems.\r\nIn addition to the government advisory, FireEye also publicly released all relevant Ryuk IOCs (https://www.fireeye.com/blog/threat-research/2020/10/kegtap-and-singlemalt-with-a-ransomware-chaser.html) it has observed in attacks against their customers in 2020.\r\nBelow, the public will find still more IOCs associated with Ryuk ransomware that RiskIQ has observed via its Global Internet Intelligence Graph. It has been organized in a way to include all IP addresses, domains, and SHA-256 samples we have identified, in addition to what has previously been released publicly. Users are encouraged to check back on this article daily, to keep up-to-date with the latest developments and intelligence on this threat.",
"category": "Other",
"uuid": "730a37c1-0bba-4be8-aa22-f75d0b321b38"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5e4b3ebd-ca0a-464f-ad10-70aea4b7ae7d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:13.000Z",
"modified": "2020-10-30T08:56:13.000Z",
"pattern": "[file:hashes.MD5 = '27197265ac57027fd51ee66fd401b882' AND file:hashes.SHA1 = '98920c69627c38787d08586c38268b945e4c9e6d' AND file:hashes.SHA256 = '6abf2716ace0464a488e5ed4d1935865d4d12886ff54fbb5dd659bf32f1cf23a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:13Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--00e2ce66-809e-426b-a464-03a3c73515af",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:13.000Z",
"modified": "2020-10-30T08:56:13.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T00:43:54+00:00",
"category": "Other",
"uuid": "1dfc91ba-98f0-47ba-a32c-a14bc14eb870"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/6abf2716ace0464a488e5ed4d1935865d4d12886ff54fbb5dd659bf32f1cf23a/detection/f-6abf2716ace0464a488e5ed4d1935865d4d12886ff54fbb5dd659bf32f1cf23a-1604018634",
"category": "Payload delivery",
"uuid": "423fd4a4-d04c-429f-834f-d91e5c4b98d1"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "59/72",
"category": "Payload delivery",
"uuid": "1d55864d-2658-4ade-82c6-02fcfe4b07f1"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ac882397-2143-439d-a35c-29d75328afc1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:13.000Z",
"modified": "2020-10-30T08:56:13.000Z",
"pattern": "[file:hashes.MD5 = '1c835dbc0454e448563c6fecb481250e' AND file:hashes.SHA1 = 'd3a5b3018962079ecd33c5d80c8dfc6b0a2aed61' AND file:hashes.SHA256 = '849c4687f36eecc3e3e5f68da5ee1b2b5c1fe75811db66633962af9a749ff355']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:13Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--2fd08d36-d4b0-46d2-b04b-e73b5d0dab09",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:13.000Z",
"modified": "2020-10-30T08:56:13.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T00:44:28+00:00",
"category": "Other",
"uuid": "13e8f75b-1bef-48b1-b273-825d5e80e83b"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/849c4687f36eecc3e3e5f68da5ee1b2b5c1fe75811db66633962af9a749ff355/detection/f-849c4687f36eecc3e3e5f68da5ee1b2b5c1fe75811db66633962af9a749ff355-1604018668",
"category": "Payload delivery",
"uuid": "344d9039-4052-492b-ba16-d346957405b3"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "60/71",
"category": "Payload delivery",
"uuid": "efb7cc87-9392-427e-9017-2960a32c6f02"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--6fd4b80d-ab64-4af1-a3a8-ad9b6d395c75",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:13.000Z",
"modified": "2020-10-30T08:56:13.000Z",
"pattern": "[file:hashes.MD5 = 'e83921068f58178919357d72f7da4b54' AND file:hashes.SHA1 = '4a0ba17833ebe3df630b45c6ee5175187a94a25c' AND file:hashes.SHA256 = 'b485bcb29c5bf53269960a243b051d4fafcd4ae2b17839e96afbf8f8fec8b244']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:13Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--9b52878f-f520-4816-a7e5-7d612600a435",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:13.000Z",
"modified": "2020-10-30T08:56:13.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-17T16:45:17+00:00",
"category": "Other",
"uuid": "2edf15bb-e87a-4070-ae0b-74a26a198bbf"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/b485bcb29c5bf53269960a243b051d4fafcd4ae2b17839e96afbf8f8fec8b244/detection/f-b485bcb29c5bf53269960a243b051d4fafcd4ae2b17839e96afbf8f8fec8b244-1602953117",
"category": "Payload delivery",
"uuid": "5ffc849b-ca66-407e-adf3-f4167b38d1ad"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "59/70",
"category": "Payload delivery",
"uuid": "bef11a5d-e137-48a3-828d-175033ecf3bb"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b6522bbe-f37c-489b-8e4c-c2876a8dbbe4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:13.000Z",
"modified": "2020-10-30T08:56:13.000Z",
"pattern": "[file:hashes.MD5 = 'f0e418d8703c9fe05518526b5a110437' AND file:hashes.SHA1 = 'e0a1c2dc8bc85bbd54a68766e042e260a4aeaba9' AND file:hashes.SHA256 = '33a2b228186f8391a15442fc1333827fc2af5468c40d1a1552723245922a6812']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:13Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--529bb072-ec45-4bc8-9cbe-327e2a8c87fb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:13.000Z",
"modified": "2020-10-30T08:56:13.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-19T04:38:37+00:00",
"category": "Other",
"uuid": "d0360e7e-3859-49a3-ab34-d7a7df69a4d3"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/33a2b228186f8391a15442fc1333827fc2af5468c40d1a1552723245922a6812/detection/f-33a2b228186f8391a15442fc1333827fc2af5468c40d1a1552723245922a6812-1603082317",
"category": "Payload delivery",
"uuid": "6b3e3d74-ef4e-4943-90ed-90b2b17defa5"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "31/59",
"category": "Payload delivery",
"uuid": "3065abd5-88a2-45aa-9356-0a9e94864d18"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3f2c3c0f-8e53-4526-97e6-2f13c526f330",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:14.000Z",
"modified": "2020-10-30T08:56:14.000Z",
"pattern": "[file:hashes.MD5 = '8765876a56e35f4a21b7fac4792a4148' AND file:hashes.SHA1 = '07b332e50b279739189888048256c61725edb8a6' AND file:hashes.SHA256 = '1c1397233114820f366607896cb9f3d3d412270e79947ce1558fc8db7dcbb602']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:14Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--576829d7-5640-4605-910e-d1d6874e0686",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:14.000Z",
"modified": "2020-10-30T08:56:14.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-29T20:07:41+00:00",
"category": "Other",
"uuid": "dac1c416-5be3-40e8-ae5d-ecf1f821de38"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/1c1397233114820f366607896cb9f3d3d412270e79947ce1558fc8db7dcbb602/detection/f-1c1397233114820f366607896cb9f3d3d412270e79947ce1558fc8db7dcbb602-1604002061",
"category": "Payload delivery",
"uuid": "1ce8067b-5821-4eec-8a00-edeae2da5559"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "42/71",
"category": "Payload delivery",
"uuid": "f8e804e4-d702-498f-ba52-0bf25dfdaee5"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--908358ba-5ed0-4297-b786-12a4289242f8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:14.000Z",
"modified": "2020-10-30T08:56:14.000Z",
"pattern": "[file:hashes.MD5 = '2b14db199e034461e2302c90d61b0e1a' AND file:hashes.SHA1 = '49131ff6a3cfcb5d95b2fa8f15d4ecb27380682a' AND file:hashes.SHA256 = 'eeadc13b1d59ada3851f56162796ef9d901a1fd74c457ced14d72b8df54e79ba']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:14Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--b43ea474-a729-4dfd-9e40-0822f358eb91",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:14.000Z",
"modified": "2020-10-30T08:56:14.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-29T07:38:20+00:00",
"category": "Other",
"uuid": "886a5d70-9d35-4ec2-97ae-20f359a3acd3"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/eeadc13b1d59ada3851f56162796ef9d901a1fd74c457ced14d72b8df54e79ba/detection/f-eeadc13b1d59ada3851f56162796ef9d901a1fd74c457ced14d72b8df54e79ba-1603957100",
"category": "Payload delivery",
"uuid": "7e156070-65e5-44f7-ab28-c804720047f9"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "50/69",
"category": "Payload delivery",
"uuid": "dbb67355-b864-4703-9f89-e2f9bcecced9"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ead61ca6-0171-45e8-866e-d771f0dff221",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:14.000Z",
"modified": "2020-10-30T08:56:14.000Z",
"pattern": "[file:hashes.MD5 = '12963009969137f99d02129f98465975' AND file:hashes.SHA1 = '5a2fbefccac3bcf330ed6f5c57372e5056817094' AND file:hashes.SHA256 = 'c0595bfea597e67c4e7291e60ed124c5b6fd47eca5d2a2dee4ac61864ac6dc5f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:14Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--75db51bf-03f3-48b7-b91e-a61105c01f5e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:14.000Z",
"modified": "2020-10-30T08:56:14.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T00:48:50+00:00",
"category": "Other",
"uuid": "3f9038c4-b9e5-496a-9224-a213067fbd1e"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/c0595bfea597e67c4e7291e60ed124c5b6fd47eca5d2a2dee4ac61864ac6dc5f/detection/f-c0595bfea597e67c4e7291e60ed124c5b6fd47eca5d2a2dee4ac61864ac6dc5f-1604018930",
"category": "Payload delivery",
"uuid": "6060f3eb-ffbd-4b85-a1e4-5771b50cd36c"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "59/72",
"category": "Payload delivery",
"uuid": "905e21fa-6ed7-4aa7-bf89-6879afc961d5"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d29baa9f-3cb5-417d-8a99-0036be91261f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:14.000Z",
"modified": "2020-10-30T08:56:14.000Z",
"pattern": "[file:hashes.MD5 = '8eef3411f7938ddae15cfba34807d33f' AND file:hashes.SHA1 = '8a96fc4090eb2719504abac1e11a40cda0ab2d1d' AND file:hashes.SHA256 = '82ccc3e53246b4b931c7d6642b70de245d9896b6481b273ee50aca3c58614027']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:14Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--72cae686-0ad4-42f7-938e-640b8cf6c173",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:14.000Z",
"modified": "2020-10-30T08:56:14.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T00:44:21+00:00",
"category": "Other",
"uuid": "d7ea2627-fe9d-476a-9273-f1231b17fb34"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/82ccc3e53246b4b931c7d6642b70de245d9896b6481b273ee50aca3c58614027/detection/f-82ccc3e53246b4b931c7d6642b70de245d9896b6481b273ee50aca3c58614027-1604018661",
"category": "Payload delivery",
"uuid": "3e4c869f-83cc-495d-ad39-5580a36d0465"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "32/71",
"category": "Payload delivery",
"uuid": "ba7318e3-e60e-40dd-bbb2-7df90104a41f"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b1f6ca3d-e038-406a-84a1-16f010a477fb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:14.000Z",
"modified": "2020-10-30T08:56:14.000Z",
"pattern": "[file:hashes.MD5 = '5c1fce8fa3e228b8f2641bb1f7a29c3f' AND file:hashes.SHA1 = '29234654f799ff6ea89fada6af32763c02fff1eb' AND file:hashes.SHA256 = '991a222bdbeb5d25b9f9445496112af904ac7b677b6296810727e6e403f5f5eb']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:14Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--7449d241-4e95-4a07-b3d4-e5aaf770bf80",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:14.000Z",
"modified": "2020-10-30T08:56:14.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-14T13:50:13+00:00",
"category": "Other",
"uuid": "371eac32-7a01-4b21-aa99-9c211d26e69a"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/991a222bdbeb5d25b9f9445496112af904ac7b677b6296810727e6e403f5f5eb/detection/f-991a222bdbeb5d25b9f9445496112af904ac7b677b6296810727e6e403f5f5eb-1602683413",
"category": "Payload delivery",
"uuid": "98782b08-3cb9-4519-bacf-cc0f79370fa5"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "39/69",
"category": "Payload delivery",
"uuid": "1ad9a3e3-ec87-419d-bbbd-2bb9a2e3e4cc"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--63c96554-bdeb-460e-a6fc-f34d987c6f9a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:14.000Z",
"modified": "2020-10-30T08:56:14.000Z",
"pattern": "[file:hashes.MD5 = 'cfe3c64842d025295eeda7b6ab470d89' AND file:hashes.SHA1 = '9be1e7531ab8f274f8fec3d56508f064dae91468' AND file:hashes.SHA256 = 'ceb4bfe175798179b0947da1ffd8eda13777b9d7b02bc75599b6f6907cf2c2c0']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:14Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--fc3eeb39-1a76-4f90-b349-5b18765ffbc6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:14.000Z",
"modified": "2020-10-30T08:56:14.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T00:49:06+00:00",
"category": "Other",
"uuid": "ccd64e68-9210-468b-824b-c67743d4c0c8"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/ceb4bfe175798179b0947da1ffd8eda13777b9d7b02bc75599b6f6907cf2c2c0/detection/f-ceb4bfe175798179b0947da1ffd8eda13777b9d7b02bc75599b6f6907cf2c2c0-1604018946",
"category": "Payload delivery",
"uuid": "c0900208-909a-4f1a-b796-068450e90c98"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "58/72",
"category": "Payload delivery",
"uuid": "1a4f0f04-9c4a-42b4-a8ef-493c5696ed0e"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7cc421fe-a7f7-4ce1-8350-e097b2d323a4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:14.000Z",
"modified": "2020-10-30T08:56:14.000Z",
"pattern": "[file:hashes.MD5 = '45ed8898bead32070cf1eb25640b414c' AND file:hashes.SHA1 = 'dd77cee3d418a6462b2e31fabc76510b8f2320d5' AND file:hashes.SHA256 = '836db6bde6f664fa42b020c7b4549713022eac87410c1ed1104b6d4df615a599']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:14Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--8007aa8a-ca37-4ade-927f-5a18d2494e6c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:14.000Z",
"modified": "2020-10-30T08:56:14.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-25T10:53:30+00:00",
"category": "Other",
"uuid": "48e8ad8d-5ac9-4216-92ad-6cfde0859a04"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/836db6bde6f664fa42b020c7b4549713022eac87410c1ed1104b6d4df615a599/detection/f-836db6bde6f664fa42b020c7b4549713022eac87410c1ed1104b6d4df615a599-1603623210",
"category": "Payload delivery",
"uuid": "b91ef160-3a78-42b8-a9bd-79c2deda76cd"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "37/60",
"category": "Payload delivery",
"uuid": "17cdd15b-0a53-4c60-928e-79d700a670e6"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--88bb68aa-24a7-43b4-aa66-2664b2d7a6fe",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:14.000Z",
"modified": "2020-10-30T08:56:14.000Z",
"pattern": "[file:hashes.MD5 = '6c4dacbefca90dad7ef318604e635e89' AND file:hashes.SHA1 = '5810d3a052d459760defbf479be15df1eebff48f' AND file:hashes.SHA256 = '1c05380af47696f7d7ef84b452fa4f662158d9f1caf7ad01a455061081d13653']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:14Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--4deb19ef-d3a2-469c-8867-ec0068cdecd0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:14.000Z",
"modified": "2020-10-30T08:56:14.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-27T08:46:00+00:00",
"category": "Other",
"uuid": "b6047dc1-e4ec-42cf-8a21-83ef4dd14dfb"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/1c05380af47696f7d7ef84b452fa4f662158d9f1caf7ad01a455061081d13653/detection/f-1c05380af47696f7d7ef84b452fa4f662158d9f1caf7ad01a455061081d13653-1603788360",
"category": "Payload delivery",
"uuid": "19ddb205-c2d4-45a9-86f5-b7c7ea2a6dbf"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "21/64",
"category": "Payload delivery",
"uuid": "2d846543-7036-4739-bde0-5384d0c6862c"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--87954ab5-4409-4ea3-94f8-165babf4c710",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:14.000Z",
"modified": "2020-10-30T08:56:14.000Z",
"pattern": "[file:hashes.MD5 = '7787793cbd6267fd2b90d959bf332bf4' AND file:hashes.SHA1 = '2e563c126e52fea3e2dc6ae7cb3e61d0ff00f65b' AND file:hashes.SHA256 = '68547344839166ef8e28dd31b40b35d94759eda2949eab654bf737dfe9d3edae']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:14Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--088808e2-c340-49e6-96a5-9b0bc41b85c4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:14.000Z",
"modified": "2020-10-30T08:56:14.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-03-03T14:58:16+00:00",
"category": "Other",
"uuid": "c02e3e5a-7dbd-4966-bba3-0a2f9d7807d7"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/68547344839166ef8e28dd31b40b35d94759eda2949eab654bf737dfe9d3edae/detection/f-68547344839166ef8e28dd31b40b35d94759eda2949eab654bf737dfe9d3edae-1583247496",
"category": "Payload delivery",
"uuid": "0086255f-45f8-4e5e-a8b0-127db41cac66"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "37/69",
"category": "Payload delivery",
"uuid": "c05d9519-2f1b-4579-af41-e30957c0ff8e"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2a2dd0a7-5011-4981-9b67-f02c12b8f45e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:14.000Z",
"modified": "2020-10-30T08:56:14.000Z",
"pattern": "[file:hashes.MD5 = 'bee5e78994ab779ebc2419af945d41bd' AND file:hashes.SHA1 = 'e51c0e251dd24eb2aa561f1e0b01fab249674b53' AND file:hashes.SHA256 = '956cd22a033de80926083810a0946ad764e0df61dfc0ad09af5e1947327281c9']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:14Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--31caa127-b831-4dba-a175-597008420dfd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:15.000Z",
"modified": "2020-10-30T08:56:15.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T00:47:39+00:00",
"category": "Other",
"uuid": "13a774b8-0fe4-4d5b-bd62-22ddb97585e3"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/956cd22a033de80926083810a0946ad764e0df61dfc0ad09af5e1947327281c9/detection/f-956cd22a033de80926083810a0946ad764e0df61dfc0ad09af5e1947327281c9-1604018859",
"category": "Payload delivery",
"uuid": "71c21224-1315-4446-9cbb-3dbb0ac083bd"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "59/72",
"category": "Payload delivery",
"uuid": "076cb55f-71e5-4843-ac9b-da129e7f5cbb"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8bb6b5f9-1eec-437c-b4e4-9f383f4cda2c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:15.000Z",
"modified": "2020-10-30T08:56:15.000Z",
"pattern": "[file:hashes.MD5 = 'a8ed5d85a362e3593a5c2e811ef705d1' AND file:hashes.SHA1 = '10f70fcc77e24a44601194f2aefc2477106bba17' AND file:hashes.SHA256 = '71fe1f1ce713e265b2c6693f83ed94a359e43e6aa60322baee599ba74a2f2ac0']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:15Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--c14b090b-a2e7-4aa9-88dc-22ce1ec164f5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:15.000Z",
"modified": "2020-10-30T08:56:15.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-06T01:52:28+00:00",
"category": "Other",
"uuid": "ca7c3792-8d4a-44be-9417-57f031ca2e75"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/71fe1f1ce713e265b2c6693f83ed94a359e43e6aa60322baee599ba74a2f2ac0/detection/f-71fe1f1ce713e265b2c6693f83ed94a359e43e6aa60322baee599ba74a2f2ac0-1601949148",
"category": "Payload delivery",
"uuid": "e32403e4-8c8b-437b-bcff-908bf9ecb27f"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "56/70",
"category": "Payload delivery",
"uuid": "7e2a64c1-2d3f-4e69-9349-6f5195238bfe"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ad88c285-5054-45f9-ace8-cdcfa5353a47",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:15.000Z",
"modified": "2020-10-30T08:56:15.000Z",
"pattern": "[file:hashes.MD5 = '8f044ca3d947bacaa6eb3102d002b10a' AND file:hashes.SHA1 = '9a454f50ec48736a36cf6e317dae93330ca2279a' AND file:hashes.SHA256 = 'ca4963745454cc8584cec4e53d27d78c86a4766a4f69b0b37617efcd915621c8']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:15Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--a5bb37a9-4148-4e6d-af0a-9f0236e9081c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:15.000Z",
"modified": "2020-10-30T08:56:15.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T00:48:58+00:00",
"category": "Other",
"uuid": "80a0277c-c012-4ac4-bdb5-6b056ff577d8"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/ca4963745454cc8584cec4e53d27d78c86a4766a4f69b0b37617efcd915621c8/detection/f-ca4963745454cc8584cec4e53d27d78c86a4766a4f69b0b37617efcd915621c8-1604018938",
"category": "Payload delivery",
"uuid": "18d87866-da97-49cb-8b71-cdde168bd4c7"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "58/72",
"category": "Payload delivery",
"uuid": "ba2073ee-1ef0-4d38-b3b0-b3f989437158"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c2cc0844-2ef9-4a4f-8073-8d562ec641b4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:15.000Z",
"modified": "2020-10-30T08:56:15.000Z",
"pattern": "[file:hashes.MD5 = '5628e7821300674c1d2d197c36ae27de' AND file:hashes.SHA1 = '3b48dcb3c2c812c595531b71a686c12d3a568a5a' AND file:hashes.SHA256 = '7f901d8f673d5e1fde07676b3287aa9a24dc92fb48e7ca82a163e0b0581ee7ad']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:15Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--2e469fab-9d51-49a5-8853-f1d932426d8e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:15.000Z",
"modified": "2020-10-30T08:56:15.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-18T06:57:45+00:00",
"category": "Other",
"uuid": "5503d3b5-e4e9-40d0-97d9-7c1d182d084c"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/7f901d8f673d5e1fde07676b3287aa9a24dc92fb48e7ca82a163e0b0581ee7ad/detection/f-7f901d8f673d5e1fde07676b3287aa9a24dc92fb48e7ca82a163e0b0581ee7ad-1603004265",
"category": "Payload delivery",
"uuid": "ab037109-c5d6-40c8-a459-baa3d2071072"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "60/71",
"category": "Payload delivery",
"uuid": "e2a3eecc-d632-484b-ad02-a4b79dccb224"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c0afae13-062d-49a7-a713-9a51b448b3a9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:15.000Z",
"modified": "2020-10-30T08:56:15.000Z",
"pattern": "[file:hashes.MD5 = '54bd58f706c85cfbb0f79b93a1ef5647' AND file:hashes.SHA1 = 'be1d0d758a601b28fe3e4b9ee89c11bb4efd714a' AND file:hashes.SHA256 = '31e9c92d7dce8b65dded9c40e67d9cfca33bf8870d460e73b02df8a035ca719f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:15Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--d578e159-ed9c-4d51-b571-5222bd7c89b9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:15.000Z",
"modified": "2020-10-30T08:56:15.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-15T05:04:41+00:00",
"category": "Other",
"uuid": "fc33538d-1b12-4e89-b31f-38dee195406e"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/31e9c92d7dce8b65dded9c40e67d9cfca33bf8870d460e73b02df8a035ca719f/detection/f-31e9c92d7dce8b65dded9c40e67d9cfca33bf8870d460e73b02df8a035ca719f-1602738281",
"category": "Payload delivery",
"uuid": "7b00b926-e966-44e2-8889-362205ae50bb"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "57/71",
"category": "Payload delivery",
"uuid": "e7e3daa1-8f49-44f0-a3f1-05a3a3700692"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d024baa3-1fec-4c1a-8553-0e6f98f25421",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:15.000Z",
"modified": "2020-10-30T08:56:15.000Z",
"pattern": "[file:hashes.MD5 = '52fd3e86aad283c1958c2babbba5d0bc' AND file:hashes.SHA1 = 'ed235c4335d0e5791ae2d183e2e41e4ec33ca769' AND file:hashes.SHA256 = '7c64c488a58473d9456d4f2f64b7bcb5eea03c32bd99650c59e38b0993eba7b3']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:15Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--313aaa43-c6cf-4b04-bbd2-2445367ac02c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:15.000Z",
"modified": "2020-10-30T08:56:15.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T00:44:18+00:00",
"category": "Other",
"uuid": "25c17078-8d97-4cd1-8d1d-2cb8a0353988"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/7c64c488a58473d9456d4f2f64b7bcb5eea03c32bd99650c59e38b0993eba7b3/detection/f-7c64c488a58473d9456d4f2f64b7bcb5eea03c32bd99650c59e38b0993eba7b3-1604018658",
"category": "Payload delivery",
"uuid": "b03c5cba-5200-40f6-8eb7-02f44ca96b76"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "61/72",
"category": "Payload delivery",
"uuid": "f37f7338-d308-462d-bfa3-95039c416bba"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--26310581-f95c-4206-abc1-7bf5c0a488ac",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:15.000Z",
"modified": "2020-10-30T08:56:15.000Z",
"pattern": "[file:hashes.MD5 = '51f052e28e66fc3735dd2977680bccf1' AND file:hashes.SHA1 = '1ae29d6fd93da47903fd001e83b39919698c258a' AND file:hashes.SHA256 = '2a2e39586e7232a3339d52453b477454bc44b6305c711dd9eb5ecf4394c55b10']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:15Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--798d4c42-9a74-4124-9c97-4d480a05aec4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:15.000Z",
"modified": "2020-10-30T08:56:15.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T00:42:45+00:00",
"category": "Other",
"uuid": "c6cfbf69-23b7-4400-81a3-e0f6dcebba5c"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/2a2e39586e7232a3339d52453b477454bc44b6305c711dd9eb5ecf4394c55b10/detection/f-2a2e39586e7232a3339d52453b477454bc44b6305c711dd9eb5ecf4394c55b10-1604018565",
"category": "Payload delivery",
"uuid": "ac4f2d3a-0c28-4034-aef9-b66b233a1ba5"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "59/72",
"category": "Payload delivery",
"uuid": "8f6249f0-08f0-4386-93c3-f8e7f71d2b6a"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e8b4a663-ff85-43cb-8398-8f1fbbc197cf",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:15.000Z",
"modified": "2020-10-30T08:56:15.000Z",
"pattern": "[file:hashes.MD5 = '5830d56abdd025531c75081a591cd65c' AND file:hashes.SHA1 = 'c508aef5aed97581b724999797659e695e1ea25a' AND file:hashes.SHA256 = '42d914b10255499859ee5919b183ca521ae483ac3edc2f1653d52487f9098342']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:15Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--55b4925d-4e59-40cf-918c-5cdf333dacfb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:15.000Z",
"modified": "2020-10-30T08:56:15.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-09-10T22:43:11+00:00",
"category": "Other",
"uuid": "cca767bd-c4e1-42dc-81dd-b7983eaaf19b"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/42d914b10255499859ee5919b183ca521ae483ac3edc2f1653d52487f9098342/detection/f-42d914b10255499859ee5919b183ca521ae483ac3edc2f1653d52487f9098342-1599777791",
"category": "Payload delivery",
"uuid": "b958872c-ba36-46ac-9ce8-73c5232fdf49"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "41/68",
"category": "Payload delivery",
"uuid": "4ee86566-a988-4eea-a649-b857f235f1f0"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ac1d0ce6-08f6-4b69-8614-6ab3044ecc44",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:15.000Z",
"modified": "2020-10-30T08:56:15.000Z",
"pattern": "[file:hashes.MD5 = 'ae273a9fcffc596bd3590e25358df530' AND file:hashes.SHA1 = '3b08a9eb4d3e9d0117d47e8d17dd59651f40855f' AND file:hashes.SHA256 = '8074bbc62a36ff2c0037634d3c45fdf40bfc372a7123f64c38f159c04d2391c6']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:15Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--7ceb59f0-3fa1-43ec-aeb8-16a783f01fe3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:15.000Z",
"modified": "2020-10-30T08:56:15.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T00:44:19+00:00",
"category": "Other",
"uuid": "7d99d950-1776-4171-95c9-07a168da0eae"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/8074bbc62a36ff2c0037634d3c45fdf40bfc372a7123f64c38f159c04d2391c6/detection/f-8074bbc62a36ff2c0037634d3c45fdf40bfc372a7123f64c38f159c04d2391c6-1604018659",
"category": "Payload delivery",
"uuid": "91aec557-872c-4c30-96cb-81488d493945"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "60/72",
"category": "Payload delivery",
"uuid": "bed5bf59-4422-4bcc-99e0-c7fe226bdb4c"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e1ca9c54-2ce8-44bb-bfca-350de81502ba",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:15.000Z",
"modified": "2020-10-30T08:56:15.000Z",
"pattern": "[file:hashes.MD5 = '338f61ec72842816598ad2e4119898db' AND file:hashes.SHA1 = '76e509a899030337e6e34c0b6fa420b6b6201ec3' AND file:hashes.SHA256 = '959e289a72a49a27d173d5c020969e27aa078a1521b3632ceb5e8c77fa01a342']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:15Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--aa951bc9-ef07-4251-aa0f-4538eee478de",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:15.000Z",
