594 lines
No EOL
24 KiB
JSON
594 lines
No EOL
24 KiB
JSON
{
|
|
"type": "bundle",
|
|
"id": "bundle--57c4400e-1420-46f0-8837-41d7950d210f",
|
|
"objects": [
|
|
{
|
|
"type": "identity",
|
|
"spec_version": "2.1",
|
|
"id": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2016-08-30T07:53:34.000Z",
|
|
"modified": "2016-08-30T07:53:34.000Z",
|
|
"name": "CIRCL",
|
|
"identity_class": "organization"
|
|
},
|
|
{
|
|
"type": "report",
|
|
"spec_version": "2.1",
|
|
"id": "report--57c4400e-1420-46f0-8837-41d7950d210f",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2016-08-30T07:53:34.000Z",
|
|
"modified": "2016-08-30T07:53:34.000Z",
|
|
"name": "Bitcoinminer installed by malware",
|
|
"published": "2016-08-30T09:10:11Z",
|
|
"object_refs": [
|
|
"indicator--57c4432c-2de8-499d-bcf9-4c4f950d210f",
|
|
"indicator--57c4432c-8644-4b21-9209-4c9d950d210f",
|
|
"indicator--57c4432c-7768-4255-949d-4002950d210f",
|
|
"indicator--57c4432c-7a84-40b9-a708-4f5e950d210f",
|
|
"indicator--57c4432c-b47c-4a54-9a04-48bb950d210f",
|
|
"observed-data--57c4432d-1628-4864-90b6-4022950d210f",
|
|
"file--57c4432d-1628-4864-90b6-4022950d210f",
|
|
"indicator--57c4432d-91fc-478e-b028-4461950d210f",
|
|
"observed-data--57c4432d-a410-4823-b08c-407c950d210f",
|
|
"file--57c4432d-a410-4823-b08c-407c950d210f",
|
|
"indicator--57c4432d-4014-4f4a-a1af-4983950d210f",
|
|
"indicator--57c4432d-96e0-4a33-aaa9-4b25950d210f",
|
|
"indicator--57c4432e-2a60-42d3-9feb-4642950d210f",
|
|
"indicator--57c4432e-63cc-418d-b582-407d950d210f",
|
|
"indicator--57c4432e-80f4-4a6a-9396-446e950d210f",
|
|
"indicator--57c4432e-9cf8-47cf-a50b-497d950d210f",
|
|
"indicator--57c4432e-08f0-4bc4-9131-49f0950d210f",
|
|
"indicator--57c4432f-7134-4967-b629-42fa950d210f",
|
|
"x-misp-attribute--57c44374-c6e8-489b-8533-461e950d210f",
|
|
"observed-data--57c53ab1-dec0-4c3d-9169-479202de0b81",
|
|
"url--57c53ab1-dec0-4c3d-9169-479202de0b81",
|
|
"observed-data--57c53ab1-b66c-48cd-819d-47d302de0b81",
|
|
"url--57c53ab1-b66c-48cd-819d-47d302de0b81",
|
|
"observed-data--57c53ab1-e668-4000-8b97-4ecd02de0b81",
|
|
"url--57c53ab1-e668-4000-8b97-4ecd02de0b81",
|
|
"observed-data--57c53ab1-c5e4-4fda-b253-418902de0b81",
|
|
"url--57c53ab1-c5e4-4fda-b253-418902de0b81",
|
|
"indicator--57c54b87-75b0-4d73-b816-4de3950d210f"
|
|
],
|
|
"labels": [
|
|
"Threat-Report",
|
|
"misp:tool=\"MISP-STIX-Converter\"",
|
|
"circl:incident-classification=\"malware\""
|
|
],
|
|
"object_marking_refs": [
|
|
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
|
|
]
|
|
},
|
|
{
|
|
"type": "indicator",
|
|
"spec_version": "2.1",
|
|
"id": "indicator--57c4432c-2de8-499d-bcf9-4c4f950d210f",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2016-08-29T14:14:04.000Z",
|
|
"modified": "2016-08-29T14:14:04.000Z",
|
|
"description": "Imported via the Freetext Import Tool",
|
|
"pattern": "[file:hashes.SHA1 = '36d7f7a57e2a8ec953940d15099cae2fc565c16e']",
|
|
"pattern_type": "stix",
|
|
"pattern_version": "2.1",
|
|
"valid_from": "2016-08-29T14:14:04Z",
|
|
"kill_chain_phases": [
|
|
{
|
|
"kill_chain_name": "misp-category",
|
|
"phase_name": "Payload delivery"
|
|
}
|
|
],
|
|
"labels": [
|
|
"misp:type=\"sha1\"",
|
|
"misp:category=\"Payload delivery\"",
|
|
"misp:to_ids=\"True\""
|
|
]
|
|
},
|
|
{
|
|
"type": "indicator",
|
|
"spec_version": "2.1",
|
|
"id": "indicator--57c4432c-8644-4b21-9209-4c9d950d210f",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2016-08-29T14:14:04.000Z",
|
|
"modified": "2016-08-29T14:14:04.000Z",
|
|
"description": "Bitcoin miner",
|
|
"pattern": "[file:name = 'SIMBA-Service.exe']",
|
|