"modified": "2020-10-30T08:56:15.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T00:47:41+00:00",
"category": "Other",
"uuid": "1d468b29-f437-475a-9eff-8c794c1971dd"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/959e289a72a49a27d173d5c020969e27aa078a1521b3632ceb5e8c77fa01a342/detection/f-959e289a72a49a27d173d5c020969e27aa078a1521b3632ceb5e8c77fa01a342-1604018861",
"category": "Payload delivery",
"uuid": "c3bd2c20-7967-4a0f-8351-f904c90cd95b"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "58/70",
"category": "Payload delivery",
"uuid": "0980d278-861c-47e6-b560-d446580a4ff7"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--6fc8fff8-49cf-4081-a039-736633c0ed58",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:16.000Z",
"modified": "2020-10-30T08:56:16.000Z",
"pattern": "[file:hashes.MD5 = 'f9bef2eb1093eede8045e9dc61ba3939' AND file:hashes.SHA1 = '0c2f2c04650b744bbb772bbdf5633f33b3f71e36' AND file:hashes.SHA256 = 'cb039efaebc29c1cc5c0fcf8567de534993f447245a45db03c927af56f7096d7']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:16Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--383142fa-6e3a-4f81-9235-567eeb5b0ab6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:16.000Z",
"modified": "2020-10-30T08:56:16.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T00:49:04+00:00",
"category": "Other",
"uuid": "a062c9d3-7ead-448b-b064-ef67e0f432cf"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/cb039efaebc29c1cc5c0fcf8567de534993f447245a45db03c927af56f7096d7/detection/f-cb039efaebc29c1cc5c0fcf8567de534993f447245a45db03c927af56f7096d7-1604018944",
"category": "Payload delivery",
"uuid": "8439f342-9226-4652-8931-947b4b9d421e"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "58/72",
"category": "Payload delivery",
"uuid": "8bc07bbc-b914-4852-9d8e-ce77c21b474e"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3481a175-cb01-4840-9abe-cbd87234807a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:16.000Z",
"modified": "2020-10-30T08:56:16.000Z",
"pattern": "[file:hashes.MD5 = '8a07acd8c2a5a00df18315f76b1b2667' AND file:hashes.SHA1 = '3f82b5a53429ae95dce9a9b2f88f6635e08128ff' AND file:hashes.SHA256 = 'dee7fbf9d55f5ed197463d65694accc6861a181248f3e79b99f5444183d39805']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:16Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--8e613b40-bd32-45a9-93f9-f3339ef5265a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:16.000Z",
"modified": "2020-10-30T08:56:16.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-29T09:53:21+00:00",
"category": "Other",
"uuid": "d9272af9-92a8-46ca-8dd4-6a48d3bbeb7c"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/dee7fbf9d55f5ed197463d65694accc6861a181248f3e79b99f5444183d39805/detection/f-dee7fbf9d55f5ed197463d65694accc6861a181248f3e79b99f5444183d39805-1603965201",
"category": "Payload delivery",
"uuid": "744bc77a-f620-4fad-9468-315d778f2d2e"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "51/71",
"category": "Payload delivery",
"uuid": "214bb321-0783-4159-8c57-1737686e182c"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ee57c4f1-12e8-4d02-9d9b-7aff080fb603",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:16.000Z",
"modified": "2020-10-30T08:56:16.000Z",
"pattern": "[file:hashes.MD5 = 'c6baec0946bf6ccde48a0413a9c49c1b' AND file:hashes.SHA1 = '277410845de23288c4aa12507ce264d88874aa63' AND file:hashes.SHA256 = '087d2b51bec315fdbd938405c9cdcdf63f0d0bda42c7db89062ef3cccc45b525']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:16Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--09432c45-43fc-42cd-be4f-dadab4fedd84",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:16.000Z",
"modified": "2020-10-30T08:56:16.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T00:41:55+00:00",
"category": "Other",
"uuid": "f5d393fb-0d72-44f1-bc09-62153b3be469"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/087d2b51bec315fdbd938405c9cdcdf63f0d0bda42c7db89062ef3cccc45b525/detection/f-087d2b51bec315fdbd938405c9cdcdf63f0d0bda42c7db89062ef3cccc45b525-1604018515",
"category": "Payload delivery",
"uuid": "56410225-5040-4a54-9998-5579ae6c6306"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "59/71",
"category": "Payload delivery",
"uuid": "d1a52f48-fa0f-4ccd-ac12-1318997a5cad"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b78c654a-eb99-40d0-8b4f-598364a838d0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:16.000Z",
"modified": "2020-10-30T08:56:16.000Z",
"pattern": "[file:hashes.MD5 = '6b657b9e2aee50530ac89f7a1a970695' AND file:hashes.SHA1 = 'b82bc4fdf974cbda29193f63c8a04ea35cef3129' AND file:hashes.SHA256 = '641a07800e1e9542d0756a7bb740f80ec49aed633af0add108a6e00671e10757']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:16Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--b9366adb-2b69-4fa3-9d43-aa29ebe4b2cd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:16.000Z",
"modified": "2020-10-30T08:56:16.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T00:43:46+00:00",
"category": "Other",
"uuid": "2bd8a028-c314-4446-832d-fe5bad4cca4b"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/641a07800e1e9542d0756a7bb740f80ec49aed633af0add108a6e00671e10757/detection/f-641a07800e1e9542d0756a7bb740f80ec49aed633af0add108a6e00671e10757-1604018626",
"category": "Payload delivery",
"uuid": "a594c2da-789f-47b8-95c1-813a48e82b9d"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "58/72",
"category": "Payload delivery",
"uuid": "cb24ce39-4522-4ff4-9deb-cdaf4dccc18a"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2a3fb881-8056-4765-aa9a-27a80acc6bf2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:16.000Z",
"modified": "2020-10-30T08:56:16.000Z",
"pattern": "[file:hashes.MD5 = 'f11a64a174727afd094940241b337d06' AND file:hashes.SHA1 = '252699f458ebca8f86ee784d2bada1a183f8e482' AND file:hashes.SHA256 = '243408d1fa0c8a7a778d8bb224532c649409d0db76fc0ca2be385d193da22b1e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:16Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--4bd2979b-dbc0-40c3-9479-14121d9d47c7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:16.000Z",
"modified": "2020-10-30T08:56:16.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-05-29T08:05:35+00:00",
"category": "Other",
"uuid": "2dd8b90a-cd25-4468-9525-508b11626f29"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/243408d1fa0c8a7a778d8bb224532c649409d0db76fc0ca2be385d193da22b1e/detection/f-243408d1fa0c8a7a778d8bb224532c649409d0db76fc0ca2be385d193da22b1e-1590739535",
"category": "Payload delivery",
"uuid": "d829e613-9ca2-4103-aac0-7cb1c863e8d2"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "4/58",
"category": "Payload delivery",
"uuid": "4c6179c7-5232-4046-ba23-c9cd02165f6d"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--aef19916-9097-40ef-a7d3-243415f3d0d8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:16.000Z",
"modified": "2020-10-30T08:56:16.000Z",
"pattern": "[file:hashes.MD5 = '63f6b2067577f2ed002eb2bd1dd51238' AND file:hashes.SHA1 = '9087c9b5b704145db9cbc0b806300f9ff94b0a27' AND file:hashes.SHA256 = '2dcb2f1fe7fc145529c31328c150cd9a00a8b02e57a69f09211db334f78fe784']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:16Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--2b85fa93-dc70-4992-81eb-df1175ee277e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:16.000Z",
"modified": "2020-10-30T08:56:16.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-13T05:41:52+00:00",
"category": "Other",
"uuid": "66d7ebc3-44b5-46cb-a3aa-feea8257ae63"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/2dcb2f1fe7fc145529c31328c150cd9a00a8b02e57a69f09211db334f78fe784/detection/f-2dcb2f1fe7fc145529c31328c150cd9a00a8b02e57a69f09211db334f78fe784-1602567712",
"category": "Payload delivery",
"uuid": "e23c25c2-9e88-4cb0-a944-721f311315f9"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "56/69",
"category": "Payload delivery",
"uuid": "ba628f14-6bed-462b-b8fe-0f7971307a6d"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--cd330673-923f-4a4b-8ceb-46b108f3e454",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:16.000Z",
"modified": "2020-10-30T08:56:16.000Z",
"pattern": "[file:hashes.MD5 = '120cf4d1f8e624642afa69869ae1af6b' AND file:hashes.SHA1 = '5137162d579ffdb90013b212f7655f74d7d8cc64' AND file:hashes.SHA256 = 'ff5e6fbf14c5eb35c1b4f24e4b08b30ba2e512a4b25ab7b652f0567edb94097e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:16Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--e2c9a6cc-d8c4-4f67-8c61-5d407dcbba9a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:16.000Z",
"modified": "2020-10-30T08:56:16.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-17T15:26:19+00:00",
"category": "Other",
"uuid": "6e84ada4-b972-4764-a962-1ca023c89d48"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/ff5e6fbf14c5eb35c1b4f24e4b08b30ba2e512a4b25ab7b652f0567edb94097e/detection/f-ff5e6fbf14c5eb35c1b4f24e4b08b30ba2e512a4b25ab7b652f0567edb94097e-1602948379",
"category": "Payload delivery",
"uuid": "88b2e4a7-4aef-4320-8283-0aec5a8f9bba"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "46/68",
"category": "Payload delivery",
"uuid": "ad262e62-5f2f-4486-ab72-71261e6b7414"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0de8f154-20b4-4cbb-bff4-8387a4018315",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:16.000Z",
"modified": "2020-10-30T08:56:16.000Z",
"pattern": "[file:hashes.MD5 = '9e4b4cb4f9a898c267597feac791dbdd' AND file:hashes.SHA1 = 'fff33ee129006a824955f2704ff288d97dace950' AND file:hashes.SHA256 = '24e8413c8743a2349be66e1df415f8e8c8326b3e9fb8b4f158f8fde4409626af']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:16Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--176ed5ae-6f90-4672-9199-96121aaf2700",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:16.000Z",
"modified": "2020-10-30T08:56:16.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T00:42:39+00:00",
"category": "Other",
"uuid": "7a624ea1-5fb1-4607-b95f-b5253d8e7b2b"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/24e8413c8743a2349be66e1df415f8e8c8326b3e9fb8b4f158f8fde4409626af/detection/f-24e8413c8743a2349be66e1df415f8e8c8326b3e9fb8b4f158f8fde4409626af-1604018559",
"category": "Payload delivery",
"uuid": "06fb9cdb-c9d9-4277-b623-37e3313d87c7"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "56/68",
"category": "Payload delivery",
"uuid": "dc6db485-b10a-4218-8de7-1a72cd8f04f6"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7648e2bb-97f3-4136-8638-19438312c1f0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:16.000Z",
"modified": "2020-10-30T08:56:16.000Z",
"pattern": "[file:hashes.MD5 = '9143d36eb003675f475253b58a551fe9' AND file:hashes.SHA1 = '37d90ecaf4c83fde3bcf0cafe5ed67f88c1bfaca' AND file:hashes.SHA256 = '57b75ed78a4b94749fe25b14e7a6e3b357089b060b88aeb7a30144c6713e5afc']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:16Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--bb073d81-1582-4442-96c3-3154f7c5175a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:17.000Z",
"modified": "2020-10-30T08:56:17.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-08-31T07:23:50+00:00",
"category": "Other",
"uuid": "58c5e97e-1f64-4825-a8f9-4e1c546ba11d"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/57b75ed78a4b94749fe25b14e7a6e3b357089b060b88aeb7a30144c6713e5afc/detection/f-57b75ed78a4b94749fe25b14e7a6e3b357089b060b88aeb7a30144c6713e5afc-1598858630",
"category": "Payload delivery",
"uuid": "a4e829eb-4907-4f49-af82-c0738efc4516"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "41/68",
"category": "Payload delivery",
"uuid": "3248870e-d3d1-42ef-8543-0c44975f1de2"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f3f44c88-aac0-4659-ba55-ec85914a6a43",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:17.000Z",
"modified": "2020-10-30T08:56:17.000Z",
"pattern": "[file:hashes.MD5 = '50dd30bc1cca41ed34143287247e668e' AND file:hashes.SHA1 = 'f1248a89ee385a6f4fc6195a83c91870b5f600a4' AND file:hashes.SHA256 = '1dae20a13c71c11f3c2a2010d2577cd2b3601c1092a980c1305991681b178c46']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:17Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--223881fc-7e22-4e6e-8e2e-5ef678fe01fa",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:17.000Z",
"modified": "2020-10-30T08:56:17.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-12T04:17:44+00:00",
"category": "Other",
"uuid": "02591bd8-73b6-4fdb-93d4-7ebaf0cb3f92"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/1dae20a13c71c11f3c2a2010d2577cd2b3601c1092a980c1305991681b178c46/detection/f-1dae20a13c71c11f3c2a2010d2577cd2b3601c1092a980c1305991681b178c46-1602476264",
"category": "Payload delivery",
"uuid": "6f9be60c-2fc7-454b-9d6b-13f01dee4d85"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "55/70",
"category": "Payload delivery",
"uuid": "9a646a0c-be9d-45f2-b095-e0d89d985448"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d96379c5-a04f-450d-a1fa-5130b7a9cb47",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:17.000Z",
"modified": "2020-10-30T08:56:17.000Z",
"pattern": "[file:hashes.MD5 = 'b17a9f6d1916471dc4862aee9a76c26a' AND file:hashes.SHA1 = '2a92911b56f79bddeb6cb8b7869acb7ab9370b5e' AND file:hashes.SHA256 = '151983eab306e5fcd22b110cf36ddc2357564d40399d08ce8a70d7f78b0bfbbf']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:17Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--1a591c5c-22e2-4927-b929-cd9648cce64f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:17.000Z",
"modified": "2020-10-30T08:56:17.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-06T20:56:53+00:00",
"category": "Other",
"uuid": "fd42f2ba-e93c-48af-ae88-bf0dcc7fbe59"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/151983eab306e5fcd22b110cf36ddc2357564d40399d08ce8a70d7f78b0bfbbf/detection/f-151983eab306e5fcd22b110cf36ddc2357564d40399d08ce8a70d7f78b0bfbbf-1602017813",
"category": "Payload delivery",
"uuid": "193cc6c0-3252-4f88-badf-620984ef8643"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "37/69",
"category": "Payload delivery",
"uuid": "1fbef84f-f595-4842-8121-5ec58f592443"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a18de543-51a8-473e-bce8-8bd40a06da42",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:17.000Z",
"modified": "2020-10-30T08:56:17.000Z",
"pattern": "[file:hashes.MD5 = '442b0435ef029da1e47e9cf08c333e7c' AND file:hashes.SHA1 = 'b5bb04e2d7e5f931fd56e82f95f6cfed7c02dffc' AND file:hashes.SHA256 = 'fec4655a9f99931692ecc28d35e2e17ae03f0acbfe8bdf9de00a05437049ce69']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:17Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--41054227-3150-48aa-9ff9-e4107aead60e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:17.000Z",
"modified": "2020-10-30T08:56:17.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T00:50:07+00:00",
"category": "Other",
"uuid": "f47c866f-1b46-47af-8cc9-ef5d2165f551"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/fec4655a9f99931692ecc28d35e2e17ae03f0acbfe8bdf9de00a05437049ce69/detection/f-fec4655a9f99931692ecc28d35e2e17ae03f0acbfe8bdf9de00a05437049ce69-1604019007",
"category": "Payload delivery",
"uuid": "f09b880b-4ae9-4f2a-8d7b-f32a100ae0c0"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "45/72",
"category": "Payload delivery",
"uuid": "3784340f-31d5-4a9d-b316-b4253333e004"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--57592eb5-8a8b-469e-bf60-91c626a922a2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:17.000Z",
"modified": "2020-10-30T08:56:17.000Z",
"pattern": "[file:hashes.MD5 = '553a3cbe0b19e58c5d48e9b0396690bf' AND file:hashes.SHA1 = '15bafbd10d9bb078839da143510aacd540fab480' AND file:hashes.SHA256 = 'c9b06152ac1c851eaed84ee052c374341ed89d9a6e5a5d97bd0e4b941c01a274']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:17Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--71ba1cdd-c76a-4bad-98db-d57286d9b019",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:17.000Z",
"modified": "2020-10-30T08:56:17.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-16T14:44:27+00:00",
"category": "Other",
"uuid": "8aa819eb-dd99-4496-95f6-a9d71125c059"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/c9b06152ac1c851eaed84ee052c374341ed89d9a6e5a5d97bd0e4b941c01a274/detection/f-c9b06152ac1c851eaed84ee052c374341ed89d9a6e5a5d97bd0e4b941c01a274-1602859467",
"category": "Payload delivery",
"uuid": "5d636736-3253-4015-8b02-0ea8152edae2"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "46/68",
"category": "Payload delivery",
"uuid": "54489666-b82d-4c00-87b0-09fda419bee3"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--efafad91-2966-44fa-8c60-ddae7045e5d7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:17.000Z",
"modified": "2020-10-30T08:56:17.000Z",
"pattern": "[file:hashes.MD5 = 'd301bb6e5b1b3a82fab6fbd06f34869f' AND file:hashes.SHA1 = '3a4842cca5746e37998d3067e2366fe9a0f91265' AND file:hashes.SHA256 = 'f0bb1027787cd589b6c6ff6eba755d916f837d8753342f9ffa391fbbab718841']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:17Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--7bd9928c-6e1b-442f-a824-4e2734b88c6b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:17.000Z",
"modified": "2020-10-30T08:56:17.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T00:49:37+00:00",
"category": "Other",
"uuid": "76cc4d4d-02e9-4b98-be83-79b70852e6da"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/f0bb1027787cd589b6c6ff6eba755d916f837d8753342f9ffa391fbbab718841/detection/f-f0bb1027787cd589b6c6ff6eba755d916f837d8753342f9ffa391fbbab718841-1604018977",
"category": "Payload delivery",
"uuid": "0a12e25c-7af6-451c-89c4-7271054033fd"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "60/71",
"category": "Payload delivery",
"uuid": "e2bb5a54-e149-4d1b-bc9e-e77b95ce1488"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b5ad9db6-0a4e-469b-8ac0-253343f5ad6c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:17.000Z",
"modified": "2020-10-30T08:56:17.000Z",
"pattern": "[file:hashes.MD5 = '08e30482aa254ff92af3a14d8e0d0cb4' AND file:hashes.SHA1 = 'f561e3ae00b534805045f3ee86c5381d23d0fa1c' AND file:hashes.SHA256 = 'e5da410cbba9e76ea9510985653984b63e5af501a2e542c9c29def8c1ded23c3']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:17Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--bf16277d-9e5c-4ccb-9be4-d9cfbb73d9dc",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:17.000Z",
"modified": "2020-10-30T08:56:17.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-09-23T15:03:40+00:00",
"category": "Other",
"uuid": "9b8da257-06cb-402d-b93c-b855991943f2"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/e5da410cbba9e76ea9510985653984b63e5af501a2e542c9c29def8c1ded23c3/detection/f-e5da410cbba9e76ea9510985653984b63e5af501a2e542c9c29def8c1ded23c3-1600873420",
"category": "Payload delivery",
"uuid": "5a6cdba7-9243-4aa6-89ca-6fbc19414eb8"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "56/70",
"category": "Payload delivery",
"uuid": "b9071bf8-cadb-4ee0-a67d-5b0370841d19"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3aa019cf-6f11-4c11-8dc3-8fc6362cc78f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:17.000Z",
"modified": "2020-10-30T08:56:17.000Z",
"pattern": "[file:hashes.MD5 = '880a45ff31bc540e80ecf2cf93134c12' AND file:hashes.SHA1 = 'a09fb822da6e6a3b009a6239955f752a49b8ca2d' AND file:hashes.SHA256 = '694818ba3bbbd14949fea1441dd15ec721adc61f7f7de4cc728f449a2ef2c3c8']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:17Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--6ee0e6f3-3dc6-4bad-9153-ed89aa3bd203",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:17.000Z",
"modified": "2020-10-30T08:56:17.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-14T10:50:12+00:00",
"category": "Other",
"uuid": "a3ddd465-74c2-45e6-93b4-3601997147a7"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/694818ba3bbbd14949fea1441dd15ec721adc61f7f7de4cc728f449a2ef2c3c8/detection/f-694818ba3bbbd14949fea1441dd15ec721adc61f7f7de4cc728f449a2ef2c3c8-1602672612",
"category": "Payload delivery",
"uuid": "9f940b76-04e7-4942-a757-2b354988f75e"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "49/71",
"category": "Payload delivery",
"uuid": "09ee55b1-9932-4e9b-9a8c-4cc98405471a"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2e764a7c-ecba-4130-9a68-3133b53bf5df",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:17.000Z",
"modified": "2020-10-30T08:56:17.000Z",
"pattern": "[file:hashes.MD5 = 'bf8359bafbb198602226a01d73cde39b' AND file:hashes.SHA1 = '2229997bad7dbe5ee5a00c8977781dec861808d5' AND file:hashes.SHA256 = 'b43bb3af257e2c29ecf9add2ef4ad41c62e6b1298dc9af220ab0a285e23cb9db']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:17Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--e3bd6581-d6d2-4b6f-a9a9-e1b31abb699e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:17.000Z",
"modified": "2020-10-30T08:56:17.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T00:48:28+00:00",
"category": "Other",
"uuid": "37af8862-1b46-415e-9a04-9edf755549a9"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/b43bb3af257e2c29ecf9add2ef4ad41c62e6b1298dc9af220ab0a285e23cb9db/detection/f-b43bb3af257e2c29ecf9add2ef4ad41c62e6b1298dc9af220ab0a285e23cb9db-1604018908",
"category": "Payload delivery",
"uuid": "c10b3d9f-7fa7-402e-9887-a45789f4bcb6"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "58/71",
"category": "Payload delivery",
"uuid": "66158cd8-3d8e-4d84-8de0-73736f0f2cd2"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d7dfa178-99ac-4825-a28b-5cb6880e06cd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:17.000Z",
"modified": "2020-10-30T08:56:17.000Z",
"pattern": "[file:hashes.MD5 = '489e8a0c6e1ebd01b4c961b15a36ae4f' AND file:hashes.SHA1 = 'd4c4afd63f0b4e443c8fbfc0dadd67637b51b254' AND file:hashes.SHA256 = '15305978d7c42e26d908feca9aed4efa3df89ae6524ecce10752a2ee3cdf813f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:17Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--e4dcecdb-c624-4a3c-8204-66150147aa90",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:18.000Z",
"modified": "2020-10-30T08:56:18.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-29T11:15:45+00:00",
"category": "Other",
"uuid": "4daee468-f1df-4786-8ad2-48996c9aaca2"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/15305978d7c42e26d908feca9aed4efa3df89ae6524ecce10752a2ee3cdf813f/detection/f-15305978d7c42e26d908feca9aed4efa3df89ae6524ecce10752a2ee3cdf813f-1603970145",
"category": "Payload delivery",
"uuid": "d340d819-6501-4ae1-a2a7-0087d29c080e"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "29/71",
"category": "Payload delivery",
"uuid": "da565f7b-338f-4233-88f3-063a98aa6f41"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b6b91a9e-68d7-4ba3-8166-f504e3be3b6b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:18.000Z",
"modified": "2020-10-30T08:56:18.000Z",
"pattern": "[file:hashes.MD5 = 'a75ec259d5c10934a801694ecb97c965' AND file:hashes.SHA1 = '36bd911c5598cc089f0945b08fc5ad720d024cd8' AND file:hashes.SHA256 = 'c0af45fb5b5ecaff8130bed61a8cdb4bac98f2c9ccc774bd6034576f865aaf6f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:18Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--21e7e39a-bd74-415d-8e88-f25186436c50",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:18.000Z",
"modified": "2020-10-30T08:56:18.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T00:48:50+00:00",
"category": "Other",
"uuid": "afb736bb-7bb5-47cb-8e4b-ed1ff7dd3efb"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/c0af45fb5b5ecaff8130bed61a8cdb4bac98f2c9ccc774bd6034576f865aaf6f/detection/f-c0af45fb5b5ecaff8130bed61a8cdb4bac98f2c9ccc774bd6034576f865aaf6f-1604018930",
"category": "Payload delivery",
"uuid": "c445b283-0beb-492b-adc4-f185b30ff576"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "57/72",
"category": "Payload delivery",
"uuid": "4dca09d1-1cda-42f2-b183-6a9b5a1b10f9"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e87a965f-c0f1-4f03-897a-b5361fb2d880",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:18.000Z",
"modified": "2020-10-30T08:56:18.000Z",
"pattern": "[file:hashes.MD5 = 'd60d21b56705a455258f3569f27cf373' AND file:hashes.SHA1 = '896628d7cf7a34bd325b0fdd3f88e8bf80e6a383' AND file:hashes.SHA256 = '88da60e5764ac7ead4db3a9ad0aa9f40e509a1d2df0380fa2e55cfdc8e3ad70a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:18Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--025f1bca-c27e-471f-85ef-03184b237b0a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:18.000Z",
"modified": "2020-10-30T08:56:18.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-08-14T19:37:25+00:00",
"category": "Other",
"uuid": "3982ef20-e691-4e3c-9f2b-4cae187e62c4"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/88da60e5764ac7ead4db3a9ad0aa9f40e509a1d2df0380fa2e55cfdc8e3ad70a/detection/f-88da60e5764ac7ead4db3a9ad0aa9f40e509a1d2df0380fa2e55cfdc8e3ad70a-1597433845",
"category": "Payload delivery",
"uuid": "8d46e2b7-3db5-4c8b-822f-c1d09b238cb9"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "47/68",
"category": "Payload delivery",
"uuid": "a15c2c59-5433-4cd3-9bc3-35087dcd69d2"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--918be153-49bb-4879-b579-a382954e498c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:18.000Z",
"modified": "2020-10-30T08:56:18.000Z",
"pattern": "[file:hashes.MD5 = 'fd8a05a79a3fa71d2f2d2f8dcd3894bd' AND file:hashes.SHA1 = 'c36a26b346bd0a1ecb5ed288cfebebffefb06d0f' AND file:hashes.SHA256 = '86c18925097fed036b2f63a8c50891266b6d5f0ddde84ee57f6c4da06e77100b']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:18Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--a29d49c3-f6e7-4100-b436-0c41692ab3a2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:18.000Z",
"modified": "2020-10-30T08:56:18.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-09T12:09:43+00:00",
"category": "Other",
"uuid": "49844b33-9312-4ce6-8e01-d4c21f21043c"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/86c18925097fed036b2f63a8c50891266b6d5f0ddde84ee57f6c4da06e77100b/detection/f-86c18925097fed036b2f63a8c50891266b6d5f0ddde84ee57f6c4da06e77100b-1602245383",
"category": "Payload delivery",
"uuid": "87b78fd9-9874-4223-b8d1-cce7aa9356be"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "36/66",
"category": "Payload delivery",
"uuid": "7dacff4c-48d1-40a5-9109-9b8ce7fd2e01"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f7385be0-aa1d-4ef4-9157-6daec20898c1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:18.000Z",
"modified": "2020-10-30T08:56:18.000Z",
"pattern": "[file:hashes.MD5 = 'b8a368fc14d2ed67aecf7e13b9efcf25' AND file:hashes.SHA1 = '2e2f28087f68cae3e51db88b761fd99304459a12' AND file:hashes.SHA256 = '9df20496f03f1e916dbaecbe7e99db411cd8044c13572d691febf13c22b7c572']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:18Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--ff796147-94b9-4bb1-92e8-2a6fd814e7da",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:18.000Z",
"modified": "2020-10-30T08:56:18.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-01-24T13:50:42+00:00",
"category": "Other",
"uuid": "42e65ec8-9fcc-4c55-804f-10786d0ed25b"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/9df20496f03f1e916dbaecbe7e99db411cd8044c13572d691febf13c22b7c572/detection/f-9df20496f03f1e916dbaecbe7e99db411cd8044c13572d691febf13c22b7c572-1579873842",
"category": "Payload delivery",
"uuid": "a7cc6915-f71c-4954-8c9e-0c18064986d0"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "12/73",
"category": "Payload delivery",
"uuid": "73ebef01-55bc-4ab5-b4bc-d5cfa93a11b7"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--62c0a296-7be7-4cf1-984a-4b46b085caa4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:18.000Z",
"modified": "2020-10-30T08:56:18.000Z",
"pattern": "[file:hashes.MD5 = 'aa720ab9cf0ef76aeb1a7e149f6bc5c7' AND file:hashes.SHA1 = '0c46bf6e4fdcbf098df141bfd588976cf84acb68' AND file:hashes.SHA256 = '2788d54e094014cd18ec11263659c344330b55ff3b0a14941215f14557b77777']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:18Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--a9f7b81f-7604-443e-b586-0d3cf4805b56",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:18.000Z",
"modified": "2020-10-30T08:56:18.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-11T04:15:10+00:00",
"category": "Other",
"uuid": "4934476a-c325-4a79-8b4e-082eddaf6fc4"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/2788d54e094014cd18ec11263659c344330b55ff3b0a14941215f14557b77777/detection/f-2788d54e094014cd18ec11263659c344330b55ff3b0a14941215f14557b77777-1602389710",
"category": "Payload delivery",
"uuid": "7f5b3e3e-291a-405b-a674-c3b3adcc15d2"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "54/70",
"category": "Payload delivery",
"uuid": "b08699ac-77d8-4f98-81ac-9bac51ace8fa"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2dbadbc3-f1de-4ffb-92ad-bf50f91c6a19",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:18.000Z",
"modified": "2020-10-30T08:56:18.000Z",
"pattern": "[file:hashes.MD5 = '6afda62f82bd6585e40a6a86005567e8' AND file:hashes.SHA1 = '3ce224eaf4cb5ada496983b759ab113515c02cb0' AND file:hashes.SHA256 = '5fc68cab9ed345259fa2b452f63e9bc9b1c61285fb0445e60b2744c211bddeb8']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:18Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--bf998784-79f9-4511-a2b2-498c898e185a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:18.000Z",
"modified": "2020-10-30T08:56:18.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T00:43:36+00:00",
"category": "Other",
"uuid": "632bbd05-1bf9-4419-9cbe-0efc3539a62a"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/5fc68cab9ed345259fa2b452f63e9bc9b1c61285fb0445e60b2744c211bddeb8/detection/f-5fc68cab9ed345259fa2b452f63e9bc9b1c61285fb0445e60b2744c211bddeb8-1604018616",
"category": "Payload delivery",
"uuid": "265a3fbe-8909-4c37-943d-00ab678ab89d"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "61/72",
"category": "Payload delivery",
"uuid": "86d0ae30-362e-4d9e-aeb9-5e4bcbdf038a"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d331b125-a13e-4057-b5ce-bf053af711cf",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:18.000Z",
"modified": "2020-10-30T08:56:18.000Z",
"pattern": "[file:hashes.MD5 = '587a9cbcaec3ddceeba5a0fadd601d2d' AND file:hashes.SHA1 = '384bc386449f6e0c33d9345e6a934f63640e3706' AND file:hashes.SHA256 = '2af2ab80575400c191925d15f83726718655b8adad1c7bd02e4abe21d1004b95']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:18Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--de27aef4-ed60-404f-9ba4-597005687128",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:18.000Z",
"modified": "2020-10-30T08:56:18.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T00:42:47+00:00",
"category": "Other",
"uuid": "cd2f7d38-46a3-42da-b55f-58f6383a2930"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/2af2ab80575400c191925d15f83726718655b8adad1c7bd02e4abe21d1004b95/detection/f-2af2ab80575400c191925d15f83726718655b8adad1c7bd02e4abe21d1004b95-1604018567",
"category": "Payload delivery",
"uuid": "be6c3311-ce0f-48fd-b70e-671f482ac6e6"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "59/70",
"category": "Payload delivery",
"uuid": "d3a9136c-8931-4bcb-b939-f35c4473b6f7"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f2784493-71c7-4b60-ad28-ad9a09f8cdc0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:18.000Z",
"modified": "2020-10-30T08:56:18.000Z",
"pattern": "[file:hashes.MD5 = 'fcd62559c2fbd5e5834f46efd28939ac' AND file:hashes.SHA1 = '4c07ea60cae61d92e248c47225e726b191e48426' AND file:hashes.SHA256 = 'b2891d26b7b66dca32f02681a0f1f3866a2efae49d8b5ec6bf4cbbdf5ff35260']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:18Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--00ea0bff-a83d-406f-8b8f-a77c7be4c548",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:18.000Z",
"modified": "2020-10-30T08:56:18.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-10T07:38:58+00:00",
"category": "Other",
"uuid": "0abbdee7-5aa1-4c78-8444-5db9fe20f443"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/b2891d26b7b66dca32f02681a0f1f3866a2efae49d8b5ec6bf4cbbdf5ff35260/detection/f-b2891d26b7b66dca32f02681a0f1f3866a2efae49d8b5ec6bf4cbbdf5ff35260-1602315538",
"category": "Payload delivery",
"uuid": "0b3ed77a-29b1-4bec-a49b-f646d7533379"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "35/69",
"category": "Payload delivery",
"uuid": "b6c6c521-c013-4ce6-b366-333b36a3ad25"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--bd853739-de6d-4768-8a0a-ce7724eec488",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:18.000Z",
"modified": "2020-10-30T08:56:18.000Z",
"pattern": "[file:hashes.MD5 = '760260bff15dd371734758c89c748ee4' AND file:hashes.SHA1 = '4f957a30db5599f57777a0377119b9bd7cd40f78' AND file:hashes.SHA256 = 'b294f8636f7ac5318560f3b8f949c1004340923d6aaaceed93481c3ba916d407']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:18Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--2730a41a-4db9-4941-b48d-74b906548f6c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:19.000Z",
"modified": "2020-10-30T08:56:19.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-13T16:16:31+00:00",
"category": "Other",
"uuid": "c8a07a8e-c97e-472a-98a3-c8985ca0195a"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/b294f8636f7ac5318560f3b8f949c1004340923d6aaaceed93481c3ba916d407/detection/f-b294f8636f7ac5318560f3b8f949c1004340923d6aaaceed93481c3ba916d407-1602605791",
"category": "Payload delivery",
"uuid": "5ee87664-495e-4a59-9fa8-11fc4757174c"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "57/68",
"category": "Payload delivery",
"uuid": "dfffe232-cb81-4ad8-90a5-7e509f0b219a"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e910ee1e-2815-4633-b427-104b225074f5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:19.000Z",
"modified": "2020-10-30T08:56:19.000Z",
"pattern": "[file:hashes.MD5 = '25aa62b8f71e50b733100a65919cb451' AND file:hashes.SHA1 = '475ec23b841e135127546501e60afb2e58b62036' AND file:hashes.SHA256 = '21ead6c4722d06207332710f2dff6005bc5095034cffa7f60e57a77f651efa1c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:19Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--e068d586-bfea-47d5-93c3-350f8e62500d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:19.000Z",
"modified": "2020-10-30T08:56:19.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-04-17T16:43:50+00:00",
"category": "Other",
"uuid": "c98a78a4-2707-4192-882f-d7779c4b32c4"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/21ead6c4722d06207332710f2dff6005bc5095034cffa7f60e57a77f651efa1c/detection/f-21ead6c4722d06207332710f2dff6005bc5095034cffa7f60e57a77f651efa1c-1587141830",
"category": "Payload delivery",
"uuid": "7e7e11b9-12c6-41e2-8bf1-beb4728669d6"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "39/70",
"category": "Payload delivery",
"uuid": "6a5ebeed-1323-4e8d-9ead-abaa18973a1e"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--815fd311-7b72-48a8-b229-17fd3b51ee79",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:19.000Z",
"modified": "2020-10-30T08:56:19.000Z",
"pattern": "[file:hashes.MD5 = 'aae329ca530837a782b24119d66c526b' AND file:hashes.SHA1 = 'f06decb1964601d89cbefbe84e3a34a91f0ace18' AND file:hashes.SHA256 = '1bc061bbde8e89345da6461916fc70a4b2b50126ba25f553e15fa692bc22e92e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:19Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--8c70d678-a6ce-40f3-91f0-6f607cf17d29",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:19.000Z",
"modified": "2020-10-30T08:56:19.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T00:42:18+00:00",
"category": "Other",
"uuid": "7a882a94-ed65-43cb-9d5d-2799e6a91834"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/1bc061bbde8e89345da6461916fc70a4b2b50126ba25f553e15fa692bc22e92e/detection/f-1bc061bbde8e89345da6461916fc70a4b2b50126ba25f553e15fa692bc22e92e-1604018538",
"category": "Payload delivery",
"uuid": "62d41416-6671-4a84-ac0f-354982fecde3"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "59/71",
"category": "Payload delivery",
"uuid": "334ec7ce-d085-42d9-b3a2-463b8d35a0ab"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0405a5d7-db95-4327-95c0-b6a0a20542cf",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:19.000Z",
"modified": "2020-10-30T08:56:19.000Z",
"pattern": "[file:hashes.MD5 = 'f275ebb10010aa50fd9b5d8be10366ca' AND file:hashes.SHA1 = '99ce61ec58ac62c53685ba7812f155ba19c3fdf9' AND file:hashes.SHA256 = '7187ec55dcd998f3ee207a0733a162604c40dc6920ef47424bcbaaa1dba68da3']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:19Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--484616fd-564a-41cc-ab11-b27601894e64",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:19.000Z",
"modified": "2020-10-30T08:56:19.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-28T01:37:29+00:00",
"category": "Other",
"uuid": "8d9aafbc-430e-4676-b1da-7da86e63d9f4"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/7187ec55dcd998f3ee207a0733a162604c40dc6920ef47424bcbaaa1dba68da3/detection/f-7187ec55dcd998f3ee207a0733a162604c40dc6920ef47424bcbaaa1dba68da3-1603849049",
"category": "Payload delivery",
"uuid": "0c4fa807-9796-4683-9653-1196696686bd"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "40/61",
"category": "Payload delivery",
"uuid": "b8720b1e-ace1-4afd-ad3c-2145a53e1a13"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3789b1a0-f5cd-4797-ac5e-3d0818ba37b7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:19.000Z",
"modified": "2020-10-30T08:56:19.000Z",
"pattern": "[file:hashes.MD5 = '8092ab5e074ea60ac75415b29a2f7b10' AND file:hashes.SHA1 = '6fc0e1fddd24a8fbe93b9b8773da8e25f83a3dd7' AND file:hashes.SHA256 = '75d9c67b853fb26ba28ae5dcfc0631fd9fc4addc69d579edfd98bbbbdb4d9187']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:19Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--5579c4b5-b230-43d8-9886-a6121ec0cb5b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:19.000Z",
"modified": "2020-10-30T08:56:19.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-12T01:50:11+00:00",
"category": "Other",
"uuid": "4d9f5757-b5ef-47cb-bc8e-941ceb7a7f4c"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/75d9c67b853fb26ba28ae5dcfc0631fd9fc4addc69d579edfd98bbbbdb4d9187/detection/f-75d9c67b853fb26ba28ae5dcfc0631fd9fc4addc69d579edfd98bbbbdb4d9187-1602467411",
"category": "Payload delivery",
"uuid": "dba1d4a6-38a9-4326-ac9e-a45d8615739e"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "54/70",
"category": "Payload delivery",
"uuid": "ff512360-0db7-4a1a-86d0-e81bac2f9236"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--fc290971-f01f-4a27-b43c-07cd460da553",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:19.000Z",
"modified": "2020-10-30T08:56:19.000Z",
"pattern": "[file:hashes.MD5 = '4dbb604a804c77945f58cffa488cb48f' AND file:hashes.SHA1 = '0f5fbb9a2486fb5c0540e4d720e46035ca1fb9d8' AND file:hashes.SHA256 = '7b8f932ca62ecc8e0a071177075118ba4b050f785857925a3dac6835e230d602']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:19Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--a32edaaa-09b9-4070-9659-6f65980fa8c7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:19.000Z",
"modified": "2020-10-30T08:56:19.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-09-17T08:52:07+00:00",
"category": "Other",
"uuid": "bc8b5775-d4b3-4e5d-abdf-653fd5a30ee3"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/7b8f932ca62ecc8e0a071177075118ba4b050f785857925a3dac6835e230d602/detection/f-7b8f932ca62ecc8e0a071177075118ba4b050f785857925a3dac6835e230d602-1600332727",
"category": "Payload delivery",
"uuid": "3f757992-acb4-461d-bb48-dbec83688016"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "38/66",
"category": "Payload delivery",
"uuid": "5bd42475-dc81-4b67-b345-7071cd5569ba"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a3b413be-28f2-4493-a5ea-7ce2ddf052cf",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:19.000Z",
"modified": "2020-10-30T08:56:19.000Z",
"pattern": "[file:hashes.MD5 = '1a0dfbd78d21316167f4a05f56e25e6f' AND file:hashes.SHA1 = 'e0e3bc73e13628ed2d01184beab13bee6b97676c' AND file:hashes.SHA256 = 'b0a5775907994eea4adf0faa505b28160d22507c1690ca508820e26fb4ca3bca']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:19Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--d355ca07-12b1-4d4b-ae89-aedc781725c1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:19.000Z",
"modified": "2020-10-30T08:56:19.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-15T07:18:49+00:00",
"category": "Other",
"uuid": "bcaea4e3-b356-4de4-8fe6-022e9a11cab6"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/b0a5775907994eea4adf0faa505b28160d22507c1690ca508820e26fb4ca3bca/detection/f-b0a5775907994eea4adf0faa505b28160d22507c1690ca508820e26fb4ca3bca-1602746329",
"category": "Payload delivery",
"uuid": "610efae1-2900-45ab-b7f2-31b44ca48a07"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "56/70",
"category": "Payload delivery",
"uuid": "10c04fc3-2e1b-451e-8c82-2ae23ad31a2b"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--df33d0fa-6d8d-438b-b826-144b187ece1c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:19.000Z",
"modified": "2020-10-30T08:56:19.000Z",
"pattern": "[file:hashes.MD5 = '3bbf3184e8600a3b9748011100a0cb18' AND file:hashes.SHA1 = '783603cc5d3253097cfd798ca4c1e46057081560' AND file:hashes.SHA256 = 'd22cfa87be0f204ae7da13897dfcd075c9f25414e1792762412e9ae61d0ce3f0']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:19Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--74b71387-2317-4822-b0f2-01ad97f9047e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:19.000Z",
"modified": "2020-10-30T08:56:19.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-29T17:29:14+00:00",
"category": "Other",
"uuid": "e656fe37-d9f3-4bbe-b2ec-824c6a68ae4d"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/d22cfa87be0f204ae7da13897dfcd075c9f25414e1792762412e9ae61d0ce3f0/detection/f-d22cfa87be0f204ae7da13897dfcd075c9f25414e1792762412e9ae61d0ce3f0-1603992554",
"category": "Payload delivery",
"uuid": "493131a4-5905-4012-8319-235f3deedb97"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "19/72",
"category": "Payload delivery",
"uuid": "9197b145-401e-494f-8bd5-9f71ae716b9a"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9af3492c-af01-4736-86e1-3430a33b492a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:19.000Z",
"modified": "2020-10-30T08:56:19.000Z",
"pattern": "[file:hashes.MD5 = '98c0b1dff2cdaa3bce5af881241e35b1' AND file:hashes.SHA1 = 'c59602398e803780cfd9e2b533fcf3c3f415484b' AND file:hashes.SHA256 = 'd931fe8da243e359e9e14f529eafe590b8c2dd1e76ca1ad833dd0f927648f88b']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:19Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--3177bc73-b1ec-43db-bdde-4042d60c51cd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:19.000Z",
"modified": "2020-10-30T08:56:19.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-01-23T22:03:52+00:00",
"category": "Other",
"uuid": "0bf69c02-13be-47f6-9a19-1bd781330a83"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/d931fe8da243e359e9e14f529eafe590b8c2dd1e76ca1ad833dd0f927648f88b/detection/f-d931fe8da243e359e9e14f529eafe590b8c2dd1e76ca1ad833dd0f927648f88b-1579817032",
"category": "Payload delivery",
"uuid": "ac130e21-39a9-48fa-b20c-c5f2ce9c5e04"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "45/72",
"category": "Payload delivery",
"uuid": "b646dbfa-2d6b-4758-aff7-389a5a6df06d"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--eaac6baa-ed1f-4dbf-b0d6-438bf4ce64b5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:19.000Z",
"modified": "2020-10-30T08:56:19.000Z",
"pattern": "[file:hashes.MD5 = '3789bb16ff935931d9c78a69084b2296' AND file:hashes.SHA1 = '5024612d41766b59180521d5025a734a0be575b3' AND file:hashes.SHA256 = 'b89742731932a116bd973e61628bbe4f5d7d92b53df3402e404f63003bac5104']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:19Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--86b6ea9e-9699-4e6e-b2e4-5d289359ccc7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:20.000Z",
"modified": "2020-10-30T08:56:20.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-09-18T21:53:10+00:00",
"category": "Other",
"uuid": "8225f9e6-80ac-4dbc-a20a-d93f6f53a53d"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/b89742731932a116bd973e61628bbe4f5d7d92b53df3402e404f63003bac5104/detection/f-b89742731932a116bd973e61628bbe4f5d7d92b53df3402e404f63003bac5104-1600465990",
"category": "Payload delivery",
"uuid": "a80ec924-0d21-404f-9a89-c61fdc9c00fb"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "45/65",
"category": "Payload delivery",
"uuid": "6f9841bc-4765-48f5-89a1-7f88ebd01b7f"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f3344dbd-f6a7-484d-a4d9-75fb5e9b9acf",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:20.000Z",
"modified": "2020-10-30T08:56:20.000Z",
"pattern": "[file:hashes.MD5 = '60402b4ddfcd3b9a62554fb1a796d9e8' AND file:hashes.SHA1 = '88eb5f98dda8899c93ac2b0c802d00e424fd4219' AND file:hashes.SHA256 = '7bdaaf431bbf0880b0f1276042bd1adeb192d183795c30834b61e2335d279230']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:20Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--f00111c5-411a-4b56-8240-726b65b12afb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:20.000Z",
"modified": "2020-10-30T08:56:20.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T00:44:14+00:00",
"category": "Other",
"uuid": "24786b64-3b03-4258-afb0-eff0acf003ab"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/7bdaaf431bbf0880b0f1276042bd1adeb192d183795c30834b61e2335d279230/detection/f-7bdaaf431bbf0880b0f1276042bd1adeb192d183795c30834b61e2335d279230-1604018654",
"category": "Payload delivery",
"uuid": "7cb7c92a-098f-4bca-9160-62c49fd95813"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "54/69",
"category": "Payload delivery",
"uuid": "d80934ea-038d-4ac3-8f6b-7b55f24250d4"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--29e91ca5-7461-4a16-b343-c0fb04e0ce3c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:20.000Z",
"modified": "2020-10-30T08:56:20.000Z",
"pattern": "[file:hashes.MD5 = '90d07971e399187003e0b9bbd8bc11b2' AND file:hashes.SHA1 = 'a9e1573278794ecbc5ddf2c2bdbdff63ea2d0f4d' AND file:hashes.SHA256 = 'f9c6dca22e336cf71ce4be540905b34b5a63a7d02eb9bbd8a40fc83e37154c22']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:20Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--58c39a24-6350-4af2-ab12-ad1a4af2e1db",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:20.000Z",
"modified": "2020-10-30T08:56:20.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-08-26T20:40:33+00:00",
"category": "Other",
"uuid": "ab8045de-b5de-46df-884b-2484c26f016f"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/f9c6dca22e336cf71ce4be540905b34b5a63a7d02eb9bbd8a40fc83e37154c22/detection/f-f9c6dca22e336cf71ce4be540905b34b5a63a7d02eb9bbd8a40fc83e37154c22-1598474433",
"category": "Payload delivery",
"uuid": "f1777a00-b268-48da-ad64-166a073418a8"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "49/69",
"category": "Payload delivery",
"uuid": "5f2c6e0c-4760-4fea-b05b-79a3c7990e2a"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--12b3a3a2-6f5a-4654-b899-6a56b204da23",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:20.000Z",
"modified": "2020-10-30T08:56:20.000Z",
"pattern": "[file:hashes.MD5 = '2445fed3c3af5916c86cf068ba57652c' AND file:hashes.SHA1 = '15744a030426d5501cba747971a86d5039ba4d49' AND file:hashes.SHA256 = 'f9507a76801d5b1b83704a5019cdc312de18b004f16c5547b91b7dba086b2e29']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:20Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--09e6d590-7b5e-405c-b4fc-55538d5ed355",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:20.000Z",
"modified": "2020-10-30T08:56:20.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-04-06T18:32:38+00:00",
"category": "Other",
"uuid": "479c277f-abc3-4252-bc8d-b9d376047860"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/f9507a76801d5b1b83704a5019cdc312de18b004f16c5547b91b7dba086b2e29/detection/f-f9507a76801d5b1b83704a5019cdc312de18b004f16c5547b91b7dba086b2e29-1586197958",
"category": "Payload delivery",
"uuid": "32dfab4f-e186-4076-b564-86d1803fde2f"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "49/72",
"category": "Payload delivery",
"uuid": "4af6f9e4-4883-45a0-bd14-65ed01dfb23b"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--959930b1-e452-4086-8de7-f4eb2211867a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:20.000Z",
"modified": "2020-10-30T08:56:20.000Z",
"pattern": "[file:hashes.MD5 = '62660f7917629bdada5fae9be4866f7f' AND file:hashes.SHA1 = 'bbd1a374e7852a2f70369aac2d9eb7bacd4debe3' AND file:hashes.SHA256 = '8447befbf1643aae5219fc13354628f00c61683fb7b86bb0294a95b3eb62a344']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:20Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--075a0a66-ea46-4d51-93a6-8b806b4e06e4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:20.000Z",
"modified": "2020-10-30T08:56:20.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T00:44:28+00:00",
"category": "Other",
"uuid": "aea58c8e-290d-4d36-8362-0c897c806e49"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/8447befbf1643aae5219fc13354628f00c61683fb7b86bb0294a95b3eb62a344/detection/f-8447befbf1643aae5219fc13354628f00c61683fb7b86bb0294a95b3eb62a344-1604018668",
"category": "Payload delivery",
"uuid": "e8eb206a-fdd3-4ca5-ad5b-8a926c45e01f"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "59/72",
"category": "Payload delivery",
"uuid": "a014f997-a5e4-4d54-a955-3f0741ca026f"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--48526a88-0d80-4ddd-b72c-eff9063d9336",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:20.000Z",
"modified": "2020-10-30T08:56:20.000Z",
"pattern": "[file:hashes.MD5 = 'ba17a1fd0e350c77a58c88ae6aa28aaa' AND file:hashes.SHA1 = '1da3a7a84386aa4a278677bff97c5e23aa6bbd0a' AND file:hashes.SHA256 = '2376a8da650c124b3d916765f82929b4109f20bc4f211a39a4d1cd4391780d1f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:20Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--9ce1ccb1-8ae7-4ac8-abb6-3d1526ae1fdb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:20.000Z",
"modified": "2020-10-30T08:56:20.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-27T14:40:07+00:00",
"category": "Other",
"uuid": "6746d61b-402d-42eb-845a-ac0d606d9a07"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/2376a8da650c124b3d916765f82929b4109f20bc4f211a39a4d1cd4391780d1f/detection/f-2376a8da650c124b3d916765f82929b4109f20bc4f211a39a4d1cd4391780d1f-1603809607",
"category": "Payload delivery",
"uuid": "7e3836dc-32bc-454a-aab4-e9f0325789ca"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "59/69",
"category": "Payload delivery",
"uuid": "516e8d41-087e-4293-a7ef-6f14e28f413d"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4b8826a4-1cb6-4ce6-b5a7-2ea20fafcfb4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:20.000Z",
"modified": "2020-10-30T08:56:20.000Z",
"pattern": "[file:hashes.MD5 = 'ed0f520d410a684c6d0548dbf4caea98' AND file:hashes.SHA1 = '6381fc7e6d39549e0f7e65ac8151eeb6d70ecef9' AND file:hashes.SHA256 = '093ac1213b112c7eb7c46000f04160af37339ce0d6fff514f0941f2b5ab48829']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:20Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--d3c98553-110e-4c61-a5e7-048641e3c170",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:20.000Z",
"modified": "2020-10-30T08:56:20.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T00:41:57+00:00",
"category": "Other",
"uuid": "03aac0eb-30cf-4098-bea6-f8f9f5b4a567"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/093ac1213b112c7eb7c46000f04160af37339ce0d6fff514f0941f2b5ab48829/detection/f-093ac1213b112c7eb7c46000f04160af37339ce0d6fff514f0941f2b5ab48829-1604018517",
"category": "Payload delivery",
"uuid": "636638d9-d98b-400e-982f-a7ad73a323f4"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "41/71",
"category": "Payload delivery",
"uuid": "2aa0152a-f9ba-4525-98b4-aa6e539d9bb6"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--34884b9e-28f3-4729-8ca3-8875cae378cb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:20.000Z",
"modified": "2020-10-30T08:56:20.000Z",
"pattern": "[file:hashes.MD5 = '7e7023a81ca8f0d86211899ca85a5ba8' AND file:hashes.SHA1 = '7269f7b584b54a106a32b6b0223690dbb1a24763' AND file:hashes.SHA256 = 'ae696adba9e93dbc97b2f0a0c13c962cd90e5b03943e68f06e6e1b8f8d6cbd00']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:20Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--a309d336-b26a-445f-93f0-fce29cdc5fb3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:20.000Z",
"modified": "2020-10-30T08:56:20.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T00:48:10+00:00",
"category": "Other",
"uuid": "347147bb-531a-41ec-b98b-baa592a28159"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/ae696adba9e93dbc97b2f0a0c13c962cd90e5b03943e68f06e6e1b8f8d6cbd00/detection/f-ae696adba9e93dbc97b2f0a0c13c962cd90e5b03943e68f06e6e1b8f8d6cbd00-1604018890",
"category": "Payload delivery",
"uuid": "7a97011c-3a0f-40e6-b081-00c1c348f888"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "57/72",
"category": "Payload delivery",
"uuid": "ebfa459e-87fb-4cfb-84c0-a07d1c4834cd"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b61b3d4a-28e6-44ef-b1b2-a2b36a4eae64",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:20.000Z",
"modified": "2020-10-30T08:56:20.000Z",
"pattern": "[file:hashes.MD5 = '1b86ed07525ddecddcb8aea6c9caada2' AND file:hashes.SHA1 = '75148f9225000ad9114d3802122a6fbc1167d15f' AND file:hashes.SHA256 = '1925d5e283a220497385b4d8ca268665c729d1e029692e23431c327a8378fe23']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:20Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--0e1f1a26-a52d-4079-96b3-0db6699c2ac5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:20.000Z",
"modified": "2020-10-30T08:56:20.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T00:42:16+00:00",
"category": "Other",
"uuid": "ab66d988-c6d3-44b4-8959-61ef5b55dcd1"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/1925d5e283a220497385b4d8ca268665c729d1e029692e23431c327a8378fe23/detection/f-1925d5e283a220497385b4d8ca268665c729d1e029692e23431c327a8378fe23-1604018536",
"category": "Payload delivery",
"uuid": "4bf3c1e2-a108-432a-92ec-927ad7f815ab"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "59/72",
"category": "Payload delivery",
"uuid": "4efdfd9f-23bb-4693-b1fd-adcaf9101e18"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1c0f1467-b600-477e-b547-2f3fab94e40c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:20.000Z",
"modified": "2020-10-30T08:56:20.000Z",
"pattern": "[file:hashes.MD5 = 'f1c35cf848d984785e9c0621958fe5ae' AND file:hashes.SHA1 = '90b9229c12362b32b42fb66118bdf1adc597d2f0' AND file:hashes.SHA256 = '609401cd35b4ede77bb717005bd2875f0a018442e194ec8af78595f185665f12']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:20Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--493ee987-5bd4-4447-a109-50c6fdeeae8c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:21.000Z",
"modified": "2020-10-30T08:56:21.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-10T07:38:45+00:00",
"category": "Other",
"uuid": "5a4e4203-ba41-4926-a806-11363e6e30ae"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/609401cd35b4ede77bb717005bd2875f0a018442e194ec8af78595f185665f12/detection/f-609401cd35b4ede77bb717005bd2875f0a018442e194ec8af78595f185665f12-1602315525",
"category": "Payload delivery",
"uuid": "8dd099cc-a900-47bd-982e-9ab9e06fda5b"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "41/68",
"category": "Payload delivery",
"uuid": "ca8d14bc-2d72-4db2-9324-810f56ba0c8e"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8ebf900e-115e-4b27-b918-a07645b68a14",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:21.000Z",
"modified": "2020-10-30T08:56:21.000Z",