"pattern_type": "stix",
|
|
"pattern_version": "2.1",
|
|
"valid_from": "2016-08-29T14:14:04Z",
|
|
"kill_chain_phases": [
|
|
{
|
|
"kill_chain_name": "misp-category",
|
|
"phase_name": "Payload delivery"
|
|
}
|
|
],
|
|
"labels": [
|
|
"misp:type=\"filename\"",
|
|
"misp:category=\"Payload delivery\"",
|
|
"misp:to_ids=\"True\""
|
|
]
|
|
},
|
|
{
|
|
"type": "indicator",
|
|
"spec_version": "2.1",
|
|
"id": "indicator--57c4432c-7768-4255-949d-4002950d210f",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2016-08-29T14:14:04.000Z",
|
|
"modified": "2016-08-29T14:14:04.000Z",
|
|
"description": "Imported via the Freetext Import Tool",
|
|
"pattern": "[file:hashes.SHA1 = '89a47c316b114685a3fa5b7671b416cb9116d266']",
|
|
"pattern_type": "stix",
|
|
"pattern_version": "2.1",
|
|
"valid_from": "2016-08-29T14:14:04Z",
|
|
"kill_chain_phases": [
|
|
{
|
|
"kill_chain_name": "misp-category",
|
|
"phase_name": "Payload delivery"
|
|
}
|
|
],
|
|
"labels": [
|
|
"misp:type=\"sha1\"",
|
|
"misp:category=\"Payload delivery\"",
|
|
"misp:to_ids=\"True\""
|
|
]
|
|
},
|
|
{
|
|
"type": "indicator",
|
|
"spec_version": "2.1",
|
|
"id": "indicator--57c4432c-7a84-40b9-a708-4f5e950d210f",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2016-08-29T14:14:04.000Z",
|
|
"modified": "2016-08-29T14:14:04.000Z",
|
|
"description": "Watchdog for SIMBA-Service",
|
|
"pattern": "[file:name = 'msttsc.exe']",
|
|
"pattern_type": "stix",
|
|
"pattern_version": "2.1",
|
|
"valid_from": "2016-08-29T14:14:04Z",
|
|
"kill_chain_phases": [
|
|
{
|
|
"kill_chain_name": "misp-category",
|
|
"phase_name": "Payload delivery"
|
|
}
|
|
],
|
|
"labels": [
|
|
"misp:type=\"filename\"",
|
|
"misp:category=\"Payload delivery\"",
|
|
"misp:to_ids=\"True\""
|
|
]
|
|
},
|
|
{
|
|
"type": "indicator",
|
|
"spec_version": "2.1",
|
|
"id": "indicator--57c4432c-b47c-4a54-9a04-48bb950d210f",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2016-08-29T14:14:04.000Z",
|
|
"modified": "2016-08-29T14:14:04.000Z",
|
|
"description": "Imported via the Freetext Import Tool",
|
|
"pattern": "[file:hashes.SHA1 = 'eec193dd4a06fbb5ca6163bd97622f545bd01d91']",
|
|
"pattern_type": "stix",
|
|
"pattern_version": "2.1",
|
|
"valid_from": "2016-08-29T14:14:04Z",
|
|
"kill_chain_phases": [
|
|
{
|
|
"kill_chain_name": "misp-category",
|
|
"phase_name": "Payload delivery"
|
|
}
|
|
],
|
|
"labels": [
|
|
"misp:type=\"sha1\"",
|
|
"misp:category=\"Payload delivery\"",
|
|
"misp:to_ids=\"True\""
|
|
]
|
|
},
|
|
{
|
|
"type": "observed-data",
|
|
"spec_version": "2.1",
|
|
"id": "observed-data--57c4432d-1628-4864-90b6-4022950d210f",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2016-08-30T07:50:46.000Z",
|
|
"modified": "2016-08-30T07:50:46.000Z",
|
|
"first_observed": "2016-08-30T07:50:46Z",
|
|
"last_observed": "2016-08-30T07:50:46Z",
|
|
"number_observed": 1,
|
|
"object_refs": [
|
|
"file--57c4432d-1628-4864-90b6-4022950d210f"
|
|
],
|
|
"labels": [
|
|
"misp:type=\"filename\"",
|
|
"misp:category=\"Payload delivery\""
|
|
]
|
|
},
|
|
{
|
|
"type": "file",
|
|
"spec_version": "2.1",
|
|
"id": "file--57c4432d-1628-4864-90b6-4022950d210f",
|
|
"name": "csrss.exe"
|
|
},
|
|
{
|
|
"type": "indicator",
|
|
"spec_version": "2.1",
|
|
"id": "indicator--57c4432d-91fc-478e-b028-4461950d210f",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2016-08-29T14:14:05.000Z",
|
|
"modified": "2016-08-29T14:14:05.000Z",
|
|
"description": "Imported via the Freetext Import Tool",
|
|
"pattern": "[file:hashes.SHA1 = '03c63636c242bfa147fd60497f97f27ea9837f31']",
|
|
"pattern_type": "stix",
|
|
"pattern_version": "2.1",