"pattern": "[file:hashes.MD5 = '12dddb2cdefb0a99005639511fc0ffd1' AND file:hashes.SHA1 = '3bbeafa82894becec6bd6c62f3e90c3c7e576184' AND file:hashes.SHA256 = '10f0cb6dc3bb42145482fd3b353b11626283edd62b6a6a6b1505927d6d71a914']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:21Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--fb7fb320-1174-403e-b929-eb9db6eed7b3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:21.000Z",
"modified": "2020-10-30T08:56:21.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-26T07:39:11+00:00",
"category": "Other",
"uuid": "5030fe48-1c54-412e-8eec-06ca22c7901f"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/10f0cb6dc3bb42145482fd3b353b11626283edd62b6a6a6b1505927d6d71a914/detection/f-10f0cb6dc3bb42145482fd3b353b11626283edd62b6a6a6b1505927d6d71a914-1603697951",
"category": "Payload delivery",
"uuid": "68241317-3fb8-4335-9abf-22b530128147"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "52/61",
"category": "Payload delivery",
"uuid": "65e3a43e-75aa-4408-ad00-1e4cd4719015"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2a4282df-4e58-4422-bee3-ed2865b6b284",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:21.000Z",
"modified": "2020-10-30T08:56:21.000Z",
"pattern": "[file:hashes.MD5 = '5b6fbbc6df37810784d79ac27774b8bd' AND file:hashes.SHA1 = '0d4e5242c96844fd39b13093f14f9a34368d4f03' AND file:hashes.SHA256 = '032a087b0f7c722a64bbced9612e84bb0a7f1872a8b94406ca49827d56aa466d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:21Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--7c97fc9c-4c09-4493-adf7-12e22ac2594a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:21.000Z",
"modified": "2020-10-30T08:56:21.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-08-17T21:56:22+00:00",
"category": "Other",
"uuid": "d0863e5b-bd32-45ae-8705-3a9908072cef"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/032a087b0f7c722a64bbced9612e84bb0a7f1872a8b94406ca49827d56aa466d/detection/f-032a087b0f7c722a64bbced9612e84bb0a7f1872a8b94406ca49827d56aa466d-1597701382",
"category": "Payload delivery",
"uuid": "88879f13-0bb7-47ae-9564-c64712ab0b44"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "44/69",
"category": "Payload delivery",
"uuid": "c047a1ec-ca16-4d5d-be0b-1d4e73017fe8"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7d7d4a70-ee4c-43b8-aa5d-42b62e4aa777",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:21.000Z",
"modified": "2020-10-30T08:56:21.000Z",
"pattern": "[file:hashes.MD5 = '0df5fb7e8015daeec8944c9681676eae' AND file:hashes.SHA1 = 'f3da880ebb254f5f191f2e546eec8c5518fa991b' AND file:hashes.SHA256 = '52951e174db7986b334417d5641b06a80464c9665bf82393857fa6700beef006']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:21Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--2e02e67e-0651-4277-94da-242d2e623fa6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:21.000Z",
"modified": "2020-10-30T08:56:21.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-29T03:27:59+00:00",
"category": "Other",
"uuid": "22d07f65-3594-480c-a396-a2491a9bc243"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/52951e174db7986b334417d5641b06a80464c9665bf82393857fa6700beef006/detection/f-52951e174db7986b334417d5641b06a80464c9665bf82393857fa6700beef006-1603942079",
"category": "Payload delivery",
"uuid": "7164e6c6-60a3-4cb2-b89a-5186f1fb025b"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "38/70",
"category": "Payload delivery",
"uuid": "27e8c5df-c886-40e2-8880-a86283a3fc13"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c57ba634-6efb-408a-8c09-2a0e293ca19f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:21.000Z",
"modified": "2020-10-30T08:56:21.000Z",
"pattern": "[file:hashes.MD5 = 'f0a7c2c089f2b1ebdd488e4bda4ac1cf' AND file:hashes.SHA1 = '2d763482008bcfa1f0476049029fef017c58192f' AND file:hashes.SHA256 = '8e421c6145b4ee499c747c7544d16f331d0bfd282b40efddcf66d8eb3fbf51cd']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:21Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--3df16408-ad08-4c07-b8ed-013fb5e5776a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:21.000Z",
"modified": "2020-10-30T08:56:21.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T00:47:34+00:00",
"category": "Other",
"uuid": "afd1d726-9cd1-4dd5-a18e-5f189e80ae63"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/8e421c6145b4ee499c747c7544d16f331d0bfd282b40efddcf66d8eb3fbf51cd/detection/f-8e421c6145b4ee499c747c7544d16f331d0bfd282b40efddcf66d8eb3fbf51cd-1604018854",
"category": "Payload delivery",
"uuid": "8780e61e-0ed8-43c8-9ba1-fb4bba225b78"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "58/70",
"category": "Payload delivery",
"uuid": "8bf05649-5f13-4541-a51d-1e5e8ebb694b"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--38d1cb99-e855-4370-a0a8-e182a278c949",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:21.000Z",
"modified": "2020-10-30T08:56:21.000Z",
"pattern": "[file:hashes.MD5 = '27b341fa2aa731335273204cb112a414' AND file:hashes.SHA1 = '3ba6ebc1ceca4a37fd13ac4875f2afddb046151c' AND file:hashes.SHA256 = '2facd367c1299ef200934cfd06279f177f9e3145164e4bd595e2b94a403a1b02']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:21Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--3f5d58f8-14e3-4c42-a101-615cd46b331e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:21.000Z",
"modified": "2020-10-30T08:56:21.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T00:42:54+00:00",
"category": "Other",
"uuid": "620b9489-b831-4d11-9d0e-3ab96a435eb6"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/2facd367c1299ef200934cfd06279f177f9e3145164e4bd595e2b94a403a1b02/detection/f-2facd367c1299ef200934cfd06279f177f9e3145164e4bd595e2b94a403a1b02-1604018574",
"category": "Payload delivery",
"uuid": "b9be9685-9639-4ba3-9e9a-82f84b3556b8"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "55/69",
"category": "Payload delivery",
"uuid": "6ccc5a58-15da-4d8c-98ab-be569022477e"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--255c13ee-0a73-4ee2-8a83-faa9dd470949",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:21.000Z",
"modified": "2020-10-30T08:56:21.000Z",
"pattern": "[file:hashes.MD5 = '9e7167948aa758165ce8cfe9c18ff599' AND file:hashes.SHA1 = 'e1ada7d696ec814d5b4f6705155853df17fded08' AND file:hashes.SHA256 = '328456cc7c585d290ba0543f6183afb0f8e31a1cfd24019644ea6471129bad9d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:21Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--55e00e7a-0bd7-454a-a2ea-89b3f6657ffc",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:21.000Z",
"modified": "2020-10-30T08:56:21.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-12T15:12:41+00:00",
"category": "Other",
"uuid": "66b6a92d-d119-4db8-b1e4-5dc3c07a4471"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/328456cc7c585d290ba0543f6183afb0f8e31a1cfd24019644ea6471129bad9d/detection/f-328456cc7c585d290ba0543f6183afb0f8e31a1cfd24019644ea6471129bad9d-1602515561",
"category": "Payload delivery",
"uuid": "8e9f077f-d39d-45ff-9ed0-2475a8c234e7"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "56/70",
"category": "Payload delivery",
"uuid": "35dd3925-d59c-4cce-9177-8917d2cfea5b"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1e2f2b4a-6d4c-4a60-84ff-7ea3d7593836",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:21.000Z",
"modified": "2020-10-30T08:56:21.000Z",
"pattern": "[file:hashes.MD5 = '1ec098f0eae243d12a2f04e7a96b59e5' AND file:hashes.SHA1 = 'e058f8c7ae04b5a339ebd89922b10f803cb82877' AND file:hashes.SHA256 = '3c484486d455b4c13e8fbbf612b4ab3c4cfc519dd5a81c2478a7e4ab9c08e83a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:21Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--7ab00ac0-8a31-4970-a44a-af22ef8267dc",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:21.000Z",
"modified": "2020-10-30T08:56:21.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-16T10:02:23+00:00",
"category": "Other",
"uuid": "6f3e7988-85e6-4fe1-9111-410bb54666e5"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/3c484486d455b4c13e8fbbf612b4ab3c4cfc519dd5a81c2478a7e4ab9c08e83a/detection/f-3c484486d455b4c13e8fbbf612b4ab3c4cfc519dd5a81c2478a7e4ab9c08e83a-1602842543",
"category": "Payload delivery",
"uuid": "e0bad524-2e44-4d13-a047-f3bd2fbcd011"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "57/70",
"category": "Payload delivery",
"uuid": "a8f45bb3-bee9-4207-b9cf-1db176792d09"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9dab14e9-110e-4e3c-b6ef-077e8b271b1c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:21.000Z",
"modified": "2020-10-30T08:56:21.000Z",
"pattern": "[file:hashes.MD5 = '19cd00f27ac3aa90ca7262df46bbdaea' AND file:hashes.SHA1 = '4b031da0ee0881b1becce11c195a42302180b7b6' AND file:hashes.SHA256 = 'd8ab0c6982ea7674ed4e53e4bfc7234a56b018090819b79f67a9cc6034fc98e2']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:21Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--a0ef52a5-9179-4e7d-8599-c91ce3cbc3ed",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:21.000Z",
"modified": "2020-10-30T08:56:21.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T00:49:12+00:00",
"category": "Other",
"uuid": "1035e5bb-7169-486b-850e-238cf4db7c7e"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/d8ab0c6982ea7674ed4e53e4bfc7234a56b018090819b79f67a9cc6034fc98e2/detection/f-d8ab0c6982ea7674ed4e53e4bfc7234a56b018090819b79f67a9cc6034fc98e2-1604018952",
"category": "Payload delivery",
"uuid": "3b2653ef-ee25-4341-9da4-1e3cb3358ee3"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "37/71",
"category": "Payload delivery",
"uuid": "479af389-c6a9-44ee-90e6-eb8ac544a7fc"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--de2c6a1f-b0fd-4c3a-8046-6e259ecd7e33",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:21.000Z",
"modified": "2020-10-30T08:56:21.000Z",
"pattern": "[file:hashes.MD5 = '86040cffd0975f75db6e7858f26d6d5f' AND file:hashes.SHA1 = '5bc86b78c0d1647aa4c8a96459962ff106904e64' AND file:hashes.SHA256 = 'f7a66c1ed76f696c0d3d3d5c49e88b6cebf35ff232c5094d3284f7fe484a90a3']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:21Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--5a11630a-39c6-4a6e-aacf-d681532964d8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:22.000Z",
"modified": "2020-10-30T08:56:22.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T00:49:54+00:00",
"category": "Other",
"uuid": "8108a425-6f20-4552-a04c-8c72f72a04ae"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/f7a66c1ed76f696c0d3d3d5c49e88b6cebf35ff232c5094d3284f7fe484a90a3/detection/f-f7a66c1ed76f696c0d3d3d5c49e88b6cebf35ff232c5094d3284f7fe484a90a3-1604018994",
"category": "Payload delivery",
"uuid": "b8d92b9b-cbb6-4d05-92a0-ec75c8c6b6e3"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "61/71",
"category": "Payload delivery",
"uuid": "09abd071-c37e-4e3b-a0cd-f99e5ad11e71"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c27ef6ef-3a71-4749-8719-49947bb36071",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:22.000Z",
"modified": "2020-10-30T08:56:22.000Z",
"pattern": "[file:hashes.MD5 = '2a88499580bd343dc6c80838da65c6e8' AND file:hashes.SHA1 = '080aa5303322451844b557f7fbf8a09817cea74b' AND file:hashes.SHA256 = '32839e342815cda42bef871d999d76db91dd465972a2b39d4e29fb367a57cfd5']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--f9421198-639e-495d-97f0-7db5082ce37d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:22.000Z",
"modified": "2020-10-30T08:56:22.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T00:43:01+00:00",
"category": "Other",
"uuid": "f2595b3c-4e34-4705-a06c-647912574ca0"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/32839e342815cda42bef871d999d76db91dd465972a2b39d4e29fb367a57cfd5/detection/f-32839e342815cda42bef871d999d76db91dd465972a2b39d4e29fb367a57cfd5-1604018581",
"category": "Payload delivery",
"uuid": "61be0c4d-c2fe-4192-83af-8163d1ef3b82"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "58/71",
"category": "Payload delivery",
"uuid": "26c6f5b7-231e-464c-a6c0-1a2e2539b342"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ba8d598d-5a7d-410c-9c54-b214aa1962f9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:22.000Z",
"modified": "2020-10-30T08:56:22.000Z",
"pattern": "[file:hashes.MD5 = '260b0e17e42ad6ba1450f5015098acb8' AND file:hashes.SHA1 = '32932285a7d8107f2e86e3ea2508ea06b1c039d8' AND file:hashes.SHA256 = '01ad70e688a4eb070e90538728de699efbaa6bbfeaa728976053384587e45d18']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--b2f94bd9-50fd-45f2-acc4-46affe62f4f0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:22.000Z",
"modified": "2020-10-30T08:56:22.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T00:41:44+00:00",
"category": "Other",
"uuid": "b32001a7-a69c-4fbc-870c-94e153440a6e"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/01ad70e688a4eb070e90538728de699efbaa6bbfeaa728976053384587e45d18/detection/f-01ad70e688a4eb070e90538728de699efbaa6bbfeaa728976053384587e45d18-1604018504",
"category": "Payload delivery",
"uuid": "431c61d2-81f7-4a85-8cd6-0e9646df7517"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "60/70",
"category": "Payload delivery",
"uuid": "171dad40-a8fe-4098-a143-ab21de9c3990"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b3350403-f5e2-45ef-b079-da4b4a602c6a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:22.000Z",
"modified": "2020-10-30T08:56:22.000Z",
"pattern": "[file:hashes.MD5 = 'e6198019719a09f18f796c3961ae75f3' AND file:hashes.SHA1 = '7ca8c0dde315c6a6c21d7ddc9186b6c522e889d9' AND file:hashes.SHA256 = '5929962b379c56626a04052bc8e983732b807c34fab6c1ac420d73a8fff9e9a6']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--a1b404d6-436d-4d0a-b71d-6513a816eae6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:22.000Z",
"modified": "2020-10-30T08:56:22.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-04-06T18:32:13+00:00",
"category": "Other",
"uuid": "51c3eb25-edbc-4637-b95a-4dcc90360b51"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/5929962b379c56626a04052bc8e983732b807c34fab6c1ac420d73a8fff9e9a6/detection/f-5929962b379c56626a04052bc8e983732b807c34fab6c1ac420d73a8fff9e9a6-1586197933",
"category": "Payload delivery",
"uuid": "fb1e69a5-ada8-47ab-b157-fc682fbfc5d2"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "9/73",
"category": "Payload delivery",
"uuid": "cbd191b7-bdc0-40fe-b506-162d54b5dc47"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--bd1a17c8-d750-4cb6-9d25-2be9e7d6768e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:22.000Z",
"modified": "2020-10-30T08:56:22.000Z",
"pattern": "[file:hashes.MD5 = '1f46d93baf23dec9d0073c807f1d3c5e' AND file:hashes.SHA1 = '5379ccc7ce7be52bed4e6ec6e7d7ba0a14a37e2f' AND file:hashes.SHA256 = '728a8ea36c4dcaa030c2a8674bd4b65eb636253435c5d43e74d8a176a92f7679']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--ff1e3b2c-f241-4015-ad25-70421a2bc582",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:22.000Z",
"modified": "2020-10-30T08:56:22.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-04T14:46:47+00:00",
"category": "Other",
"uuid": "2a9e5c34-1d46-4203-bb25-1a3b0300f42d"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/728a8ea36c4dcaa030c2a8674bd4b65eb636253435c5d43e74d8a176a92f7679/detection/f-728a8ea36c4dcaa030c2a8674bd4b65eb636253435c5d43e74d8a176a92f7679-1601822807",
"category": "Payload delivery",
"uuid": "47b43808-3455-48a9-a824-3ecd1dd30da7"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "55/70",
"category": "Payload delivery",
"uuid": "ce708eed-04bb-4f36-a560-604d5ec66d6f"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0a8550e5-8efd-4a4f-b363-3dca1c72adf9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:22.000Z",
"modified": "2020-10-30T08:56:22.000Z",
"pattern": "[file:hashes.MD5 = 'f781f40b79b30368ec4b5d0843cd6ead' AND file:hashes.SHA1 = 'cf53647fd09eb0c07a6dc767b3cfabc9b5b1560d' AND file:hashes.SHA256 = 'a14e3907f7a12b56bb67b178c722d92d2ee64fb0514daadd902683c799bfdc94']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--035e778c-2641-4fce-8b5f-2125d049695e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:22.000Z",
"modified": "2020-10-30T08:56:22.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T00:48:03+00:00",
"category": "Other",
"uuid": "8fe76e6a-479e-4d07-8c33-aa550e13ed03"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/a14e3907f7a12b56bb67b178c722d92d2ee64fb0514daadd902683c799bfdc94/detection/f-a14e3907f7a12b56bb67b178c722d92d2ee64fb0514daadd902683c799bfdc94-1604018883",
"category": "Payload delivery",
"uuid": "990a3271-6bfc-4d3e-bf52-2daa96114a1a"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "59/72",
"category": "Payload delivery",
"uuid": "a82ff796-45e7-4556-8457-8f4e375c13ac"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c25b971a-bcba-4e8c-bfaf-0b5e6d94b9fb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:22.000Z",
"modified": "2020-10-30T08:56:22.000Z",
"pattern": "[file:hashes.MD5 = '58294f59bdfb4a9394c3274de512f696' AND file:hashes.SHA1 = '60d339f31e464596162f3fa5344b039a96aa439e' AND file:hashes.SHA256 = 'b1798973f8dfce5777905452271f3b3ff23fb2148978ba2943654a72fe5b6387']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--d20df19b-04e9-40d8-a031-3e91fa73ce1d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:22.000Z",
"modified": "2020-10-30T08:56:22.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-18T00:09:30+00:00",
"category": "Other",
"uuid": "9e9344f6-9f27-4982-83c4-5c0c5f5f55ce"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/b1798973f8dfce5777905452271f3b3ff23fb2148978ba2943654a72fe5b6387/detection/f-b1798973f8dfce5777905452271f3b3ff23fb2148978ba2943654a72fe5b6387-1602979770",
"category": "Payload delivery",
"uuid": "eb67fde1-abeb-4334-bfa2-15ea9fa0e14a"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "56/71",
"category": "Payload delivery",
"uuid": "f07ccbdc-20fc-4a36-9a13-794f60262508"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ec94d76e-bd10-4c4e-80e7-1dca0cfdbf6c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:22.000Z",
"modified": "2020-10-30T08:56:22.000Z",
"pattern": "[file:hashes.MD5 = 'b1d1f8084148e7e221b051af4025b3db' AND file:hashes.SHA1 = '6d86ce151e0eec88f0921c74dfa702dc9cde0d61' AND file:hashes.SHA256 = '6f55f3b1415b5bf9dda57158f05fe628edb92b436887ad72f3d4bd108e8542d2']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--bb2c2496-37da-47ac-b78b-c312d9b49cff",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:22.000Z",
"modified": "2020-10-30T08:56:22.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-04-06T18:32:34+00:00",
"category": "Other",
"uuid": "5774be8a-ecb9-401e-bb83-f17844d2236d"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/6f55f3b1415b5bf9dda57158f05fe628edb92b436887ad72f3d4bd108e8542d2/detection/f-6f55f3b1415b5bf9dda57158f05fe628edb92b436887ad72f3d4bd108e8542d2-1586197954",
"category": "Payload delivery",
"uuid": "0fb5a137-44fc-4bc8-b481-57fc82db24f3"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "46/71",
"category": "Payload delivery",
"uuid": "aec1d767-7603-4972-aad0-580b211e8ce9"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--bd495716-d98e-47e4-9809-d662914add7a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:22.000Z",
"modified": "2020-10-30T08:56:22.000Z",
"pattern": "[file:hashes.MD5 = '46693e0208c7bacac357ec9a2d0e84f7' AND file:hashes.SHA1 = '36ea5100df30506ba8972bf2782772ffa19f2224' AND file:hashes.SHA256 = 'fb780f623a78c9b5aa8a279430731b84d0efe937ea5684f80182e4f896e8e288']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--a4e3943d-0dde-454f-a5da-bfb3cfff5774",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:22.000Z",
"modified": "2020-10-30T08:56:22.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T00:50:04+00:00",
"category": "Other",
"uuid": "36d75910-e618-432d-a6d6-0bd8d03f683a"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/fb780f623a78c9b5aa8a279430731b84d0efe937ea5684f80182e4f896e8e288/detection/f-fb780f623a78c9b5aa8a279430731b84d0efe937ea5684f80182e4f896e8e288-1604019004",
"category": "Payload delivery",
"uuid": "c745c37a-6eb9-44c1-8e8e-2bc05b2f7284"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "38/71",
"category": "Payload delivery",
"uuid": "ac9287f3-d87a-463e-90a0-36d69b737c48"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--844f6bfd-26af-4c70-b0fb-96bcfc467213",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:22.000Z",
"modified": "2020-10-30T08:56:22.000Z",
"pattern": "[file:hashes.MD5 = 'bab955353674b0ffef7623a68387200e' AND file:hashes.SHA1 = '6477c1ccaa683f688d20aa8ebe3f28091d79b0be' AND file:hashes.SHA256 = '395173829ff0e957a2d8abbb3c979f470701cd3fd381e7af23b13e7573cca5c1']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--20b5b91c-4222-4eb4-bcb0-1d2b5d65c5af",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:23.000Z",
"modified": "2020-10-30T08:56:23.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-09-05T19:59:18+00:00",
"category": "Other",
"uuid": "8ac26dab-bdde-46ee-b2b6-91fcec241063"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/395173829ff0e957a2d8abbb3c979f470701cd3fd381e7af23b13e7573cca5c1/detection/f-395173829ff0e957a2d8abbb3c979f470701cd3fd381e7af23b13e7573cca5c1-1599335958",
"category": "Payload delivery",
"uuid": "850fc869-f101-4fda-9a36-c4a1185939c6"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "41/67",
"category": "Payload delivery",
"uuid": "f7400d8d-99b5-4692-8d76-a85f22c4878a"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9e938956-b84c-4ad6-b6e9-c76e7c257f19",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:23.000Z",
"modified": "2020-10-30T08:56:23.000Z",
"pattern": "[file:hashes.MD5 = 'c0e8cf34dbf59accd38c0a52013f0a75' AND file:hashes.SHA1 = 'a14f8110b2efe79f829783b23d4eedcc9885dab2' AND file:hashes.SHA256 = '65783de1310a32a96a2f2ca60093be27ddb32562f91104d7886fac7479ad8afe']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:23Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--6bdce9b4-2073-493d-affe-89faec431d92",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:23.000Z",
"modified": "2020-10-30T08:56:23.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-28T11:48:29+00:00",
"category": "Other",
"uuid": "f44d9b4f-db48-43d2-8732-5c2ae798ad5e"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/65783de1310a32a96a2f2ca60093be27ddb32562f91104d7886fac7479ad8afe/detection/f-65783de1310a32a96a2f2ca60093be27ddb32562f91104d7886fac7479ad8afe-1603885709",
"category": "Payload delivery",
"uuid": "60ede7f5-c509-4541-91da-8935936577e1"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "3/70",
"category": "Payload delivery",
"uuid": "5de803b1-5cbd-449b-b87a-b94b5aad5fd5"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1b4abf9b-20e1-4991-9a0f-fa6d85844664",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:23.000Z",
"modified": "2020-10-30T08:56:23.000Z",
"pattern": "[file:hashes.MD5 = 'f9b5c8c713dba6084afeaee620a368a9' AND file:hashes.SHA1 = '7d9829da68093e9e360ef6b03968dda0154536d5' AND file:hashes.SHA256 = 'b1232c4080121ac93b5c6f3982f79ee1ed4238d568cefd6eb88e7dfb072f0db8']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:23Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--707daa2e-319e-4217-9e9e-66961f0944f4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:23.000Z",
"modified": "2020-10-30T08:56:23.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T00:48:18+00:00",
"category": "Other",
"uuid": "84694253-5d5c-4b8a-8ffb-cfd9c1b73432"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/b1232c4080121ac93b5c6f3982f79ee1ed4238d568cefd6eb88e7dfb072f0db8/detection/f-b1232c4080121ac93b5c6f3982f79ee1ed4238d568cefd6eb88e7dfb072f0db8-1604018898",
"category": "Payload delivery",
"uuid": "2feac803-b896-42dc-aab7-9978ab3ecf02"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "57/71",
"category": "Payload delivery",
"uuid": "4e59cc78-18ac-4268-b295-422aca73066d"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3bff3fad-617f-469b-ab76-31ef8d37182f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:23.000Z",
"modified": "2020-10-30T08:56:23.000Z",
"pattern": "[file:hashes.MD5 = 'e6f992fb82bd0571cf0b6138bd69c75f' AND file:hashes.SHA1 = 'c949f1a58bf36a4bf9f7765adcb21d95b24866f4' AND file:hashes.SHA256 = 'bc84fa150decef8b33811a646be2fe517f2550bfa03036b8766ff338c3d37df1']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:23Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--84d87567-a187-4d13-8e8e-fe4968ec7317",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:23.000Z",
"modified": "2020-10-30T08:56:23.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-11T05:07:26+00:00",
"category": "Other",
"uuid": "904b3389-b0bc-47d6-a795-5bfe127744de"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/bc84fa150decef8b33811a646be2fe517f2550bfa03036b8766ff338c3d37df1/detection/f-bc84fa150decef8b33811a646be2fe517f2550bfa03036b8766ff338c3d37df1-1602392846",
"category": "Payload delivery",
"uuid": "fd941260-a69c-4007-9fb6-f2fe1dee1215"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "53/69",
"category": "Payload delivery",
"uuid": "92d27996-67bb-427c-b220-bd60e1fb829e"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--299df689-5b87-4dfd-ace4-1a5fe47cf0ef",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:23.000Z",
"modified": "2020-10-30T08:56:23.000Z",
"pattern": "[file:hashes.MD5 = '07b60dab4a98ea59d6dfe957fe6edae9' AND file:hashes.SHA1 = 'fd9cfed79b0ed7e0f065dc6467b2960491001253' AND file:hashes.SHA256 = '04a4a9ff0af9fde923fb8203c89be6a57a3c42a517c9d9a047fb7d4b20e24a9f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:23Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--f0944434-11e8-4a3f-9db9-3712f278b0bd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:23.000Z",
"modified": "2020-10-30T08:56:23.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-03-27T09:42:55+00:00",
"category": "Other",
"uuid": "6fe0cf5e-691c-46fe-9d18-86a4436eba26"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/04a4a9ff0af9fde923fb8203c89be6a57a3c42a517c9d9a047fb7d4b20e24a9f/detection/f-04a4a9ff0af9fde923fb8203c89be6a57a3c42a517c9d9a047fb7d4b20e24a9f-1585302175",
"category": "Payload delivery",
"uuid": "b79021e0-7f2d-4253-b8b3-99be799ec34b"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "41/73",
"category": "Payload delivery",
"uuid": "2e5bbc97-3aae-4b1d-8291-83c432ffd47b"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--45436868-f318-44a7-80ef-cfc59e1b067a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:23.000Z",
"modified": "2020-10-30T08:56:23.000Z",
"pattern": "[file:hashes.MD5 = '764bbc3d05a05ecd95653167592565fe' AND file:hashes.SHA1 = '4ceaa331b99619c92e751d7cd38ba46d7e9a892e' AND file:hashes.SHA256 = '22caa1e9f4b2e88b7bcd633e4e12104f4d3556c05fc4db1ee6b620a9d5fa6213']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:23Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--fa571e37-157d-47a7-b2df-e512c796d8d0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:23.000Z",
"modified": "2020-10-30T08:56:23.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-29T02:20:09+00:00",
"category": "Other",
"uuid": "35aa1d43-0de4-42f1-a3e2-bf27134193c2"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/22caa1e9f4b2e88b7bcd633e4e12104f4d3556c05fc4db1ee6b620a9d5fa6213/detection/f-22caa1e9f4b2e88b7bcd633e4e12104f4d3556c05fc4db1ee6b620a9d5fa6213-1603938009",
"category": "Payload delivery",
"uuid": "1b9dc1a5-4c2f-4253-9343-0d652a0da2c8"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "32/70",
"category": "Payload delivery",
"uuid": "a0dc77b2-59f4-4917-8ebe-0d28ee69831b"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7e0b9f43-bbfe-4c48-8bed-9a88843b88f3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:23.000Z",
"modified": "2020-10-30T08:56:23.000Z",
"pattern": "[file:hashes.MD5 = '392a2bf073cfdf09fd5d8211b8d29547' AND file:hashes.SHA1 = '65da7b2530caee779a54d7d4740988716cfe7a60' AND file:hashes.SHA256 = 'f6b74d7a2b2e2c1f2b0f088c6b5cd7d26d4d40b756e76bcb7ad06cd7c6c17ded']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:23Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--eabe87b8-0d05-49a7-8df4-7611845f7b86",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:23.000Z",
"modified": "2020-10-30T08:56:23.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T00:49:42+00:00",
"category": "Other",
"uuid": "3c30b2c3-1cb6-4fe9-96c2-a7e75be73dc8"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/f6b74d7a2b2e2c1f2b0f088c6b5cd7d26d4d40b756e76bcb7ad06cd7c6c17ded/detection/f-f6b74d7a2b2e2c1f2b0f088c6b5cd7d26d4d40b756e76bcb7ad06cd7c6c17ded-1604018982",
"category": "Payload delivery",
"uuid": "c3e1014d-c66e-45eb-8fc7-66886d3c9b18"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "58/71",
"category": "Payload delivery",
"uuid": "fcd6c159-f971-4a9d-9237-b63a250718e8"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--35f19c22-bb54-4118-8e2a-a6d6b78fa536",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:23.000Z",
"modified": "2020-10-30T08:56:23.000Z",
"pattern": "[file:hashes.MD5 = 'bf554ccf84bc6976a37d5e7c637eea58' AND file:hashes.SHA1 = '8e66e4ff03bac55716de14943757d7c0cdf11969' AND file:hashes.SHA256 = '38bfb870f8e127f2170175fdd902c0891c9a6c044d8fae6dc9e8ef6d5a9497ab']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:23Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--f61a9f17-4183-432a-a0a9-34929221e1bf",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:23.000Z",
"modified": "2020-10-30T08:56:23.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-09-07T18:14:23+00:00",
"category": "Other",
"uuid": "9679158b-3ec1-4004-94ad-a97af26abc90"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/38bfb870f8e127f2170175fdd902c0891c9a6c044d8fae6dc9e8ef6d5a9497ab/detection/f-38bfb870f8e127f2170175fdd902c0891c9a6c044d8fae6dc9e8ef6d5a9497ab-1599502463",
"category": "Payload delivery",
"uuid": "f157fa68-cf76-4ba0-b4e4-08c8002bd1e1"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "45/66",
"category": "Payload delivery",
"uuid": "8e3f7146-ff81-4d72-8a50-d9ebefcbadae"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9bd33707-6cad-4531-9575-2b257af4239e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:23.000Z",
"modified": "2020-10-30T08:56:23.000Z",
"pattern": "[file:hashes.MD5 = 'f9de761a08ec8c4cb0dcf9731acf1417' AND file:hashes.SHA1 = '7b5ad0a6f29788df61388309e9725aa845528669' AND file:hashes.SHA256 = '4e4eb3f6f85c8b14003168e9cd9d82c716cf5c04f1d7cb2f003d1ca233d75eed']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:23Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--97ca49c9-5479-48e1-b609-7bbde22a44a6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:23.000Z",
"modified": "2020-10-30T08:56:23.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T00:43:21+00:00",
"category": "Other",
"uuid": "c7cf5835-6f29-4a88-9b5a-43465691aed5"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/4e4eb3f6f85c8b14003168e9cd9d82c716cf5c04f1d7cb2f003d1ca233d75eed/detection/f-4e4eb3f6f85c8b14003168e9cd9d82c716cf5c04f1d7cb2f003d1ca233d75eed-1604018601",
"category": "Payload delivery",
"uuid": "fe5a5abe-c4e0-43b6-ac18-6ddac9d2fd2c"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "59/70",
"category": "Payload delivery",
"uuid": "1bc8a524-b380-4ccc-b9b1-aae32a625b23"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7c7d0cab-6614-4d6e-844f-b96a60b80a05",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:24.000Z",
"modified": "2020-10-30T08:56:24.000Z",
"pattern": "[file:hashes.MD5 = '08e1863a304022bb8682799746ab2c4c' AND file:hashes.SHA1 = 'b2a0338d2c2f0bbd03fc5b8b49e040b8d6281173' AND file:hashes.SHA256 = 'af29f3aad49a10827b338f156d4f748bcd9d987f1400c52f979efcb4ef4e5e46']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:24Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--e6de3c5f-55bc-47c9-9266-a8c981902df9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:24.000Z",
"modified": "2020-10-30T08:56:24.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T00:48:12+00:00",
"category": "Other",
"uuid": "91695e3c-7a53-47b1-ac9e-66d7eb8233a4"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/af29f3aad49a10827b338f156d4f748bcd9d987f1400c52f979efcb4ef4e5e46/detection/f-af29f3aad49a10827b338f156d4f748bcd9d987f1400c52f979efcb4ef4e5e46-1604018892",
"category": "Payload delivery",
"uuid": "cd152394-4448-4963-bb4f-2d2b762f6c46"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "59/71",
"category": "Payload delivery",
"uuid": "eff997eb-5c20-447e-b42d-3668d14cf2ef"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--647f4bff-0d89-4940-b1ff-f68625083a1c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:24.000Z",
"modified": "2020-10-30T08:56:24.000Z",
"pattern": "[file:hashes.MD5 = '04280820a670d0a8a2f0c398f7d223d7' AND file:hashes.SHA1 = 'f564a94c7833b1b8882febd28e95afba71ebadbe' AND file:hashes.SHA256 = '2cd01dab44247dee9c0f9511b3b1d11d5a69afcc87efc59446238021d5343aad']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:24Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--af3a4fd1-9f79-401b-a42c-d05b1e190cae",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:24.000Z",
"modified": "2020-10-30T08:56:24.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T00:42:49+00:00",
"category": "Other",
"uuid": "7ba79838-da27-4225-b272-61ff9c4f9ce6"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/2cd01dab44247dee9c0f9511b3b1d11d5a69afcc87efc59446238021d5343aad/detection/f-2cd01dab44247dee9c0f9511b3b1d11d5a69afcc87efc59446238021d5343aad-1604018569",
"category": "Payload delivery",
"uuid": "a90b0e7d-8608-4b9c-a182-4b081ba7e47c"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "62/72",
"category": "Payload delivery",
"uuid": "675390a3-319c-467d-b011-091fdc92ead8"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9fbbec2e-0c24-457a-b241-dd5313c196a8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:24.000Z",
"modified": "2020-10-30T08:56:24.000Z",
"pattern": "[file:hashes.MD5 = 'cb41e35dcfd51b7ea5e55b608a380f9f' AND file:hashes.SHA1 = '323103f016f8907a4918ad0a15f0c124c68658b2' AND file:hashes.SHA256 = '70ffcd7e8663a2aab204eaea3daf86e9cff73872d23ad3da2e91382f8593501a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:24Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--2fa4890a-b3e8-4140-9c6a-ced8d3f1b4a7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:24.000Z",
"modified": "2020-10-30T08:56:24.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T00:43:57+00:00",
"category": "Other",
"uuid": "39dcea26-29d1-44b5-847a-39d032c17da8"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/70ffcd7e8663a2aab204eaea3daf86e9cff73872d23ad3da2e91382f8593501a/detection/f-70ffcd7e8663a2aab204eaea3daf86e9cff73872d23ad3da2e91382f8593501a-1604018637",
"category": "Payload delivery",
"uuid": "3f304bcf-61e8-4714-b1e7-d339a80dc67f"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "59/71",
"category": "Payload delivery",
"uuid": "cf5cf282-5f24-488f-aa93-080ff4da33c6"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3ad9b9d2-d784-42ae-b8c5-09d4ed4ae102",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:24.000Z",
"modified": "2020-10-30T08:56:24.000Z",
"pattern": "[file:hashes.MD5 = '4d373fda8175a8c79e2e0dc760325634' AND file:hashes.SHA1 = '35ee421837fe02d21c5bd94da425b1f39f1d73d8' AND file:hashes.SHA256 = '062fc14064495f558e1192b675c1f0eeeb87c5ced5c01f81a38fc6b2591508d6']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:24Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--fcbdfa58-feca-47b8-8443-d6856341c139",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:24.000Z",
"modified": "2020-10-30T08:56:24.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-16T02:09:45+00:00",
"category": "Other",
"uuid": "c50a134f-ff9f-4f27-8d47-495f6bdcc819"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/062fc14064495f558e1192b675c1f0eeeb87c5ced5c01f81a38fc6b2591508d6/detection/f-062fc14064495f558e1192b675c1f0eeeb87c5ced5c01f81a38fc6b2591508d6-1602814185",
"category": "Payload delivery",
"uuid": "af4f7ad6-d6db-4233-a2d6-2e315b9c0765"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "49/71",
"category": "Payload delivery",
"uuid": "fe476007-df34-4cc0-b1e0-c6f79a883d75"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7dbc825d-6f73-4c96-8b7a-8cd5a9030b0d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:24.000Z",
"modified": "2020-10-30T08:56:24.000Z",
"pattern": "[file:hashes.MD5 = '49d508847c6982fc16ef7ccef4a327bc' AND file:hashes.SHA1 = '0be71db06cb525f058fcf4da40b84f96f1304fb7' AND file:hashes.SHA256 = 'ede75c0a88d80043f79025dfd8ef91c3d1b01a1613f4a0347b2ceb29f8b19578']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:24Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--319be5ee-9dbe-4d32-9558-174535d5eb76",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:24.000Z",
"modified": "2020-10-30T08:56:24.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-27T20:19:39+00:00",
"category": "Other",
"uuid": "2e961251-18fb-4906-a715-d8a6eb35484e"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/ede75c0a88d80043f79025dfd8ef91c3d1b01a1613f4a0347b2ceb29f8b19578/detection/f-ede75c0a88d80043f79025dfd8ef91c3d1b01a1613f4a0347b2ceb29f8b19578-1603829979",
"category": "Payload delivery",
"uuid": "2f4e16f0-265d-470c-813b-7481cbabfdef"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "37/64",
"category": "Payload delivery",
"uuid": "b56e51c9-ba00-4940-8463-d0f180e17f77"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c60a6e18-6be9-41a5-af8b-044a261e8842",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:24.000Z",
"modified": "2020-10-30T08:56:24.000Z",
"pattern": "[file:hashes.MD5 = '5c958dd142c5304050c1e3a31aa4d20f' AND file:hashes.SHA1 = 'a520c48f968d1134ec0c7d73835b853d81420fc7' AND file:hashes.SHA256 = 'b1eb0565b958d4819138a72cf38b16d058cfee00097461c5dad3fae500aa4296']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:24Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--fec89932-b6e3-4f90-bfeb-b12aa3d8e4d6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:24.000Z",
"modified": "2020-10-30T08:56:24.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-29T07:38:14+00:00",
"category": "Other",
"uuid": "123abaee-1146-4d30-9bb2-18ddb4d00912"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/b1eb0565b958d4819138a72cf38b16d058cfee00097461c5dad3fae500aa4296/detection/f-b1eb0565b958d4819138a72cf38b16d058cfee00097461c5dad3fae500aa4296-1603957094",
"category": "Payload delivery",
"uuid": "4ec65c97-7e35-4832-98af-842054da8a04"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "41/71",
"category": "Payload delivery",
"uuid": "a866ddf2-353b-4676-9d04-ddb67548d081"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8ebdeb3d-585a-402e-ac4c-e74d4e7e28b3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:24.000Z",
"modified": "2020-10-30T08:56:24.000Z",
"pattern": "[file:hashes.MD5 = 'd99731e275a92ae306fdbb09b5bd4d24' AND file:hashes.SHA1 = 'a36676950f35f1255935a0fc8467bb28ff625edb' AND file:hashes.SHA256 = '0856b3c06805d3935b1db325c4e9c9131572b4cf09f07d989911495807775cab']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:24Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--c4ed2cef-0abb-442d-a321-7f528925ef43",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:24.000Z",
"modified": "2020-10-30T08:56:24.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-17T00:20:39+00:00",
"category": "Other",
"uuid": "8ffa6185-65cb-40eb-a3c0-1369c382d63e"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/0856b3c06805d3935b1db325c4e9c9131572b4cf09f07d989911495807775cab/detection/f-0856b3c06805d3935b1db325c4e9c9131572b4cf09f07d989911495807775cab-1602894039",
"category": "Payload delivery",
"uuid": "252d42fd-c0b6-408a-a666-96e3165f3ffa"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "50/70",
"category": "Payload delivery",
"uuid": "df13ddd5-e4fe-4100-94f8-be3e5edf314f"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a0ba4a94-ca04-4194-8f44-7e109a1d571d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:24.000Z",
"modified": "2020-10-30T08:56:24.000Z",
"pattern": "[file:hashes.MD5 = 'e9ca9f20398e87d807e953ccbb3ef8b2' AND file:hashes.SHA1 = '4cac60759f4c879f1d6c12dd54774554cc522350' AND file:hashes.SHA256 = '9bf2fd111962a5634e7b1a5821b08584002cf304d657840a904d3388967a9a65']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:24Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--90a85fa2-2cd3-44ed-9800-47036fbea5ed",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:24.000Z",
"modified": "2020-10-30T08:56:24.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T00:47:48+00:00",
"category": "Other",
"uuid": "e278171b-1db7-485d-a4f0-86308b9bb575"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/9bf2fd111962a5634e7b1a5821b08584002cf304d657840a904d3388967a9a65/detection/f-9bf2fd111962a5634e7b1a5821b08584002cf304d657840a904d3388967a9a65-1604018868",
"category": "Payload delivery",
"uuid": "bb4afb0c-37fb-482e-9c00-504047247304"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "60/72",
"category": "Payload delivery",
"uuid": "3755cfcf-372d-4a80-a89e-ee4b43bb2bc8"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--448163b9-d56e-4197-b219-7701771f0b9f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:24.000Z",
"modified": "2020-10-30T08:56:24.000Z",
"pattern": "[file:hashes.MD5 = '81530582c3bf6e5e34a33f5d539b83a0' AND file:hashes.SHA1 = 'f1fd8e3a214647617d24c663ab69df6ab491dfdb' AND file:hashes.SHA256 = 'c9ffb0e9c3df23bba54debf0f6875ade683fe29f4ca720d2abc780179a2781cf']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:24Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--edf1b1b2-a646-4d36-89fc-2bd73036558a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:24.000Z",
"modified": "2020-10-30T08:56:24.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-23T08:40:45+00:00",
"category": "Other",
"uuid": "0309a831-48af-4f90-bedf-09c51893f95b"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/c9ffb0e9c3df23bba54debf0f6875ade683fe29f4ca720d2abc780179a2781cf/detection/f-c9ffb0e9c3df23bba54debf0f6875ade683fe29f4ca720d2abc780179a2781cf-1603442445",
"category": "Payload delivery",
"uuid": "a9796062-2900-4096-a6fa-d14d530cce0f"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "47/71",
"category": "Payload delivery",
"uuid": "248935ae-13a4-46fb-ad5b-1d27398dc084"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e9731d60-0ae4-4dde-898e-cac8b04a92ae",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:24.000Z",
"modified": "2020-10-30T08:56:24.000Z",
"pattern": "[file:hashes.MD5 = '9bc53f708e95adaeab0fbacce4738d1e' AND file:hashes.SHA1 = 'c4bfc6c7e6591166cee8ded217083ad28b0f7d9a' AND file:hashes.SHA256 = '11d2e042f172811cd155e07a8f7a3830e590997b87be68cd9b076477bbc98dcd']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:24Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--e6bc3456-c3f9-4350-acc0-327d026ebb77",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:25.000Z",
"modified": "2020-10-30T08:56:25.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T00:42:07+00:00",
"category": "Other",
"uuid": "8d0de787-53a5-4843-84fc-5888c683a7b1"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/11d2e042f172811cd155e07a8f7a3830e590997b87be68cd9b076477bbc98dcd/detection/f-11d2e042f172811cd155e07a8f7a3830e590997b87be68cd9b076477bbc98dcd-1604018527",
"category": "Payload delivery",
"uuid": "f890843d-0114-47b3-8b42-ee86f4e1f51f"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "45/72",
"category": "Payload delivery",
"uuid": "f7995bab-bf45-47b8-9cec-75c583699b84"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--398aa11c-cf88-4719-8a67-281a237f5842",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:25.000Z",
"modified": "2020-10-30T08:56:25.000Z",
"pattern": "[file:hashes.MD5 = '256fa0ae50b4e199b631047f2fe98b58' AND file:hashes.SHA1 = 'bb94ba05b6daa07443ab330815a6fc074c8d326b' AND file:hashes.SHA256 = '429650c8e59459c0150ad5cb8853cb46415b70afb92f45ebc04e8c5fbd382bf2']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:25Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--06b39d87-d102-40a2-be42-99983372e8c2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:25.000Z",
"modified": "2020-10-30T08:56:25.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-14T07:38:14+00:00",
"category": "Other",
"uuid": "84dfb00e-fba2-4575-96f1-0dbd7a035571"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/429650c8e59459c0150ad5cb8853cb46415b70afb92f45ebc04e8c5fbd382bf2/detection/f-429650c8e59459c0150ad5cb8853cb46415b70afb92f45ebc04e8c5fbd382bf2-1602661094",
"category": "Payload delivery",
"uuid": "583a6d86-6fca-4789-b9f4-26f8061bcd3e"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "43/71",
"category": "Payload delivery",
"uuid": "06f907e1-c8e8-4835-9a22-1800e977b425"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5df60d5d-8222-40a0-8283-c1b60986313f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:25.000Z",
"modified": "2020-10-30T08:56:25.000Z",
"pattern": "[file:hashes.MD5 = 'a5e2a191fb0b2dfb336147da0b6cabb6' AND file:hashes.SHA1 = 'cecff6847d1b04b05ecf6e965fcd0b2b800aa212' AND file:hashes.SHA256 = 'dd913d2b8a29eae792097e2d2b81a94e62b3e90636a9564f56dc302b50901ccb']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:25Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--5b646f32-311e-4fe3-b55f-ba211ee379fc",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:25.000Z",
"modified": "2020-10-30T08:56:25.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-06-11T10:18:21+00:00",
"category": "Other",
"uuid": "a99df7e6-664e-48a8-9eec-c42af8d43451"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/dd913d2b8a29eae792097e2d2b81a94e62b3e90636a9564f56dc302b50901ccb/detection/f-dd913d2b8a29eae792097e2d2b81a94e62b3e90636a9564f56dc302b50901ccb-1591870701",
"category": "Payload delivery",
"uuid": "29298e01-3b55-4adf-8aa9-44e78bc32e35"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "27/61",
"category": "Payload delivery",
"uuid": "75391fa9-d5a3-47fe-a79b-1ea0891129f4"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0657a83d-6055-4d0e-b18c-e66524986913",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:25.000Z",
"modified": "2020-10-30T08:56:25.000Z",
"pattern": "[file:hashes.MD5 = '2237dd795e50a6d4ef1bd3bafa8c771f' AND file:hashes.SHA1 = '366ff7faca817fb6c99650abdfbf14b8eca11fda' AND file:hashes.SHA256 = '5b02e00797b0f396b40dbb8223d034a7aa42798a39a89a41ea70a314ceab478e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:25Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--486237b5-0bca-4be0-b0a9-cf97bad7ec7e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:25.000Z",
"modified": "2020-10-30T08:56:25.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T00:43:32+00:00",
"category": "Other",
"uuid": "f8c9d9ea-47cb-4079-8a72-af10bcae830a"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/5b02e00797b0f396b40dbb8223d034a7aa42798a39a89a41ea70a314ceab478e/detection/f-5b02e00797b0f396b40dbb8223d034a7aa42798a39a89a41ea70a314ceab478e-1604018612",
"category": "Payload delivery",
"uuid": "976cb65e-22c8-4596-b46d-98d585378da2"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "57/71",
"category": "Payload delivery",
"uuid": "e465d5a8-2d83-463b-857f-97e8fe554f2f"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8ff99259-70f6-4ec1-8b53-ec2640ff4f76",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:25.000Z",
"modified": "2020-10-30T08:56:25.000Z",
"pattern": "[file:hashes.MD5 = 'ad3ae77f1d1c840eb990bd453be517ab' AND file:hashes.SHA1 = '54cf984207163b9d6dd00d005c8462318caa4539' AND file:hashes.SHA256 = '8ddf1b190498bcc66f510005f0e1efc2562e189887924ddb7e584f04437e78a2']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:25Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--8e77f1b3-ff7e-4e6d-ad68-6908c1a0961d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:25.000Z",
"modified": "2020-10-30T08:56:25.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T00:47:32+00:00",
"category": "Other",
"uuid": "66348970-4506-4c5e-bfe9-033ad376135f"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/8ddf1b190498bcc66f510005f0e1efc2562e189887924ddb7e584f04437e78a2/detection/f-8ddf1b190498bcc66f510005f0e1efc2562e189887924ddb7e584f04437e78a2-1604018852",
"category": "Payload delivery",
"uuid": "b1456ad4-1a55-4966-919c-7362d866f3a8"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "60/71",
"category": "Payload delivery",
"uuid": "e0a0d437-07c1-4238-8e8f-37ad55795f6b"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2e76b14d-770a-4609-b3b5-b5ea2d40411f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:25.000Z",
"modified": "2020-10-30T08:56:25.000Z",
"pattern": "[file:hashes.MD5 = 'fa9ba530572d4b8ad6db01097244beff' AND file:hashes.SHA1 = 'abb546c55e6503639dabc61e1434a26c624bb485' AND file:hashes.SHA256 = 'ad0ee372226ace062473e01b15b52d99eb61a6f3b265bead8f2c534f75d05cea']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:25Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--afab1a16-e49a-41dc-8cb3-00b0eb5056e1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:25.000Z",
"modified": "2020-10-30T08:56:25.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T00:48:07+00:00",
"category": "Other",
"uuid": "ea82c6f0-bb64-4652-bd71-5507c9b6649f"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/ad0ee372226ace062473e01b15b52d99eb61a6f3b265bead8f2c534f75d05cea/detection/f-ad0ee372226ace062473e01b15b52d99eb61a6f3b265bead8f2c534f75d05cea-1604018887",
"category": "Payload delivery",
"uuid": "05e314a1-9863-449c-9c22-0e6c2cc8f8a6"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "56/70",
"category": "Payload delivery",
"uuid": "6da020ba-c20e-427b-9256-dfc06bcd99f9"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3ef484d7-e18a-4268-9d64-57a0dc11ec90",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:25.000Z",
"modified": "2020-10-30T08:56:25.000Z",
"pattern": "[file:hashes.MD5 = '7c4c9a6c3fff239b2d1bd831782c6467' AND file:hashes.SHA1 = '3d74c77cb0fb25f578876b6182f585e61038634a' AND file:hashes.SHA256 = '1f9194a46385dfef7bd1098b3c5da2b8f2d2552c9c1d1b6bf3f7313ee970b9a4']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:25Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--23503f7a-ba91-4d93-aace-c0bfd9228e8a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:25.000Z",
"modified": "2020-10-30T08:56:25.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2019-11-09T01:32:17+00:00",
"category": "Other",
"uuid": "dbc84ddc-a27e-441b-8558-d31c8e0158da"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/1f9194a46385dfef7bd1098b3c5da2b8f2d2552c9c1d1b6bf3f7313ee970b9a4/detection/f-1f9194a46385dfef7bd1098b3c5da2b8f2d2552c9c1d1b6bf3f7313ee970b9a4-1573263137",
"category": "Payload delivery",
"uuid": "972bda52-0c0a-471c-8778-881b14362c4d"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "2/58",
"category": "Payload delivery",
"uuid": "12146634-cbbf-496f-bec2-cf11729ca45b"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--20f652f2-5da6-4d98-a7ab-ca7e2f1a46d2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:25.000Z",
"modified": "2020-10-30T08:56:25.000Z",
"pattern": "[file:hashes.MD5 = '6f29331e3d016c428b92b6e7ae3132d6' AND file:hashes.SHA1 = '2fa9889c4e5da3c5ec5fa29e428ec1303992bf0b' AND file:hashes.SHA256 = '25f051fad96d0996708561ce734bb836c4a576f8cb4d6f96927975a08eff9e19']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:25Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--2891de56-5536-4798-beb4-ebe8f7d526f6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:25.000Z",
"modified": "2020-10-30T08:56:25.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T00:42:41+00:00",
"category": "Other",
"uuid": "be59f203-2657-4807-96fe-733b4e7fafe2"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/25f051fad96d0996708561ce734bb836c4a576f8cb4d6f96927975a08eff9e19/detection/f-25f051fad96d0996708561ce734bb836c4a576f8cb4d6f96927975a08eff9e19-1604018561",
"category": "Payload delivery",
"uuid": "cd554aa1-a4f2-4800-a252-206ff91ec127"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "58/71",
"category": "Payload delivery",
"uuid": "5f791c67-4ca2-42fd-8caf-103d1f0c6eee"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--94194fbd-1c7b-48a3-9397-78690a14965c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:25.000Z",
"modified": "2020-10-30T08:56:25.000Z",
"pattern": "[file:hashes.MD5 = '86fb97cd68d2f5c9681be20f1929c474' AND file:hashes.SHA1 = '1ba763f86f620b9bbc96f4d8a45afb4e6176b3e5' AND file:hashes.SHA256 = 'bc08bc584b06c8866c6b4feeeef745e187a8ce0e924d159d5044e6368e4bf31a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:25Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--11e9099a-5624-4972-a948-fedaf267e4e4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:25.000Z",
"modified": "2020-10-30T08:56:25.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T00:48:48+00:00",
"category": "Other",
"uuid": "0a5d532c-b7b3-41b1-8b13-24ee95a0e993"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/bc08bc584b06c8866c6b4feeeef745e187a8ce0e924d159d5044e6368e4bf31a/detection/f-bc08bc584b06c8866c6b4feeeef745e187a8ce0e924d159d5044e6368e4bf31a-1604018928",
"category": "Payload delivery",
"uuid": "f7f1dba2-cc5e-49da-9197-a8e1305519b5"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "58/70",
"category": "Payload delivery",
"uuid": "a760edb6-99b8-4060-a459-2828446beb64"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--da3156db-d5bd-42c1-8acf-fcba17565f99",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:25.000Z",
"modified": "2020-10-30T08:56:25.000Z",
"pattern": "[file:hashes.MD5 = 'af09099729962f25c57cc35e86bfbcf9' AND file:hashes.SHA1 = '42333bd6cbe20c64b7cb1b81bcc6110151bae7ea' AND file:hashes.SHA256 = 'b91b4d45b41d0d0ca1bdfac917c4cd732d32754bcfd7590ac521dc4fe414ebd5']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:25Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--3c47eb42-f907-41c4-a214-ea3bea07bad4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:25.000Z",
"modified": "2020-10-30T08:56:25.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T00:48:36+00:00",
"category": "Other",
"uuid": "eb234e22-7d05-4a32-8e34-7eab8b9590c8"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/b91b4d45b41d0d0ca1bdfac917c4cd732d32754bcfd7590ac521dc4fe414ebd5/detection/f-b91b4d45b41d0d0ca1bdfac917c4cd732d32754bcfd7590ac521dc4fe414ebd5-1604018916",
"category": "Payload delivery",
"uuid": "f876239e-3ee3-40b8-a6c4-c8b442584b98"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "55/69",
"category": "Payload delivery",
"uuid": "aa4c835e-55c7-4a4b-a6f5-74022cf5a8e5"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c6b32ce3-eb60-458e-a9c4-79c6323bf988",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:25.000Z",
"modified": "2020-10-30T08:56:25.000Z",
"pattern": "[file:hashes.MD5 = '7b5e870565f0563abe7e4150969f52de' AND file:hashes.SHA1 = '7f727a5f02359e44ad075053fb4dfcc55c83dccc' AND file:hashes.SHA256 = '8dde9b01b0e4eb47afff7daf5d59abf72e68ec6d944a9404f78ba69fcbd5310d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:25Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--a3ed0c52-f5a7-4eca-b69d-7e6c7df2c44f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:26.000Z",
"modified": "2020-10-30T08:56:26.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-06-27T21:52:44+00:00",
"category": "Other",
"uuid": "073ab999-e864-407b-9b87-6f17724df733"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/8dde9b01b0e4eb47afff7daf5d59abf72e68ec6d944a9404f78ba69fcbd5310d/detection/f-8dde9b01b0e4eb47afff7daf5d59abf72e68ec6d944a9404f78ba69fcbd5310d-1593294764",
"category": "Payload delivery",
"uuid": "760a3e42-29a1-4d66-8922-7dded1d3bdcd"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "2/63",
"category": "Payload delivery",
"uuid": "91c57ecf-17d5-46ab-bbc7-3f658c5df3d4"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d2983ca3-9223-4a87-b04f-6de51ace37a7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:26.000Z",
"modified": "2020-10-30T08:56:26.000Z",
"pattern": "[file:hashes.MD5 = '7767c187579466c4d9527291c20664c5' AND file:hashes.SHA1 = '6dc993b4db27a3c12895bf804e0237f2cba40473' AND file:hashes.SHA256 = '9e99facf8ea4c39a5d2bfc404fbae99b37bae36ab589a2a67acf23d03de96512']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:26Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--eab302f5-7a18-4f5e-b606-4a7411472846",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:26.000Z",
"modified": "2020-10-30T08:56:26.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T00:47:58+00:00",
"category": "Other",
"uuid": "16c23d69-bfff-4100-849d-216b02d4e902"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/9e99facf8ea4c39a5d2bfc404fbae99b37bae36ab589a2a67acf23d03de96512/detection/f-9e99facf8ea4c39a5d2bfc404fbae99b37bae36ab589a2a67acf23d03de96512-1604018878",
"category": "Payload delivery",
"uuid": "95587d79-5287-4520-807f-5a8569a1dc39"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "58/71",
"category": "Payload delivery",
"uuid": "ec9a9044-118d-4a67-8bc6-4af354cd9f8d"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--522f5599-7a15-4eaf-bc74-74ad5dd77996",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:26.000Z",
"modified": "2020-10-30T08:56:26.000Z",
"pattern": "[file:hashes.MD5 = 'feb6a6bac205b0baf0bdab6bd405110f' AND file:hashes.SHA1 = '1baab9662c1f71e5406897804837b45f78e14682' AND file:hashes.SHA256 = 'ab99e91e1b0951feabd09d049e0ac9d9412c67603415c10cbeadde5842ca02d2']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:26Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--4cd9d948-55ef-4f84-8e84-b0eb3b3f63f8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:26.000Z",
"modified": "2020-10-30T08:56:26.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-11T08:29:42+00:00",
"category": "Other",
"uuid": "9b395ce4-e2e4-4845-b89f-6a9a8adbd38f"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/ab99e91e1b0951feabd09d049e0ac9d9412c67603415c10cbeadde5842ca02d2/detection/f-ab99e91e1b0951feabd09d049e0ac9d9412c67603415c10cbeadde5842ca02d2-1602404982",
"category": "Payload delivery",
"uuid": "db52503b-934d-40ac-97de-f1db9d50f9f1"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "39/69",
"category": "Payload delivery",
"uuid": "cc24a489-0b12-45fe-a5c4-be53c86006ab"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--590167ef-b668-496f-8970-7bd7d16826bf",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:26.000Z",
"modified": "2020-10-30T08:56:26.000Z",
"pattern": "[file:hashes.MD5 = 'f4bf1dd766e2354af3952d9b1ef26d88' AND file:hashes.SHA1 = 'a898cf3d79cece3948d148b301551ae4543dda74' AND file:hashes.SHA256 = 'b95be82b7682341cf7e2b8e33f1ca0c8915ee005bd71c50ad877da99c7ec39f6']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:26Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--a8374917-93c1-457e-996e-c942d50f31d3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:26.000Z",
"modified": "2020-10-30T08:56:26.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T00:48:40+00:00",
"category": "Other",
"uuid": "37386646-cdf7-456b-8a30-6c7d83da164c"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/b95be82b7682341cf7e2b8e33f1ca0c8915ee005bd71c50ad877da99c7ec39f6/detection/f-b95be82b7682341cf7e2b8e33f1ca0c8915ee005bd71c50ad877da99c7ec39f6-1604018920",
"category": "Payload delivery",
"uuid": "4955ff52-47a2-4d3a-9012-519140c847eb"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "39/72",
"category": "Payload delivery",
"uuid": "4f298413-dca7-4ef5-97a3-6b245c8672c2"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1f2972d3-a2b9-4e33-b097-362ad59cf22a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:26.000Z",
"modified": "2020-10-30T08:56:26.000Z",
"pattern": "[file:hashes.MD5 = '7430f8e3f9f8716b8dbc548997ad8f8a' AND file:hashes.SHA1 = '7062cd7b0e0d3eef423e20aef39fb330faf88717' AND file:hashes.SHA256 = '4544b478b2029ec38eb4bda111741a10f0684e38f1b29ce092b93df882d11f9e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:26Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--ea2bb670-0be4-494b-8513-325713ffa7b3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:26.000Z",
"modified": "2020-10-30T08:56:26.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-27T14:40:08+00:00",
"category": "Other",
"uuid": "fbc1e04c-f4b3-4754-a382-b20fef186300"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/4544b478b2029ec38eb4bda111741a10f0684e38f1b29ce092b93df882d11f9e/detection/f-4544b478b2029ec38eb4bda111741a10f0684e38f1b29ce092b93df882d11f9e-1603809608",
"category": "Payload delivery",
"uuid": "7c9b89f4-c0ef-4aa2-ad08-b325518e6228"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "52/62",
"category": "Payload delivery",
"uuid": "82a63625-ad77-49ee-a9ce-a8aa7dbbae14"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--878ff7cd-c5c0-4ad7-a9fc-9fac552d4b7a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:26.000Z",
"modified": "2020-10-30T08:56:26.000Z",
"pattern": "[file:hashes.MD5 = '6c6846b436ec85b9179ad77fb585e20c' AND file:hashes.SHA1 = '4d75fd0ece50bb305a34db32157da76c7fa1ef1a' AND file:hashes.SHA256 = 'f9c459824e223d5523ac6edfea7b842cf168ae135045258b04b4760f4002a86f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:26Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--7529b90e-54c5-43da-858e-524ab68604bb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:26.000Z",
"modified": "2020-10-30T08:56:26.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-07T12:07:29+00:00",
"category": "Other",
"uuid": "8476a6d5-26db-456d-ba55-f54d3fe89455"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/f9c459824e223d5523ac6edfea7b842cf168ae135045258b04b4760f4002a86f/detection/f-f9c459824e223d5523ac6edfea7b842cf168ae135045258b04b4760f4002a86f-1602072449",
"category": "Payload delivery",
"uuid": "9cdc41fa-b0c7-40d7-b9e9-b6a14716bfdf"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "36/69",
"category": "Payload delivery",
"uuid": "c6a285b5-f6ef-41a9-af41-688c9525119b"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d7304186-e248-49e9-a821-d4e1b2bfff31",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:26.000Z",
"modified": "2020-10-30T08:56:26.000Z",
"pattern": "[file:hashes.MD5 = '4988b2bd0ba2e100a40d76ae0b4dea94' AND file:hashes.SHA1 = 'fe19be43f9628298e158b7f392953be4e4468043' AND file:hashes.SHA256 = '484418a9516fbe04de0d99704ac521b04825bfdbc4abbcbf1ba88a28c26373ea']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:26Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--2f5b67f5-2eb1-45a4-8067-e0619f071a9a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:26.000Z",
"modified": "2020-10-30T08:56:26.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-18T14:36:57+00:00",
"category": "Other",
"uuid": "916db53f-f107-4404-8ca1-30ba978697f8"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/484418a9516fbe04de0d99704ac521b04825bfdbc4abbcbf1ba88a28c26373ea/detection/f-484418a9516fbe04de0d99704ac521b04825bfdbc4abbcbf1ba88a28c26373ea-1603031817",
"category": "Payload delivery",
"uuid": "c2130ec6-72f1-43d0-a477-8dd8ef70cc79"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "56/71",
"category": "Payload delivery",
"uuid": "0e406f20-f95f-4ab2-a1be-11663a3a1dfd"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--bcb35d45-3b99-4de3-952c-eaccba4124e5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:26.000Z",
"modified": "2020-10-30T08:56:26.000Z",
"pattern": "[file:hashes.MD5 = 'd14e7a1d3a56511c164c36077777c2da' AND file:hashes.SHA1 = 'f9ae4e7d956d29fd9564316fc2584e47c02501cc' AND file:hashes.SHA256 = '5fc95870132e4709a5a0086593490cd04eb121f2f238b44cb19679125e842115']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:26Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--ec28b665-f612-473f-9512-fd6f869b06fe",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:26.000Z",
"modified": "2020-10-30T08:56:26.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-09-05T07:21:27+00:00",
"category": "Other",
"uuid": "39c8ae20-222b-4bcf-8471-200d6051079d"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/5fc95870132e4709a5a0086593490cd04eb121f2f238b44cb19679125e842115/detection/f-5fc95870132e4709a5a0086593490cd04eb121f2f238b44cb19679125e842115-1599290487",
"category": "Payload delivery",
"uuid": "3c9cb887-2d4f-42e0-9190-4ccc1621fe8d"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "41/69",
"category": "Payload delivery",
"uuid": "21a268ec-7a0d-4f90-975d-f983c234cb86"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8e934a55-9f8c-431c-85c8-f52a2574eb6d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:26.000Z",
"modified": "2020-10-30T08:56:26.000Z",
"pattern": "[file:hashes.MD5 = 'c8777183e31a2aaa6b30f9d2d2103fd3' AND file:hashes.SHA1 = '356277603cf3cbc777811069fc631c66874901cb' AND file:hashes.SHA256 = '798d9d960b1a6dba959831983573ce7de2ea376f13f1e0fe7968beeca37f0540']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:26Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--93b3d657-1591-445c-9a59-22b998db2f98",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:26.000Z",
"modified": "2020-10-30T08:56:26.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-27T04:38:13+00:00",
"category": "Other",
"uuid": "d467b1ce-0575-4a9c-bd2e-97cf6a84ae2f"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/798d9d960b1a6dba959831983573ce7de2ea376f13f1e0fe7968beeca37f0540/detection/f-798d9d960b1a6dba959831983573ce7de2ea376f13f1e0fe7968beeca37f0540-1603773493",
"category": "Payload delivery",
"uuid": "a4ec54bf-13d0-4a1d-b0a1-f680cf2c0e55"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "41/66",
"category": "Payload delivery",
"uuid": "464db131-2f52-4f34-a556-5ba4000842ca"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--61def0f6-fcdb-4c6c-9557-89fa5c3fd142",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:26.000Z",
"modified": "2020-10-30T08:56:26.000Z",
"pattern": "[file:hashes.MD5 = '91f49d454a066e0acacac21083a2f300' AND file:hashes.SHA1 = '9f594478d57301f42bb766211106464cbcf9476e' AND file:hashes.SHA256 = 'b62ba19f3f6ab6200a764a14a268cbf21efe3b48030f7a8bccd96300d56ec950']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:26Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--bb4fb207-7951-414d-ac6c-cc6ab057787c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:26.000Z",
"modified": "2020-10-30T08:56:26.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-09-06T08:12:29+00:00",
"category": "Other",
"uuid": "02b86361-900f-4e64-9c46-46945e74f6f6"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/b62ba19f3f6ab6200a764a14a268cbf21efe3b48030f7a8bccd96300d56ec950/detection/f-b62ba19f3f6ab6200a764a14a268cbf21efe3b48030f7a8bccd96300d56ec950-1599379949",
"category": "Payload delivery",
"uuid": "e3b336c8-271d-4581-9323-51095080240d"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "50/69",
"category": "Payload delivery",
"uuid": "d53bdb2e-25b5-4b18-8f63-e708247b2806"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3688243c-dba5-4425-83df-05469b53270e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:27.000Z",
"modified": "2020-10-30T08:56:27.000Z",
"pattern": "[file:hashes.MD5 = 'acebea7d95a9c8d8e2fa4ba538600be1' AND file:hashes.SHA1 = '9a36a1ec630cd5d0451d84b214f89d9bf867b394' AND file:hashes.SHA256 = 'ca8d8d55c30ed37ce1bc36e514a3fee5b0bc00ef5c88b8d07d51dbd9a141ff33']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:27Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--83e74766-26ae-4c43-b22c-d0f6f6871b9a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:27.000Z",
"modified": "2020-10-30T08:56:27.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T00:49:01+00:00",
"category": "Other",
"uuid": "4b475d1e-a798-4d26-8ccd-a8ede4f8ad8f"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/ca8d8d55c30ed37ce1bc36e514a3fee5b0bc00ef5c88b8d07d51dbd9a141ff33/detection/f-ca8d8d55c30ed37ce1bc36e514a3fee5b0bc00ef5c88b8d07d51dbd9a141ff33-1604018941",
"category": "Payload delivery",
"uuid": "9cf0192d-a985-496f-9a54-560870718976"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "60/72",
"category": "Payload delivery",
"uuid": "cd29c8ce-01c3-4865-95a4-57569772192f"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9da3fb39-1b7f-45b9-9c2b-18f02edb7a13",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:27.000Z",
"modified": "2020-10-30T08:56:27.000Z",
"pattern": "[file:hashes.MD5 = '4a31d5f7e10f8113099a0d898c4ebc40' AND file:hashes.SHA1 = '973ccbdc3b5ea8e0588df797b688b62687a7d35d' AND file:hashes.SHA256 = '15fcb756a05b69518be5e32b98b25f398e999d4ec971364fe01f9dd0f78747e3']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:27Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--984012d5-eb26-486d-ba47-720d981b8305",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:27.000Z",
"modified": "2020-10-30T08:56:27.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T00:42:13+00:00",
"category": "Other",
"uuid": "3db07e20-8764-4836-9895-fa52de863d5c"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/15fcb756a05b69518be5e32b98b25f398e999d4ec971364fe01f9dd0f78747e3/detection/f-15fcb756a05b69518be5e32b98b25f398e999d4ec971364fe01f9dd0f78747e3-1604018533",
"category": "Payload delivery",
"uuid": "289f526d-eb73-4818-abea-6cb92221caf7"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "61/71",
"category": "Payload delivery",
"uuid": "a15c0d04-cf12-457f-8451-dae9adc076cb"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8c2d5422-b02d-4ad5-9eda-e19b2f8520d3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:27.000Z",
"modified": "2020-10-30T08:56:27.000Z",
"pattern": "[file:hashes.MD5 = '8e473a4c59419617eda8596a4f88c050' AND file:hashes.SHA1 = '86b85612ebe92fddbb8acdb81a23b3d9edba3cbc' AND file:hashes.SHA256 = '8a4515c285fd0779292f0ac7d08f6bb5b6fca00a23ce98133e52625ee11bbf36']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:27Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--1d8386a5-94a3-418f-bd81-ba11f4d870fe",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:27.000Z",
"modified": "2020-10-30T08:56:27.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T00:44:35+00:00",
"category": "Other",
"uuid": "04da050f-984a-4081-846e-433c0d71cf62"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/8a4515c285fd0779292f0ac7d08f6bb5b6fca00a23ce98133e52625ee11bbf36/detection/f-8a4515c285fd0779292f0ac7d08f6bb5b6fca00a23ce98133e52625ee11bbf36-1604018675",
"category": "Payload delivery",
"uuid": "9e38efa0-b5f6-43c5-84a8-1224c1a4ec2e"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "58/70",
"category": "Payload delivery",
"uuid": "5aea5a74-a12f-43d5-9916-2faab7c86e04"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7e5e847c-9c77-4184-8d70-9c5e59739b82",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:27.000Z",
"modified": "2020-10-30T08:56:27.000Z",
"pattern": "[file:hashes.MD5 = '23f82c716239d61c91bbf190621c1ce1' AND file:hashes.SHA1 = '3951accff0d6f75164ca256f8f070240d6806370' AND file:hashes.SHA256 = 'd6f97c6dbe021f02adb2139fc990996ca0d670ceab0189017e69171298ea9c27']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:27Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--cb350869-f30b-4548-bd9f-9835eba3747a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:27.000Z",
"modified": "2020-10-30T08:56:27.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-03-30T18:26:54+00:00",
"category": "Other",
"uuid": "3b6936e9-79d9-4526-86d4-dd4d5884ec94"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/d6f97c6dbe021f02adb2139fc990996ca0d670ceab0189017e69171298ea9c27/detection/f-d6f97c6dbe021f02adb2139fc990996ca0d670ceab0189017e69171298ea9c27-1585592814",
"category": "Payload delivery",
"uuid": "2328b7fe-33f1-4e49-ab65-ea800d03ae75"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "40/72",
"category": "Payload delivery",
"uuid": "888a7681-bae1-4270-b4ad-5522ad6bdfda"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0cf779f9-164d-457d-ad04-ea623e3076d3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:27.000Z",
"modified": "2020-10-30T08:56:27.000Z",
"pattern": "[file:hashes.MD5 = 'b75840aa5b36fe12522f785561a03521' AND file:hashes.SHA1 = '2989b2650ba134e3a2ea31108f0c9f7c61817069' AND file:hashes.SHA256 = 'ffd51f3de4ba08508ca7c19dd15676c2c8f4a61891c1dea297bb648633485bcd']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:27Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--1197e5b8-cd16-493f-a5b8-8f9491c300f9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:27.000Z",
"modified": "2020-10-30T08:56:27.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-27T12:07:53+00:00",
"category": "Other",
"uuid": "cb6d6d31-f747-47cc-ab5e-49bf81b8a260"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/ffd51f3de4ba08508ca7c19dd15676c2c8f4a61891c1dea297bb648633485bcd/detection/f-ffd51f3de4ba08508ca7c19dd15676c2c8f4a61891c1dea297bb648633485bcd-1603800473",
"category": "Payload delivery",
"uuid": "74bc5fdf-c2b7-4f1e-893e-f4dd7c85cfea"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "37/64",
"category": "Payload delivery",
"uuid": "2e5f82e4-a075-4222-9c1f-98226159fec8"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7169c4a0-202c-4276-aa95-4209b3d9e92a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:27.000Z",
"modified": "2020-10-30T08:56:27.000Z",
"pattern": "[file:hashes.MD5 = '4d79c23c41794ed2ea6ce6283184fecd' AND file:hashes.SHA1 = 'c655380d880dc254bf0303ecdebd21be2019fea3' AND file:hashes.SHA256 = '31045ab2d2e8f7074e2d0f312b4b79387a6794c4455100d501f6c5ea220ad207']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:27Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--ac2f44f8-9449-4acb-8612-7068a7fb9c88",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:27.000Z",
"modified": "2020-10-30T08:56:27.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-06T14:08:37+00:00",
"category": "Other",
"uuid": "8bf7424f-f459-4e76-8dad-a86746af8456"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/31045ab2d2e8f7074e2d0f312b4b79387a6794c4455100d501f6c5ea220ad207/detection/f-31045ab2d2e8f7074e2d0f312b4b79387a6794c4455100d501f6c5ea220ad207-1601993317",
"category": "Payload delivery",
"uuid": "5ccd5b97-a9ee-46e0-9d53-b186f78b5d65"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "57/70",
"category": "Payload delivery",
"uuid": "ce9a88a4-8d24-4ec4-b4dd-bc3d64b773a7"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--39872eaa-fca6-44e8-942d-07104ec61f98",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:27.000Z",
"modified": "2020-10-30T08:56:27.000Z",
"pattern": "[file:hashes.MD5 = 'd80015cfd1b5b289440b2e81f2061519' AND file:hashes.SHA1 = '9fbff4c08b3cdd8cd47a1c4980c94115693d85e8' AND file:hashes.SHA256 = 'e1e154590062bab331805d1657cbdea323053e25e0c5efe4a93d2deeca689452']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:27Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--b5a4ef02-e2a8-4ff5-941f-82a9b7be9f9b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:27.000Z",
"modified": "2020-10-30T08:56:27.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-16T11:08:53+00:00",
"category": "Other",
"uuid": "f5bfdb31-2ab7-476c-928f-f6fb0a862416"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/e1e154590062bab331805d1657cbdea323053e25e0c5efe4a93d2deeca689452/detection/f-e1e154590062bab331805d1657cbdea323053e25e0c5efe4a93d2deeca689452-1602846533",
"category": "Payload delivery",
"uuid": "c1c459cf-7b59-41c5-92c1-ad98b44737a8"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "57/71",
"category": "Payload delivery",
"uuid": "9acd1e67-9aab-4ca7-a58e-e7591849d622"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--85318a94-ab67-4089-9af3-32be44d7c131",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:27.000Z",
"modified": "2020-10-30T08:56:27.000Z",
"pattern": "[file:hashes.MD5 = '854505042c28adc1a3e610ffc46950d7' AND file:hashes.SHA1 = '7b57bb7de7c50dd430938f4355797b4d1a5de299' AND file:hashes.SHA256 = '9e513f9876410f792a0f97c8bead2122c9f26cf07136fe8afbac8da48120953b']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:27Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--259af175-f2fb-4292-ba82-692fb829126d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:27.000Z",
"modified": "2020-10-30T08:56:27.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-27T04:37:39+00:00",
"category": "Other",
"uuid": "6be03700-a6cd-4d09-aa6a-14f6275beb4a"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/9e513f9876410f792a0f97c8bead2122c9f26cf07136fe8afbac8da48120953b/detection/f-9e513f9876410f792a0f97c8bead2122c9f26cf07136fe8afbac8da48120953b-1603773459",
"category": "Payload delivery",
"uuid": "b98fe712-bb62-4678-aa60-305fe1910982"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "52/61",
"category": "Payload delivery",
"uuid": "9d1f63b2-f72b-4970-a2ee-b264fd935afd"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b16b9ea1-7e8a-4dd7-ace1-1ce87d453a89",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:27.000Z",
"modified": "2020-10-30T08:56:27.000Z",
"pattern": "[file:hashes.MD5 = '45c4e9677ac5daf4c2e37228e98b09a4' AND file:hashes.SHA1 = 'edd5de852d87da23bfbca2625de7d40010cbc053' AND file:hashes.SHA256 = '60a45919ec5e67c2843fd08745f26437934ae3ceae76133a23aa0690d6a72f86']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:27Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--a5ae663f-2dfa-4b90-bc5d-ead300eb2441",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:27.000Z",
"modified": "2020-10-30T08:56:27.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T06:19:02+00:00",
"category": "Other",
"uuid": "4078cbb1-a6d0-4b75-a5e7-f6673ed04199"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/60a45919ec5e67c2843fd08745f26437934ae3ceae76133a23aa0690d6a72f86/detection/f-60a45919ec5e67c2843fd08745f26437934ae3ceae76133a23aa0690d6a72f86-1604038742",
"category": "Payload delivery",
"uuid": "74158aed-febe-4986-8296-548438e1de11"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "57/71",
"category": "Payload delivery",
"uuid": "09cbca5a-16b5-4ffb-a49d-b767acf7e3a4"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4bada252-c578-43d6-9196-94b816fd373e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:28.000Z",
"modified": "2020-10-30T08:56:28.000Z",
"pattern": "[file:hashes.MD5 = 'f7ee8811189110a112ea32aa64eba823' AND file:hashes.SHA1 = 'b302c4b84b82190b3d15f8c7788108a13859319d' AND file:hashes.SHA256 = '93193c90f568ae1ebdbdd5607c00ce250f6c886cec60724bdcf5e25c6ba82554']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:28Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--59a33fb7-bbfb-4df0-bade-05bd106312c2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:28.000Z",
"modified": "2020-10-30T08:56:28.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T00:47:36+00:00",
"category": "Other",
"uuid": "356182a0-230b-4c27-8fbe-78bed2970b9d"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/93193c90f568ae1ebdbdd5607c00ce250f6c886cec60724bdcf5e25c6ba82554/detection/f-93193c90f568ae1ebdbdd5607c00ce250f6c886cec60724bdcf5e25c6ba82554-1604018856",
"category": "Payload delivery",
"uuid": "8632bb68-3991-4e9c-9971-8c84dbc0e6f3"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "56/70",
"category": "Payload delivery",
"uuid": "608bbc6f-f669-4b37-9f8a-10affadb6591"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c09dc808-4138-4d16-9516-df61205371e0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:28.000Z",
"modified": "2020-10-30T08:56:28.000Z",
"pattern": "[file:hashes.MD5 = '7d1504013c7f23e592691f90e6b2b2d5' AND file:hashes.SHA1 = '8bcad2a2ec67a4ad7501c67ae381986e4fd7e323' AND file:hashes.SHA256 = 'bb412455c3988a845ee04cd9f665df285bb00dfb62af377ff9a06d6f032e3aa1']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:28Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--56d3a112-940d-4480-85de-d34f6cd6ebdb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:28.000Z",
"modified": "2020-10-30T08:56:28.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-12T08:13:38+00:00",
"category": "Other",
"uuid": "b55f9e53-3ee3-42dd-8397-94825ce86a56"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/bb412455c3988a845ee04cd9f665df285bb00dfb62af377ff9a06d6f032e3aa1/detection/f-bb412455c3988a845ee04cd9f665df285bb00dfb62af377ff9a06d6f032e3aa1-1602490418",
"category": "Payload delivery",
"uuid": "f8b4602d-954e-4e04-bd08-8427590e210a"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "58/70",
"category": "Payload delivery",
"uuid": "a746028b-3fea-48ae-9724-636d791eb419"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3b583c88-393d-49f8-9b29-3773a8ee7f92",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:28.000Z",
"modified": "2020-10-30T08:56:28.000Z",
"pattern": "[file:hashes.MD5 = '2beab2a02d798705e18ea0394898a2b6' AND file:hashes.SHA1 = 'e30bc0c5527bc08bf8e72216ffb7ddca785b4ef5' AND file:hashes.SHA256 = '9dce80e3b848c6a52a89e89b4d8904635a7a0a6a069f6c164b2becb5eda4d814']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:28Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--5fb79bae-c985-40ec-822e-48bcd90ef8f8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:28.000Z",
"modified": "2020-10-30T08:56:28.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T00:47:54+00:00",
"category": "Other",
"uuid": "e2a34e40-269a-4bd9-810c-67f2570642e1"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/9dce80e3b848c6a52a89e89b4d8904635a7a0a6a069f6c164b2becb5eda4d814/detection/f-9dce80e3b848c6a52a89e89b4d8904635a7a0a6a069f6c164b2becb5eda4d814-1604018874",
"category": "Payload delivery",
"uuid": "7e7aa370-e0ea-4bdb-b7c9-bd9afb30d896"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "60/72",
"category": "Payload delivery",
"uuid": "1d3a2c8c-c1e2-4bd2-91b6-759bf269d545"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0160b000-c718-4bc9-adc4-40fdaadbfe06",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:28.000Z",
"modified": "2020-10-30T08:56:28.000Z",
"pattern": "[file:hashes.MD5 = '9ff18f7a19e06b602e19b9e0aca3ad84' AND file:hashes.SHA1 = 'bcbb5bbc55b4f44397c34e9fca2017587e69219b' AND file:hashes.SHA256 = '9d8cbb2bf4801276de2143ccd64a7d0f66263809a90bea0b664282a15d121d9e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:28Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--cf6f7ae6-d0d1-4846-bd3f-eada735297bb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:28.000Z",
"modified": "2020-10-30T08:56:28.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-29T15:22:04+00:00",
"category": "Other",
"uuid": "32508ebb-7e71-40db-850e-1f867fe9a3f2"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/9d8cbb2bf4801276de2143ccd64a7d0f66263809a90bea0b664282a15d121d9e/detection/f-9d8cbb2bf4801276de2143ccd64a7d0f66263809a90bea0b664282a15d121d9e-1603984924",
"category": "Payload delivery",
"uuid": "fb0e10e5-4052-4788-af23-6cbcc686848e"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "49/67",
"category": "Payload delivery",
"uuid": "e38761fa-8696-4b65-84af-3da55c0fe953"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2f72d335-4d2e-446b-b91c-9f3ec0c5825f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:28.000Z",
"modified": "2020-10-30T08:56:28.000Z",
"pattern": "[file:hashes.MD5 = '9843710a665219484ba6b93b0f3aff5d' AND file:hashes.SHA1 = '66c9c98978bac095f5f69ac84e06b7ea7d509120' AND file:hashes.SHA256 = '625bd1db4f5fbd8fa9a4c78bc7f1ffe421dead5b0b0b4b2a65be879f9a123a23']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:28Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--671d9a9c-557b-4954-afb7-84116dfaafdf",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:28.000Z",
"modified": "2020-10-30T08:56:28.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T05:13:47+00:00",
"category": "Other",
"uuid": "3883a4ea-d381-4e47-bdb0-7387bbc5e6c3"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/625bd1db4f5fbd8fa9a4c78bc7f1ffe421dead5b0b0b4b2a65be879f9a123a23/detection/f-625bd1db4f5fbd8fa9a4c78bc7f1ffe421dead5b0b0b4b2a65be879f9a123a23-1604034827",
"category": "Payload delivery",
"uuid": "09698b6c-8eb6-4339-8826-f2eb5e20e8bc"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "59/72",
"category": "Payload delivery",
"uuid": "cb2d5465-817c-4342-9d5f-27d43f79e934"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a5d51c54-9186-434c-9370-1b043a73527e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:28.000Z",
"modified": "2020-10-30T08:56:28.000Z",
"pattern": "[file:hashes.MD5 = 'a661aeb906f044b100f557a47f6003a1' AND file:hashes.SHA1 = '607f6034eae83b6546060cff5085d79b0bb0a7cd' AND file:hashes.SHA256 = 'ba2a96dae66324df5bbb0751a04c538722ad49daa12d51625f8a1890608b1168']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:28Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--b1c3a402-f547-4396-982a-95a61fc14c24",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:28.000Z",
"modified": "2020-10-30T08:56:28.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-17T00:22:53+00:00",
"category": "Other",
"uuid": "9799978b-2ba6-4e31-9df6-3c5d357cd890"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/ba2a96dae66324df5bbb0751a04c538722ad49daa12d51625f8a1890608b1168/detection/f-ba2a96dae66324df5bbb0751a04c538722ad49daa12d51625f8a1890608b1168-1602894173",
"category": "Payload delivery",
"uuid": "69f27191-8030-4661-a91d-4140505922ea"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "49/70",
"category": "Payload delivery",
"uuid": "2123b422-059d-474a-8436-2f25f90a01a4"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--39ae68e0-13ea-4711-b214-3af059803286",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:28.000Z",
"modified": "2020-10-30T08:56:28.000Z",
"pattern": "[file:hashes.MD5 = 'b3538b8fe99d1912479e0312f184f996' AND file:hashes.SHA1 = '39fd9e92abcb2375c834a388ad68c540e31bbaf2' AND file:hashes.SHA256 = '9f74293d070390a2f783030eed5de4c64b1d32e2046b8c440cc39984b453b12f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:28Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--36c61803-2877-405f-b6b0-5acbe905782e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:28.000Z",
"modified": "2020-10-30T08:56:28.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T00:48:00+00:00",
"category": "Other",
"uuid": "3fdfbb7f-dd4e-4731-9fa8-82148cfa1054"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/9f74293d070390a2f783030eed5de4c64b1d32e2046b8c440cc39984b453b12f/detection/f-9f74293d070390a2f783030eed5de4c64b1d32e2046b8c440cc39984b453b12f-1604018880",
"category": "Payload delivery",
"uuid": "35d8797c-e3d3-450f-8fc9-e158514a3fc5"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "59/72",
"category": "Payload delivery",
"uuid": "c2cb51e3-0921-411b-ad15-58dc86ee7d7d"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2a42886a-67dc-44e5-bdec-bca5c3b4aaf3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:28.000Z",
"modified": "2020-10-30T08:56:28.000Z",
"pattern": "[file:hashes.MD5 = '274cc6ab4f50a45f91bd491efbd9c7ba' AND file:hashes.SHA1 = '16d66c07666dc9900ff46cdb3738f4df48368cb3' AND file:hashes.SHA256 = 'd9dc572d6e446ec7629479eb60119b57a135e77aae22ea9f5a29a543af85b7da']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:28Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--09d1177b-e3e6-4f3d-925b-ac25620cad00",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:28.000Z",
"modified": "2020-10-30T08:56:28.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-05-07T15:18:07+00:00",
"category": "Other",
"uuid": "a7d77b68-1945-4cd3-8082-eec0234042c6"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/d9dc572d6e446ec7629479eb60119b57a135e77aae22ea9f5a29a543af85b7da/detection/f-d9dc572d6e446ec7629479eb60119b57a135e77aae22ea9f5a29a543af85b7da-1588864687",
"category": "Payload delivery",
"uuid": "f762a1bc-bd9d-4c66-9257-5ccc15d86f3d"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "0/59",
"category": "Payload delivery",
"uuid": "4559dbdb-43c7-425b-b9fd-3344f1966af9"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--be44f41e-6b44-4cc5-9f3d-8bf5755c4e91",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:28.000Z",
"modified": "2020-10-30T08:56:28.000Z",
"pattern": "[file:hashes.MD5 = 'f2d75e2de4845c1478497c28cbc42251' AND file:hashes.SHA1 = 'f4a806dc83bddf79d1973c421997668a9e125cfc' AND file:hashes.SHA256 = '5c3569c166654eed781b9a2a563adec8e2047078fdcbafcdef712fabf2dd3f57']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:28Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--90c6a983-0097-405d-816a-d7d0aa604363",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:28.000Z",
"modified": "2020-10-30T08:56:28.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-08-26T20:02:37+00:00",
"category": "Other",
"uuid": "ffc60bae-969c-465b-afd3-6b2f7a4bc7a6"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/5c3569c166654eed781b9a2a563adec8e2047078fdcbafcdef712fabf2dd3f57/detection/f-5c3569c166654eed781b9a2a563adec8e2047078fdcbafcdef712fabf2dd3f57-1598472157",
"category": "Payload delivery",
"uuid": "2da6cd1d-a596-4464-9855-c7be999a0e96"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "52/68",
"category": "Payload delivery",
"uuid": "510a5537-0ed6-4f67-8413-51737ebed69e"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c2b35c06-e9fb-4bc9-be25-fc70417cedf4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:28.000Z",
"modified": "2020-10-30T08:56:28.000Z",
"pattern": "[file:hashes.MD5 = 'f8aae4c883e19e3e1e880e7ae38c2369' AND file:hashes.SHA1 = 'f3ca59da7702ca9cb8fdb9f1b764ef2c7915a8a5' AND file:hashes.SHA256 = '8b6c3018958e7ae20989045811358b1225606000c879000c779444cc50290d9e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:28Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--8a87830e-ecc9-495e-84ba-a143f2bcd94f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:28.000Z",
"modified": "2020-10-30T08:56:28.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T00:44:36+00:00",
"category": "Other",
"uuid": "b39033ca-a37c-41bf-a06b-f1d307e6419b"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/8b6c3018958e7ae20989045811358b1225606000c879000c779444cc50290d9e/detection/f-8b6c3018958e7ae20989045811358b1225606000c879000c779444cc50290d9e-1604018676",
"category": "Payload delivery",
"uuid": "d6bab64e-816d-4cc0-833c-9afcfab48587"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "59/72",
"category": "Payload delivery",
"uuid": "2a749950-8809-4ce2-b906-07c453156a80"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4e1bef3c-5152-40f7-b83f-b29b1737af98",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:28.000Z",
"modified": "2020-10-30T08:56:28.000Z",
"pattern": "[file:hashes.MD5 = '940cc2c6dcd0bdc0875abbc7a309a345' AND file:hashes.SHA1 = '83d78d12cf7f8bb291c7a65ece1a0bc92d11d03d' AND file:hashes.SHA256 = '98266835a238797f34d1a252e6af0f029c7823af757df10609f534c4f987e70f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:28Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--6a445163-58d2-473d-9100-c9b17e1d420b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:29.000Z",
"modified": "2020-10-30T08:56:29.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-09-18T21:42:06+00:00",
"category": "Other",
"uuid": "433fc300-54dc-4fcd-ba73-96b5c730d76a"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/98266835a238797f34d1a252e6af0f029c7823af757df10609f534c4f987e70f/detection/f-98266835a238797f34d1a252e6af0f029c7823af757df10609f534c4f987e70f-1600465326",
"category": "Payload delivery",
"uuid": "79f307a4-cf36-434a-9696-a45a70e2837c"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "48/66",
"category": "Payload delivery",
"uuid": "df18e53a-9f89-4b53-b67f-237b8bdc32bc"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--059a2690-75da-4ce5-aa90-f93ab97f530f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:29.000Z",
"modified": "2020-10-30T08:56:29.000Z",
"pattern": "[file:hashes.MD5 = '26337d35353d2df5d778a4ed6075cb70' AND file:hashes.SHA1 = '996bfa802dc83374fe9b018f39a004aae76e51fb' AND file:hashes.SHA256 = '5eddf95ec34e512d6db1058fdd9fa886e3fc1e7d4090d1999f1764627db5c1ee']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:29Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--fbaaca08-1b6c-44c6-9aec-171935d04e5c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:29.000Z",
"modified": "2020-10-30T08:56:29.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-29T09:44:32+00:00",
"category": "Other",
"uuid": "53c7a1b3-6d46-48dc-8459-7730db9958bc"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/5eddf95ec34e512d6db1058fdd9fa886e3fc1e7d4090d1999f1764627db5c1ee/detection/f-5eddf95ec34e512d6db1058fdd9fa886e3fc1e7d4090d1999f1764627db5c1ee-1603964672",
"category": "Payload delivery",
"uuid": "408461a3-6fb8-4e40-96ca-48a9415f1a7c"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "52/71",
"category": "Payload delivery",
"uuid": "daafdcb0-8f46-47df-9774-254638c648dc"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1e10c051-b1b1-44b5-9c28-8dd9e3752a6c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:29.000Z",
"modified": "2020-10-30T08:56:29.000Z",
"pattern": "[file:hashes.MD5 = '89c640bec51ab9f8d97add9a0dd39512' AND file:hashes.SHA1 = '607b6ac839547dc71058044d033528e34e6e004d' AND file:hashes.SHA256 = '0e464ad7bde50e55aa42dac985295e22deb78c1a48809563f18cd4a6f47a104a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:29Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--8dfb30ca-fe11-45b7-96df-67e092866720",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:29.000Z",
"modified": "2020-10-30T08:56:29.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T00:42:00+00:00",
"category": "Other",
"uuid": "a9394aa7-bc9b-4ea1-aab9-34a1d8743d5d"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/0e464ad7bde50e55aa42dac985295e22deb78c1a48809563f18cd4a6f47a104a/detection/f-0e464ad7bde50e55aa42dac985295e22deb78c1a48809563f18cd4a6f47a104a-1604018520",
"category": "Payload delivery",
"uuid": "5b461b90-473e-48e5-b9b7-3f0e929821a3"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "58/71",
"category": "Payload delivery",
"uuid": "3ae3a26e-86dc-4f38-a48f-2697f488bff4"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1253fc5b-4990-4d6b-957f-c0df3912a373",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:29.000Z",
"modified": "2020-10-30T08:56:29.000Z",
"pattern": "[file:hashes.MD5 = '0bacda01ec71e1df695121f1c614f67b' AND file:hashes.SHA1 = 'b31ba210bfdbad030832f7770f55090fb4e727c3' AND file:hashes.SHA256 = 'c498a138ca1fb1ae1c834cbe5f76eda226b0fa7b29bc6cbd8b92478e394b287f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:29Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--e186fa28-a483-46dc-841d-47cf32443adf",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:29.000Z",
"modified": "2020-10-30T08:56:29.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T00:48:53+00:00",
"category": "Other",
"uuid": "ada0a960-ca62-4646-bbfd-48885f92acbf"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/c498a138ca1fb1ae1c834cbe5f76eda226b0fa7b29bc6cbd8b92478e394b287f/detection/f-c498a138ca1fb1ae1c834cbe5f76eda226b0fa7b29bc6cbd8b92478e394b287f-1604018933",
"category": "Payload delivery",
"uuid": "b8b5215b-d7dd-41c9-8c9d-540abc742be4"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "61/72",
"category": "Payload delivery",
"uuid": "be3cde49-3c9d-4522-96a8-8fc26be14de0"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--80f3ef4a-a9a5-4329-9597-21fb85287468",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:29.000Z",
"modified": "2020-10-30T08:56:29.000Z",
"pattern": "[file:hashes.MD5 = '253ae06106861c81af9cf9b94f8e3119' AND file:hashes.SHA1 = '935374a7e94dcf3811d2e27c46dc451688e6e71c' AND file:hashes.SHA256 = '841680207f8c57f4e183610f022f01642d86c5a2fd0323463039b751e5559dc4']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:29Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--d6ecedb2-858f-4080-8238-1e674aaa6d83",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:29.000Z",
"modified": "2020-10-30T08:56:29.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T00:40:02+00:00",
"category": "Other",
"uuid": "04f9b9de-0bf1-46dd-8b77-c23c2effcab9"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/841680207f8c57f4e183610f022f01642d86c5a2fd0323463039b751e5559dc4/detection/f-841680207f8c57f4e183610f022f01642d86c5a2fd0323463039b751e5559dc4-1604018402",
"category": "Payload delivery",
"uuid": "15550c70-82e2-457f-af29-8ea498b1d480"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "41/72",
"category": "Payload delivery",
"uuid": "70d8911e-13f1-451b-b7fc-850a3c10fb48"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9bfa8642-f8fe-4e9e-a37f-5d43e5aeaf03",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:29.000Z",
"modified": "2020-10-30T08:56:29.000Z",
"pattern": "[file:hashes.MD5 = 'fb03bd4432d38fe633327532d151e76b' AND file:hashes.SHA1 = 'ebcd5403d15c3289621c318751eb80069c8baa38' AND file:hashes.SHA256 = '7753fd8c401e0efd8e5d0db07ea7b60eb45d034b7685b656d708f3885d8e7906']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:29Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--9e583e66-b14c-47cb-815e-a0b0d1e85b4a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:29.000Z",
"modified": "2020-10-30T08:56:29.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-11T04:34:18+00:00",
"category": "Other",
"uuid": "d479b74e-2584-48bd-9b4c-2319fe10e098"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/7753fd8c401e0efd8e5d0db07ea7b60eb45d034b7685b656d708f3885d8e7906/detection/f-7753fd8c401e0efd8e5d0db07ea7b60eb45d034b7685b656d708f3885d8e7906-1602390858",
"category": "Payload delivery",
"uuid": "85fc02fd-1640-43e6-bec5-c0a97b2c1af9"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "56/69",
"category": "Payload delivery",
"uuid": "7cc9fb79-2ca4-4674-aa0f-de1ce8f71b37"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ee861cc7-1104-4b21-8c06-d0f92bef929c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:29.000Z",
"modified": "2020-10-30T08:56:29.000Z",
"pattern": "[file:hashes.MD5 = '3a500781f60fc0cd6ac12a51b1fad722' AND file:hashes.SHA1 = '73051cb1c60ea18ce23e1d0ea92703faf3734cc9' AND file:hashes.SHA256 = 'f6f3d1d060274e114c80bcd35c3f5e97909cf6ffd793bdab27d1eb913a0d391e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:29Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--35cc2bf0-ecbe-4b5e-9db6-912ebeefb488",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:29.000Z",
"modified": "2020-10-30T08:56:29.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-14T00:53:16+00:00",
"category": "Other",
"uuid": "459f8814-f7d8-4079-9391-22db64a08009"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/f6f3d1d060274e114c80bcd35c3f5e97909cf6ffd793bdab27d1eb913a0d391e/detection/f-f6f3d1d060274e114c80bcd35c3f5e97909cf6ffd793bdab27d1eb913a0d391e-1602636796",
"category": "Payload delivery",
"uuid": "f37a6169-d754-4198-a6dc-b5645ca4f36e"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "1/59",
"category": "Payload delivery",
"uuid": "94c442eb-e575-4ade-83cb-54861f524357"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3645e877-e229-407e-9b05-f50f5bc924de",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:29.000Z",
"modified": "2020-10-30T08:56:29.000Z",
"pattern": "[file:hashes.MD5 = 'a6d36eca69afde7c05d3d71a8612f2b9' AND file:hashes.SHA1 = '4dad5f8b4fce542b1038195c33e2980a9810ea69' AND file:hashes.SHA256 = 'f20c78fb33d42d874ed6fdf7096a4dad9b3637e05ccc8ae52ee6cc4e5dd8a0bf']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:29Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--b73a48db-798e-497b-9654-9467f848615f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:29.000Z",
"modified": "2020-10-30T08:56:29.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-06-11T10:18:29+00:00",
"category": "Other",
"uuid": "7011db15-dc4f-4712-8ab5-2631d98a7034"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/f20c78fb33d42d874ed6fdf7096a4dad9b3637e05ccc8ae52ee6cc4e5dd8a0bf/detection/f-f20c78fb33d42d874ed6fdf7096a4dad9b3637e05ccc8ae52ee6cc4e5dd8a0bf-1591870709",
"category": "Payload delivery",
"uuid": "a8f5da4a-e3e5-42f4-bac7-43a590055c1a"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "31/61",
"category": "Payload delivery",
"uuid": "321c7fbe-2c72-4ac0-80fc-0ab868c50a53"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8d9e3f84-afe5-459f-a511-733d0a6c73a1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:29.000Z",
"modified": "2020-10-30T08:56:29.000Z",
"pattern": "[file:hashes.MD5 = '5da1ec0c2839285fd6e098e3ffd5874b' AND file:hashes.SHA1 = '25cbf4ddc74289a68db98b040386f10e226455fc' AND file:hashes.SHA256 = '95d4c0e642a3b2c9fab0a2d90b2d127ed12d9ae1e8e721806e9eefc75d77ee3c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:29Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--f7bf32fc-5b23-410b-8f1d-0e5408c44680",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:29.000Z",
"modified": "2020-10-30T08:56:29.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T00:47:43+00:00",
"category": "Other",
"uuid": "bf5842dd-242a-4289-8cc2-599298c32209"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/95d4c0e642a3b2c9fab0a2d90b2d127ed12d9ae1e8e721806e9eefc75d77ee3c/detection/f-95d4c0e642a3b2c9fab0a2d90b2d127ed12d9ae1e8e721806e9eefc75d77ee3c-1604018863",
"category": "Payload delivery",
"uuid": "77bd6233-0546-44f3-b435-204354765bd9"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "59/71",
"category": "Payload delivery",
"uuid": "579564e3-99d4-4823-b1aa-c8cf3b9c7f87"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3fb984a2-e658-4433-a266-93ade5cca32b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:29.000Z",
"modified": "2020-10-30T08:56:29.000Z",
"pattern": "[file:hashes.MD5 = '9078b42779cf2c9db2d05b233f030405' AND file:hashes.SHA1 = '4bcdd4b2d39284feca4ee9486efe9694729858d1' AND file:hashes.SHA256 = '118611de57551faa4b7c029e50317cd6f596275725f61a9f9a11fb59e1ad70df']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-10-30T08:56:29Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--c7153b15-1d40-4e08-908c-7c2a0d374c12",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2020-10-30T08:56:29.000Z",
"modified": "2020-10-30T08:56:29.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2020-10-30T00:42:05+00:00",
"category": "Other",
"uuid": "bda8b7e4-c53b-41de-85ce-e2e94c158d05"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/gui/file/118611de57551faa4b7c029e50317cd6f596275725f61a9f9a11fb59e1ad70df/detection/f-118611de57551faa4b7c029e50317cd6f596275725f61a9f9a11fb59e1ad70df-1604018525",
"category": "Payload delivery",
"uuid": "a1fd8a66-bf21-42bd-baa5-4377341c7f9e"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "59/72",
"category": "Payload delivery",
"uuid": "d1641baa-1881-4657-9c21-b20ca384ff47"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--a6d7616a-5c1f-4bd9-b690-bd28054ee949",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--5e4b3ebd-ca0a-464f-ad10-70aea4b7ae7d",
"target_ref": "x-misp-object--00e2ce66-809e-426b-a464-03a3c73515af"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--b8b1c556-da5b-4727-8353-646069232cba",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--ac882397-2143-439d-a35c-29d75328afc1",
"target_ref": "x-misp-object--2fd08d36-d4b0-46d2-b04b-e73b5d0dab09"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--3999939e-e100-4e50-ad29-d846b9f77d03",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--6fd4b80d-ab64-4af1-a3a8-ad9b6d395c75",
"target_ref": "x-misp-object--9b52878f-f520-4816-a7e5-7d612600a435"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--ef1357c5-1a7b-4547-8465-83ca557386dc",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--b6522bbe-f37c-489b-8e4c-c2876a8dbbe4",
"target_ref": "x-misp-object--529bb072-ec45-4bc8-9cbe-327e2a8c87fb"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--4111c250-83ce-4451-9ea7-8dd756e62bff",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--3f2c3c0f-8e53-4526-97e6-2f13c526f330",
"target_ref": "x-misp-object--576829d7-5640-4605-910e-d1d6874e0686"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--d9228cc6-bc87-446c-aa08-527b51bff6f8",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--908358ba-5ed0-4297-b786-12a4289242f8",
"target_ref": "x-misp-object--b43ea474-a729-4dfd-9e40-0822f358eb91"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--92464582-7a20-4273-8f34-9115c7733867",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--ead61ca6-0171-45e8-866e-d771f0dff221",
"target_ref": "x-misp-object--75db51bf-03f3-48b7-b91e-a61105c01f5e"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--44716ac7-1019-4987-985e-78995e083e20",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--d29baa9f-3cb5-417d-8a99-0036be91261f",
"target_ref": "x-misp-object--72cae686-0ad4-42f7-938e-640b8cf6c173"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--e6f77b0a-ef79-4fac-a69f-32e086904979",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--b1f6ca3d-e038-406a-84a1-16f010a477fb",
"target_ref": "x-misp-object--7449d241-4e95-4a07-b3d4-e5aaf770bf80"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--77978e30-f4fd-4b65-9b41-781fd4da5592",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--63c96554-bdeb-460e-a6fc-f34d987c6f9a",
"target_ref": "x-misp-object--fc3eeb39-1a76-4f90-b349-5b18765ffbc6"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--042805e5-1ad9-454d-b434-125c84158831",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--7cc421fe-a7f7-4ce1-8350-e097b2d323a4",
"target_ref": "x-misp-object--8007aa8a-ca37-4ade-927f-5a18d2494e6c"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--17388fa8-a307-4e12-a273-b4a07840a3ea",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--88bb68aa-24a7-43b4-aa66-2664b2d7a6fe",
"target_ref": "x-misp-object--4deb19ef-d3a2-469c-8867-ec0068cdecd0"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--6fd1616c-d67e-44c5-b9f0-0b55774f65a6",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--87954ab5-4409-4ea3-94f8-165babf4c710",
"target_ref": "x-misp-object--088808e2-c340-49e6-96a5-9b0bc41b85c4"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--180a1d50-c4cf-40b1-909b-f605fa8c837f",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--2a2dd0a7-5011-4981-9b67-f02c12b8f45e",
"target_ref": "x-misp-object--31caa127-b831-4dba-a175-597008420dfd"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--f3f9820b-49c6-452a-9550-2a84e847621f",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--8bb6b5f9-1eec-437c-b4e4-9f383f4cda2c",
"target_ref": "x-misp-object--c14b090b-a2e7-4aa9-88dc-22ce1ec164f5"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--96d37e42-8e36-478a-83a1-1e11f1eb131e",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--ad88c285-5054-45f9-ace8-cdcfa5353a47",
"target_ref": "x-misp-object--a5bb37a9-4148-4e6d-af0a-9f0236e9081c"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--593322a6-0b7a-4753-b086-15ba5ccfa9a1",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--c2cc0844-2ef9-4a4f-8073-8d562ec641b4",
"target_ref": "x-misp-object--2e469fab-9d51-49a5-8853-f1d932426d8e"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--a2ff093b-dcce-4a92-87aa-c79fae778af9",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--c0afae13-062d-49a7-a713-9a51b448b3a9",
"target_ref": "x-misp-object--d578e159-ed9c-4d51-b571-5222bd7c89b9"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--ea42f6d8-2da9-4e51-aca7-f1662ec139b2",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--d024baa3-1fec-4c1a-8553-0e6f98f25421",
"target_ref": "x-misp-object--313aaa43-c6cf-4b04-bbd2-2445367ac02c"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--28170603-3b68-4f4e-9afd-76952aabad72",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--26310581-f95c-4206-abc1-7bf5c0a488ac",
"target_ref": "x-misp-object--798d4c42-9a74-4124-9c97-4d480a05aec4"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--00403748-1ce1-4177-bb99-c77282225299",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--e8b4a663-ff85-43cb-8398-8f1fbbc197cf",
"target_ref": "x-misp-object--55b4925d-4e59-40cf-918c-5cdf333dacfb"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--95cd2a0e-bb1d-4609-9f55-d6bcca049d76",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--ac1d0ce6-08f6-4b69-8614-6ab3044ecc44",
"target_ref": "x-misp-object--7ceb59f0-3fa1-43ec-aeb8-16a783f01fe3"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--a1f7e9fd-bb55-4da3-b22f-c868bda454f6",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--e1ca9c54-2ce8-44bb-bfca-350de81502ba",
"target_ref": "x-misp-object--aa951bc9-ef07-4251-aa0f-4538eee478de"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--6ad5c4ae-3bce-4bee-b947-4b6fdf0ae135",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--6fc8fff8-49cf-4081-a039-736633c0ed58",
"target_ref": "x-misp-object--383142fa-6e3a-4f81-9235-567eeb5b0ab6"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--83828282-065b-4e08-b125-94f9d8554562",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--3481a175-cb01-4840-9abe-cbd87234807a",
"target_ref": "x-misp-object--8e613b40-bd32-45a9-93f9-f3339ef5265a"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--d18021cd-2d25-4527-b388-6e96d949286e",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--ee57c4f1-12e8-4d02-9d9b-7aff080fb603",
"target_ref": "x-misp-object--09432c45-43fc-42cd-be4f-dadab4fedd84"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--9ae4fce0-8d28-4bee-a1b6-a739e8a61596",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--b78c654a-eb99-40d0-8b4f-598364a838d0",
"target_ref": "x-misp-object--b9366adb-2b69-4fa3-9d43-aa29ebe4b2cd"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--26be1584-3a97-4c16-9f29-082499a61704",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--2a3fb881-8056-4765-aa9a-27a80acc6bf2",
"target_ref": "x-misp-object--4bd2979b-dbc0-40c3-9479-14121d9d47c7"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--99a2d9c0-c8ab-417e-b3c5-dfb8402e21e6",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--aef19916-9097-40ef-a7d3-243415f3d0d8",
"target_ref": "x-misp-object--2b85fa93-dc70-4992-81eb-df1175ee277e"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--d151436e-ce51-4345-8f02-b8e790cdbf6a",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--cd330673-923f-4a4b-8ceb-46b108f3e454",
"target_ref": "x-misp-object--e2c9a6cc-d8c4-4f67-8c61-5d407dcbba9a"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--bd062c67-f996-4b48-8bd3-2d30180064e0",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--0de8f154-20b4-4cbb-bff4-8387a4018315",
"target_ref": "x-misp-object--176ed5ae-6f90-4672-9199-96121aaf2700"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--53dc9dc4-6b37-41c7-a46a-7d0b877f8cb3",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--7648e2bb-97f3-4136-8638-19438312c1f0",
"target_ref": "x-misp-object--bb073d81-1582-4442-96c3-3154f7c5175a"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--338c3aa2-6131-441d-9515-5ea10b0e1ad6",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--f3f44c88-aac0-4659-ba55-ec85914a6a43",
"target_ref": "x-misp-object--223881fc-7e22-4e6e-8e2e-5ef678fe01fa"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--0a312471-4a9b-4a4d-952b-c151b3761315",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--d96379c5-a04f-450d-a1fa-5130b7a9cb47",
"target_ref": "x-misp-object--1a591c5c-22e2-4927-b929-cd9648cce64f"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--c2da820e-b640-49ab-b868-512d4f7563a9",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--a18de543-51a8-473e-bce8-8bd40a06da42",
"target_ref": "x-misp-object--41054227-3150-48aa-9ff9-e4107aead60e"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--e7133f21-fef8-4250-87cb-5d245d67e920",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--57592eb5-8a8b-469e-bf60-91c626a922a2",
"target_ref": "x-misp-object--71ba1cdd-c76a-4bad-98db-d57286d9b019"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--3db3a239-e663-430d-a07d-dcfd388e6281",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--efafad91-2966-44fa-8c60-ddae7045e5d7",
"target_ref": "x-misp-object--7bd9928c-6e1b-442f-a824-4e2734b88c6b"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--438f081c-8d00-47e1-97bd-9bc22eb2f30b",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--b5ad9db6-0a4e-469b-8ac0-253343f5ad6c",
"target_ref": "x-misp-object--bf16277d-9e5c-4ccb-9be4-d9cfbb73d9dc"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--0ade779d-ec26-4fc0-86ba-88eb973f55ed",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--3aa019cf-6f11-4c11-8dc3-8fc6362cc78f",
"target_ref": "x-misp-object--6ee0e6f3-3dc6-4bad-9153-ed89aa3bd203"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--4676dab1-1a6a-4708-88dc-aa9b350460db",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--2e764a7c-ecba-4130-9a68-3133b53bf5df",
"target_ref": "x-misp-object--e3bd6581-d6d2-4b6f-a9a9-e1b31abb699e"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--7b7ab3c7-5cf4-4df7-a324-f5628e782098",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--d7dfa178-99ac-4825-a28b-5cb6880e06cd",
"target_ref": "x-misp-object--e4dcecdb-c624-4a3c-8204-66150147aa90"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--36e280ae-529a-471c-8489-c96b72d7858d",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--b6b91a9e-68d7-4ba3-8166-f504e3be3b6b",
"target_ref": "x-misp-object--21e7e39a-bd74-415d-8e88-f25186436c50"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--2bd656f0-1136-4f6b-bf53-ed4decc2ecdb",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--e87a965f-c0f1-4f03-897a-b5361fb2d880",
"target_ref": "x-misp-object--025f1bca-c27e-471f-85ef-03184b237b0a"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--5555ff2a-add7-47d6-9f40-57995bd28cc6",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--918be153-49bb-4879-b579-a382954e498c",
"target_ref": "x-misp-object--a29d49c3-f6e7-4100-b436-0c41692ab3a2"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--884289ad-e924-4af5-b99a-34ed4ac797f2",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--f7385be0-aa1d-4ef4-9157-6daec20898c1",
"target_ref": "x-misp-object--ff796147-94b9-4bb1-92e8-2a6fd814e7da"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--4fc88818-539a-43c9-8e97-e1e58a96accd",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--62c0a296-7be7-4cf1-984a-4b46b085caa4",
"target_ref": "x-misp-object--a9f7b81f-7604-443e-b586-0d3cf4805b56"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--1f249fb6-a038-4729-ab9d-d2bbab999da1",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--2dbadbc3-f1de-4ffb-92ad-bf50f91c6a19",
"target_ref": "x-misp-object--bf998784-79f9-4511-a2b2-498c898e185a"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--876f264a-09a4-465a-9d72-0db83f0f2477",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--d331b125-a13e-4057-b5ce-bf053af711cf",
"target_ref": "x-misp-object--de27aef4-ed60-404f-9ba4-597005687128"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--f4a8d9ff-0bba-492c-9f0f-af148c499749",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--f2784493-71c7-4b60-ad28-ad9a09f8cdc0",
"target_ref": "x-misp-object--00ea0bff-a83d-406f-8b8f-a77c7be4c548"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--1f2126a4-a529-4bc3-88cf-0a1f38552235",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--bd853739-de6d-4768-8a0a-ce7724eec488",
"target_ref": "x-misp-object--2730a41a-4db9-4941-b48d-74b906548f6c"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--c16c3ca0-f4ee-4802-b7cf-4d76917ae482",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--e910ee1e-2815-4633-b427-104b225074f5",
"target_ref": "x-misp-object--e068d586-bfea-47d5-93c3-350f8e62500d"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--468056c6-72a0-41ac-a561-1666ad32d022",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--815fd311-7b72-48a8-b229-17fd3b51ee79",
"target_ref": "x-misp-object--8c70d678-a6ce-40f3-91f0-6f607cf17d29"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--e357a381-6ba0-4d93-b45e-c59bb6ce0d65",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--0405a5d7-db95-4327-95c0-b6a0a20542cf",
"target_ref": "x-misp-object--484616fd-564a-41cc-ab11-b27601894e64"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--3994f4a5-c100-4522-88d7-fef143c42b6f",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--3789b1a0-f5cd-4797-ac5e-3d0818ba37b7",
"target_ref": "x-misp-object--5579c4b5-b230-43d8-9886-a6121ec0cb5b"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--f2d8e1b6-d5d3-4a7c-8a4b-8f263bd52e60",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--fc290971-f01f-4a27-b43c-07cd460da553",
"target_ref": "x-misp-object--a32edaaa-09b9-4070-9659-6f65980fa8c7"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--1633a995-0651-4378-b4fb-fa76b64446d4",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--a3b413be-28f2-4493-a5ea-7ce2ddf052cf",
"target_ref": "x-misp-object--d355ca07-12b1-4d4b-ae89-aedc781725c1"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--71ae709c-0ccc-407b-b988-5398f6fe9b55",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--df33d0fa-6d8d-438b-b826-144b187ece1c",
"target_ref": "x-misp-object--74b71387-2317-4822-b0f2-01ad97f9047e"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--cb83cdd5-0089-4e19-9304-1063d5598377",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--9af3492c-af01-4736-86e1-3430a33b492a",
"target_ref": "x-misp-object--3177bc73-b1ec-43db-bdde-4042d60c51cd"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--92bdc046-587a-4c65-9005-9e54d46cb12e",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--eaac6baa-ed1f-4dbf-b0d6-438bf4ce64b5",
"target_ref": "x-misp-object--86b6ea9e-9699-4e6e-b2e4-5d289359ccc7"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--c4651cac-40bf-45fe-a7fd-83f704e28c82",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--f3344dbd-f6a7-484d-a4d9-75fb5e9b9acf",
"target_ref": "x-misp-object--f00111c5-411a-4b56-8240-726b65b12afb"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--3ebcf321-becf-4251-b2fa-21c427240824",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--29e91ca5-7461-4a16-b343-c0fb04e0ce3c",
"target_ref": "x-misp-object--58c39a24-6350-4af2-ab12-ad1a4af2e1db"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--600c7eca-b4a0-42c8-ab90-58ed8e07d36a",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--12b3a3a2-6f5a-4654-b899-6a56b204da23",
"target_ref": "x-misp-object--09e6d590-7b5e-405c-b4fc-55538d5ed355"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--73823034-1b0a-4e9f-9ef9-048fdcb7fae5",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--959930b1-e452-4086-8de7-f4eb2211867a",
"target_ref": "x-misp-object--075a0a66-ea46-4d51-93a6-8b806b4e06e4"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--da132f92-d2ee-49b3-a946-56d6b6409f16",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--48526a88-0d80-4ddd-b72c-eff9063d9336",
"target_ref": "x-misp-object--9ce1ccb1-8ae7-4ac8-abb6-3d1526ae1fdb"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--a2bd1d62-e8d4-4015-8d53-65ec5db5901f",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--4b8826a4-1cb6-4ce6-b5a7-2ea20fafcfb4",
"target_ref": "x-misp-object--d3c98553-110e-4c61-a5e7-048641e3c170"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--6f072fb5-557f-4655-854a-0b28890a8591",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--34884b9e-28f3-4729-8ca3-8875cae378cb",
"target_ref": "x-misp-object--a309d336-b26a-445f-93f0-fce29cdc5fb3"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--44eecea9-9ab8-4116-bc52-d137f49bed1b",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--b61b3d4a-28e6-44ef-b1b2-a2b36a4eae64",
"target_ref": "x-misp-object--0e1f1a26-a52d-4079-96b3-0db6699c2ac5"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--39e27925-68f6-480d-a7e5-dfe8485fcbd0",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--1c0f1467-b600-477e-b547-2f3fab94e40c",
"target_ref": "x-misp-object--493ee987-5bd4-4447-a109-50c6fdeeae8c"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--5c934902-7969-4060-a149-f46c2137cbd2",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--8ebf900e-115e-4b27-b918-a07645b68a14",
"target_ref": "x-misp-object--fb7fb320-1174-403e-b929-eb9db6eed7b3"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--585c0cb3-553c-4682-99c7-ab8182be09b4",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--2a4282df-4e58-4422-bee3-ed2865b6b284",
"target_ref": "x-misp-object--7c97fc9c-4c09-4493-adf7-12e22ac2594a"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--587457cd-d73d-441d-9744-115466e9bde9",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--7d7d4a70-ee4c-43b8-aa5d-42b62e4aa777",
"target_ref": "x-misp-object--2e02e67e-0651-4277-94da-242d2e623fa6"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--a00768a1-9aa2-4606-aabc-1265884c086f",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--c57ba634-6efb-408a-8c09-2a0e293ca19f",
"target_ref": "x-misp-object--3df16408-ad08-4c07-b8ed-013fb5e5776a"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--cee9e88f-8449-4123-b1ea-c84d7a4e78e7",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--38d1cb99-e855-4370-a0a8-e182a278c949",
"target_ref": "x-misp-object--3f5d58f8-14e3-4c42-a101-615cd46b331e"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--9d32ee28-22d8-49b4-96f1-6109d407d698",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--255c13ee-0a73-4ee2-8a83-faa9dd470949",
"target_ref": "x-misp-object--55e00e7a-0bd7-454a-a2ea-89b3f6657ffc"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--c5c5d27b-5f63-4c97-8f78-258304579ec6",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--1e2f2b4a-6d4c-4a60-84ff-7ea3d7593836",
"target_ref": "x-misp-object--7ab00ac0-8a31-4970-a44a-af22ef8267dc"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--6bb5bc85-477f-4bf7-8a10-8ffb224e665f",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--9dab14e9-110e-4e3c-b6ef-077e8b271b1c",
"target_ref": "x-misp-object--a0ef52a5-9179-4e7d-8599-c91ce3cbc3ed"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--a59701e1-4c6c-46f9-a149-e405cd94eb70",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--de2c6a1f-b0fd-4c3a-8046-6e259ecd7e33",
"target_ref": "x-misp-object--5a11630a-39c6-4a6e-aacf-d681532964d8"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--e3ab8512-9855-4579-b1fe-a653277a8e55",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--c27ef6ef-3a71-4749-8719-49947bb36071",
"target_ref": "x-misp-object--f9421198-639e-495d-97f0-7db5082ce37d"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--fe9cb29e-cab7-402f-9947-33a4ac7c0308",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--ba8d598d-5a7d-410c-9c54-b214aa1962f9",
"target_ref": "x-misp-object--b2f94bd9-50fd-45f2-acc4-46affe62f4f0"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--def62f35-4560-4dbe-a3e4-dc4d9ed8f061",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--b3350403-f5e2-45ef-b079-da4b4a602c6a",
"target_ref": "x-misp-object--a1b404d6-436d-4d0a-b71d-6513a816eae6"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--dcd875af-f42d-46d6-8779-57944e660822",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--bd1a17c8-d750-4cb6-9d25-2be9e7d6768e",
"target_ref": "x-misp-object--ff1e3b2c-f241-4015-ad25-70421a2bc582"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--a1819c78-b939-4b8a-bf0c-66575f920530",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--0a8550e5-8efd-4a4f-b363-3dca1c72adf9",
"target_ref": "x-misp-object--035e778c-2641-4fce-8b5f-2125d049695e"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--fc08213e-3515-4b7d-ae1d-985f5e500925",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--c25b971a-bcba-4e8c-bfaf-0b5e6d94b9fb",
"target_ref": "x-misp-object--d20df19b-04e9-40d8-a031-3e91fa73ce1d"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--b44cd33f-3d64-4b34-99ff-26f4bd14175d",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--ec94d76e-bd10-4c4e-80e7-1dca0cfdbf6c",
"target_ref": "x-misp-object--bb2c2496-37da-47ac-b78b-c312d9b49cff"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--fa347709-a91a-44b3-ae20-19a4d277b98f",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--bd495716-d98e-47e4-9809-d662914add7a",
"target_ref": "x-misp-object--a4e3943d-0dde-454f-a5da-bfb3cfff5774"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--91a76a3e-cad0-4ad9-98d1-abfb63c675b3",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--844f6bfd-26af-4c70-b0fb-96bcfc467213",
"target_ref": "x-misp-object--20b5b91c-4222-4eb4-bcb0-1d2b5d65c5af"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--73b2f4a6-3904-4805-93f1-abf498537795",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--9e938956-b84c-4ad6-b6e9-c76e7c257f19",
"target_ref": "x-misp-object--6bdce9b4-2073-493d-affe-89faec431d92"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--c9640417-aaa5-4cb8-915d-109246637d2e",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--1b4abf9b-20e1-4991-9a0f-fa6d85844664",
"target_ref": "x-misp-object--707daa2e-319e-4217-9e9e-66961f0944f4"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--1e947ebd-d9e2-47c0-a6bd-f94b929b4fc7",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--3bff3fad-617f-469b-ab76-31ef8d37182f",
"target_ref": "x-misp-object--84d87567-a187-4d13-8e8e-fe4968ec7317"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--c8f6e377-1846-4690-a525-997cd8638382",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--299df689-5b87-4dfd-ace4-1a5fe47cf0ef",
"target_ref": "x-misp-object--f0944434-11e8-4a3f-9db9-3712f278b0bd"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--c8e3fb7a-61f5-4f2f-99c5-cae03a9632b2",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--45436868-f318-44a7-80ef-cfc59e1b067a",
"target_ref": "x-misp-object--fa571e37-157d-47a7-b2df-e512c796d8d0"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--3fa8dc94-721d-4025-9286-2d67137b63cf",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--7e0b9f43-bbfe-4c48-8bed-9a88843b88f3",
"target_ref": "x-misp-object--eabe87b8-0d05-49a7-8df4-7611845f7b86"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--d8e04569-76f4-42bd-a45c-d5100cfe6107",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--35f19c22-bb54-4118-8e2a-a6d6b78fa536",
"target_ref": "x-misp-object--f61a9f17-4183-432a-a0a9-34929221e1bf"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--2048e3dd-505c-4078-b27e-3562a633f2b8",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--9bd33707-6cad-4531-9575-2b257af4239e",
"target_ref": "x-misp-object--97ca49c9-5479-48e1-b609-7bbde22a44a6"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--20f2ff58-cd8f-49a6-8840-860732e3c2e8",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--7c7d0cab-6614-4d6e-844f-b96a60b80a05",
"target_ref": "x-misp-object--e6de3c5f-55bc-47c9-9266-a8c981902df9"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--d43892d4-ea37-48e9-9954-e9a83da4655f",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--647f4bff-0d89-4940-b1ff-f68625083a1c",
"target_ref": "x-misp-object--af3a4fd1-9f79-401b-a42c-d05b1e190cae"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--cc553b85-811a-44e4-b38f-4b6fd26f57ee",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--9fbbec2e-0c24-457a-b241-dd5313c196a8",
"target_ref": "x-misp-object--2fa4890a-b3e8-4140-9c6a-ced8d3f1b4a7"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--66e2ca11-0a77-4017-950f-c2693a3d318e",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--3ad9b9d2-d784-42ae-b8c5-09d4ed4ae102",
"target_ref": "x-misp-object--fcbdfa58-feca-47b8-8443-d6856341c139"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--e5c2a9d9-a5bd-4d1c-9cd1-aff02db3da81",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--7dbc825d-6f73-4c96-8b7a-8cd5a9030b0d",
"target_ref": "x-misp-object--319be5ee-9dbe-4d32-9558-174535d5eb76"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--e8a512d1-f6fc-4c44-9b69-923b26aa61a0",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--c60a6e18-6be9-41a5-af8b-044a261e8842",
"target_ref": "x-misp-object--fec89932-b6e3-4f90-bfeb-b12aa3d8e4d6"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--175fc67a-4a36-406a-bcb2-9cf271bfdf68",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--8ebdeb3d-585a-402e-ac4c-e74d4e7e28b3",
"target_ref": "x-misp-object--c4ed2cef-0abb-442d-a321-7f528925ef43"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--14812834-4f70-4eed-af1f-8aebdf9f18ba",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--a0ba4a94-ca04-4194-8f44-7e109a1d571d",
"target_ref": "x-misp-object--90a85fa2-2cd3-44ed-9800-47036fbea5ed"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--2d93cc59-646b-4fa7-a91d-cf03c3452bd7",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--448163b9-d56e-4197-b219-7701771f0b9f",
"target_ref": "x-misp-object--edf1b1b2-a646-4d36-89fc-2bd73036558a"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--4c21a772-d955-4031-ab75-197a11285a6a",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--e9731d60-0ae4-4dde-898e-cac8b04a92ae",
"target_ref": "x-misp-object--e6bc3456-c3f9-4350-acc0-327d026ebb77"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--0099e4f1-68e7-4ee4-94b5-0d7ecae70d6a",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--398aa11c-cf88-4719-8a67-281a237f5842",
"target_ref": "x-misp-object--06b39d87-d102-40a2-be42-99983372e8c2"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--481a1957-24ed-44a8-bffb-990630343513",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--5df60d5d-8222-40a0-8283-c1b60986313f",
"target_ref": "x-misp-object--5b646f32-311e-4fe3-b55f-ba211ee379fc"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--e66a4226-89bc-4c0d-86b0-21b855f129f5",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--0657a83d-6055-4d0e-b18c-e66524986913",
"target_ref": "x-misp-object--486237b5-0bca-4be0-b0a9-cf97bad7ec7e"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--44cb3611-35ea-40db-95fd-8fa9bf044125",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--8ff99259-70f6-4ec1-8b53-ec2640ff4f76",
"target_ref": "x-misp-object--8e77f1b3-ff7e-4e6d-ad68-6908c1a0961d"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--6ac573b7-4af8-42aa-b9c2-e8f1a0047d17",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--2e76b14d-770a-4609-b3b5-b5ea2d40411f",
"target_ref": "x-misp-object--afab1a16-e49a-41dc-8cb3-00b0eb5056e1"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--b274aa8d-9697-47f1-8a0d-a3aea3b0b2ee",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--3ef484d7-e18a-4268-9d64-57a0dc11ec90",
"target_ref": "x-misp-object--23503f7a-ba91-4d93-aace-c0bfd9228e8a"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--5e26243b-69f3-4db6-8dbf-a6ecde37603c",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--20f652f2-5da6-4d98-a7ab-ca7e2f1a46d2",
"target_ref": "x-misp-object--2891de56-5536-4798-beb4-ebe8f7d526f6"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--14f8d24c-493e-4a8a-9cca-8848030602e9",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--94194fbd-1c7b-48a3-9397-78690a14965c",
"target_ref": "x-misp-object--11e9099a-5624-4972-a948-fedaf267e4e4"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--a6d4704c-8bf1-45b0-ba6a-0fc0b88842c0",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--da3156db-d5bd-42c1-8acf-fcba17565f99",
"target_ref": "x-misp-object--3c47eb42-f907-41c4-a214-ea3bea07bad4"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--dbbfc427-9061-44d4-9b0e-6bbc56a16e11",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--c6b32ce3-eb60-458e-a9c4-79c6323bf988",
"target_ref": "x-misp-object--a3ed0c52-f5a7-4eca-b69d-7e6c7df2c44f"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--2d328dac-757f-4bb3-9d17-6d69e2a65d78",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--d2983ca3-9223-4a87-b04f-6de51ace37a7",
"target_ref": "x-misp-object--eab302f5-7a18-4f5e-b606-4a7411472846"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--9248f40c-0279-41c9-b677-844230ac6c67",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--522f5599-7a15-4eaf-bc74-74ad5dd77996",
"target_ref": "x-misp-object--4cd9d948-55ef-4f84-8e84-b0eb3b3f63f8"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--ea3d798b-7e58-4a2c-a566-ea656e68d63e",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--590167ef-b668-496f-8970-7bd7d16826bf",
"target_ref": "x-misp-object--a8374917-93c1-457e-996e-c942d50f31d3"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--d2e83f47-6f31-4d9b-bd79-bb49cf82636b",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--1f2972d3-a2b9-4e33-b097-362ad59cf22a",
"target_ref": "x-misp-object--ea2bb670-0be4-494b-8513-325713ffa7b3"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--cce3d3e7-28ee-4e44-81f8-96dfc168f8e4",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--878ff7cd-c5c0-4ad7-a9fc-9fac552d4b7a",
"target_ref": "x-misp-object--7529b90e-54c5-43da-858e-524ab68604bb"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--ae43726b-5a3f-4f3b-afbb-061858a35711",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--d7304186-e248-49e9-a821-d4e1b2bfff31",
"target_ref": "x-misp-object--2f5b67f5-2eb1-45a4-8067-e0619f071a9a"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--50686d50-a495-4552-a018-cf4bf1baba27",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--bcb35d45-3b99-4de3-952c-eaccba4124e5",
"target_ref": "x-misp-object--ec28b665-f612-473f-9512-fd6f869b06fe"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--4eb6964c-9e8e-4527-8d9f-a20f08bbb81f",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--8e934a55-9f8c-431c-85c8-f52a2574eb6d",
"target_ref": "x-misp-object--93b3d657-1591-445c-9a59-22b998db2f98"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--a7e26585-4cff-41a7-ba0e-8c8cd13c2bff",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--61def0f6-fcdb-4c6c-9557-89fa5c3fd142",
"target_ref": "x-misp-object--bb4fb207-7951-414d-ac6c-cc6ab057787c"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--7aafdb3c-02cc-48ec-b011-b72c81435195",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--3688243c-dba5-4425-83df-05469b53270e",
"target_ref": "x-misp-object--83e74766-26ae-4c43-b22c-d0f6f6871b9a"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--d633e2b9-1a2e-491c-ad7a-09b260a44e23",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--9da3fb39-1b7f-45b9-9c2b-18f02edb7a13",
"target_ref": "x-misp-object--984012d5-eb26-486d-ba47-720d981b8305"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--b9d8a703-4c3c-4830-bf0b-78a55fef666b",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--8c2d5422-b02d-4ad5-9eda-e19b2f8520d3",
"target_ref": "x-misp-object--1d8386a5-94a3-418f-bd81-ba11f4d870fe"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--28797d2b-f581-4186-a0fd-4086acd322fd",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--7e5e847c-9c77-4184-8d70-9c5e59739b82",
"target_ref": "x-misp-object--cb350869-f30b-4548-bd9f-9835eba3747a"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--ff825a5d-5f88-4898-9bfa-b7ac2450b1d7",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--0cf779f9-164d-457d-ad04-ea623e3076d3",
"target_ref": "x-misp-object--1197e5b8-cd16-493f-a5b8-8f9491c300f9"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--b7c1c9af-b910-4251-807d-ddf575430b06",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--7169c4a0-202c-4276-aa95-4209b3d9e92a",
"target_ref": "x-misp-object--ac2f44f8-9449-4acb-8612-7068a7fb9c88"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--1ccd6580-2e2f-44ab-9a0a-828a61247612",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--39872eaa-fca6-44e8-942d-07104ec61f98",
"target_ref": "x-misp-object--b5a4ef02-e2a8-4ff5-941f-82a9b7be9f9b"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--a4c53056-df8b-463e-a791-76f33e248c5e",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--85318a94-ab67-4089-9af3-32be44d7c131",
"target_ref": "x-misp-object--259af175-f2fb-4292-ba82-692fb829126d"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--5e3504b2-0fab-4271-b2aa-6632ce4eaaab",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--b16b9ea1-7e8a-4dd7-ace1-1ce87d453a89",
"target_ref": "x-misp-object--a5ae663f-2dfa-4b90-bc5d-ead300eb2441"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--fac718e0-7402-4033-9686-ad31481a4355",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--4bada252-c578-43d6-9196-94b816fd373e",
"target_ref": "x-misp-object--59a33fb7-bbfb-4df0-bade-05bd106312c2"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--52c29b0e-e0db-427b-9cee-63caa009842b",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--c09dc808-4138-4d16-9516-df61205371e0",
"target_ref": "x-misp-object--56d3a112-940d-4480-85de-d34f6cd6ebdb"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--edb7de3b-af28-4ce6-8e75-ff7cdcc02c50",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--3b583c88-393d-49f8-9b29-3773a8ee7f92",
"target_ref": "x-misp-object--5fb79bae-c985-40ec-822e-48bcd90ef8f8"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--6e951244-de09-4d1d-9f54-1ff072ee0ddd",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--0160b000-c718-4bc9-adc4-40fdaadbfe06",
"target_ref": "x-misp-object--cf6f7ae6-d0d1-4846-bd3f-eada735297bb"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--b9ba2d8e-ed92-46ed-bd47-62d71147e006",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--2f72d335-4d2e-446b-b91c-9f3ec0c5825f",
"target_ref": "x-misp-object--671d9a9c-557b-4954-afb7-84116dfaafdf"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--26ac8daa-cc44-4807-9dbf-4690e661e922",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--a5d51c54-9186-434c-9370-1b043a73527e",
"target_ref": "x-misp-object--b1c3a402-f547-4396-982a-95a61fc14c24"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--91d33ce7-2fa1-45e9-bcf7-9551f7042ecd",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--39ae68e0-13ea-4711-b214-3af059803286",
"target_ref": "x-misp-object--36c61803-2877-405f-b6b0-5acbe905782e"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--58a98739-15c4-4b9f-94b8-4707f6b9f529",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--2a42886a-67dc-44e5-bdec-bca5c3b4aaf3",
"target_ref": "x-misp-object--09d1177b-e3e6-4f3d-925b-ac25620cad00"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--530a8e29-bc64-48fb-afd4-9e8ba0d2c65c",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--be44f41e-6b44-4cc5-9f3d-8bf5755c4e91",
"target_ref": "x-misp-object--90c6a983-0097-405d-816a-d7d0aa604363"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--f5a629fc-337a-4fb3-8ceb-2792e3e7ed89",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--c2b35c06-e9fb-4bc9-be25-fc70417cedf4",
"target_ref": "x-misp-object--8a87830e-ecc9-495e-84ba-a143f2bcd94f"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--f3460ba3-b5cf-4b83-9493-1912b7f4bf89",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--4e1bef3c-5152-40f7-b83f-b29b1737af98",
"target_ref": "x-misp-object--6a445163-58d2-473d-9100-c9b17e1d420b"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--434449c9-f171-4d7e-bb1a-bbe85a801d27",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--059a2690-75da-4ce5-aa90-f93ab97f530f",
"target_ref": "x-misp-object--fbaaca08-1b6c-44c6-9aec-171935d04e5c"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--312ce06f-6a57-4a4f-8886-28c18e70ddf7",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--1e10c051-b1b1-44b5-9c28-8dd9e3752a6c",
"target_ref": "x-misp-object--8dfb30ca-fe11-45b7-96df-67e092866720"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--4d20f652-dcee-45e9-8a80-2292e2f76790",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--1253fc5b-4990-4d6b-957f-c0df3912a373",
"target_ref": "x-misp-object--e186fa28-a483-46dc-841d-47cf32443adf"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--ae71c7e5-630f-40b2-989f-1159bb699725",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--80f3ef4a-a9a5-4329-9597-21fb85287468",
"target_ref": "x-misp-object--d6ecedb2-858f-4080-8238-1e674aaa6d83"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--77b55f4e-d5cc-4ee7-8f91-7a9f22787de5",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--9bfa8642-f8fe-4e9e-a37f-5d43e5aeaf03",
"target_ref": "x-misp-object--9e583e66-b14c-47cb-815e-a0b0d1e85b4a"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--3d504ff5-93f8-4840-80a7-24e91d617ffe",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--ee861cc7-1104-4b21-8c06-d0f92bef929c",
"target_ref": "x-misp-object--35cc2bf0-ecbe-4b5e-9db6-912ebeefb488"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--e349210b-5f60-45bf-903c-9605648cb6da",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--3645e877-e229-407e-9b05-f50f5bc924de",
"target_ref": "x-misp-object--b73a48db-798e-497b-9654-9467f848615f"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--0812c1f3-9793-4bbf-b2a5-419101b9a875",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--8d9e3f84-afe5-459f-a511-733d0a6c73a1",
"target_ref": "x-misp-object--f7bf32fc-5b23-410b-8f1d-0e5408c44680"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--cf5de492-c250-46a9-8a6e-fdd7437a265a",
"created": "1970-01-01T00:00:00.000Z",
"modified": "1970-01-01T00:00:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--3fb984a2-e658-4433-a266-93ade5cca32b",
"target_ref": "x-misp-object--c7153b15-1d40-4e08-908c-7c2a0d374c12"
},
{
"type": "marking-definition",
"spec_version": "2.1",
"id": "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9",
"created": "2017-01-20T00:00:00.000Z",
"definition_type": "tlp",
"name": "TLP:WHITE",
"definition": {
"tlp": "white"
}
}
]
}