|
|
"valid_from": "2016-08-29T14:14:05Z",
|
|
"kill_chain_phases": [
|
|
{
|
|
"kill_chain_name": "misp-category",
|
|
"phase_name": "Payload delivery"
|
|
}
|
|
],
|
|
"labels": [
|
|
"misp:type=\"sha1\"",
|
|
"misp:category=\"Payload delivery\"",
|
|
"misp:to_ids=\"True\""
|
|
]
|
|
},
|
|
{
|
|
"type": "observed-data",
|
|
"spec_version": "2.1",
|
|
"id": "observed-data--57c4432d-a410-4823-b08c-407c950d210f",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2016-08-30T07:50:25.000Z",
|
|
"modified": "2016-08-30T07:50:25.000Z",
|
|
"first_observed": "2016-08-30T07:50:25Z",
|
|
"last_observed": "2016-08-30T07:50:25Z",
|
|
"number_observed": 1,
|
|
"object_refs": [
|
|
"file--57c4432d-a410-4823-b08c-407c950d210f"
|
|
],
|
|
"labels": [
|
|
"misp:type=\"filename\"",
|
|
"misp:category=\"Payload delivery\""
|
|
]
|
|
},
|
|
{
|
|
"type": "file",
|
|
"spec_version": "2.1",
|
|
"id": "file--57c4432d-a410-4823-b08c-407c950d210f",
|
|
"name": "1.exe"
|
|
},
|
|
{
|
|
"type": "indicator",
|
|
"spec_version": "2.1",
|
|
"id": "indicator--57c4432d-4014-4f4a-a1af-4983950d210f",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2016-08-29T14:14:05.000Z",
|
|
"modified": "2016-08-29T14:14:05.000Z",
|
|
"description": "Imported via the Freetext Import Tool",
|
|
"pattern": "[file:hashes.MD5 = 'af26e16ea9b044d13425f8b17e5cde37']",
|
|
"pattern_type": "stix",
|
|
"pattern_version": "2.1",
|
|
"valid_from": "2016-08-29T14:14:05Z",
|
|
"kill_chain_phases": [
|
|
{
|
|
"kill_chain_name": "misp-category",
|
|
"phase_name": "Payload delivery"
|
|
}
|
|
],
|
|
"labels": [
|
|
"misp:type=\"md5\"",
|
|
"misp:category=\"Payload delivery\"",
|
|
"misp:to_ids=\"True\""
|
|
]
|
|
},
|
|
{
|
|
"type": "indicator",
|
|
"spec_version": "2.1",
|
|
"id": "indicator--57c4432d-96e0-4a33-aaa9-4b25950d210f",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2016-08-29T14:14:05.000Z",
|
|
"modified": "2016-08-29T14:14:05.000Z",
|
|
"description": "Imported via the Freetext Import Tool",
|
|
"pattern": "[file:hashes.MD5 = '23dbf4e0f0e49a649fd2c06de75d5e4e']",
|
|
"pattern_type": "stix",
|
|
"pattern_version": "2.1",
|
|
"valid_from": "2016-08-29T14:14:05Z",
|
|
"kill_chain_phases": [
|
|
{
|
|
"kill_chain_name": "misp-category",
|
|
"phase_name": "Payload delivery"
|
|
}
|
|
],
|
|
"labels": [
|
|
"misp:type=\"md5\"",
|
|
"misp:category=\"Payload delivery\"",
|
|
"misp:to_ids=\"True\""
|
|
]
|
|
},
|
|
{
|
|
"type": "indicator",
|
|
"spec_version": "2.1",
|
|
"id": "indicator--57c4432e-2a60-42d3-9feb-4642950d210f",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2016-08-29T14:14:06.000Z",
|
|
"modified": "2016-08-29T14:14:06.000Z",
|
|
"description": "Imported via the Freetext Import Tool",
|
|
"pattern": "[file:hashes.MD5 = 'bd9e20dc0a4c89bfe034a177900016e2']",
|
|
"pattern_type": "stix",
|
|
"pattern_version": "2.1",
|
|
"valid_from": "2016-08-29T14:14:06Z",
|
|
"kill_chain_phases": [
|
|
{
|
|
"kill_chain_name": "misp-category",
|
|
"phase_name": "Payload delivery"
|
|
}
|
|
],
|
|
"labels": [
|
|
"misp:type=\"md5\"",
|
|
"misp:category=\"Payload delivery\"",
|
|
"misp:to_ids=\"True\""
|
|
]
|
|
},
|
|
{
|
|
"type": "indicator",
|
|
"spec_version": "2.1",
|
|
"id": "indicator--57c4432e-63cc-418d-b582-407d950d210f",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2016-08-29T14:14:06.000Z",
|
|
"modified": "2016-08-29T14:14:06.000Z",
|
|
"description": "Imported via the Freetext Import Tool",
|
|
"pattern": "[file:hashes.MD5 = '806779989c6ea355a1abf4f6c7cb646c']",
|
|
"pattern_type": "stix",
|
|
"pattern_version": "2.1",
|
|
"valid_from": "2016-08-29T14:14:06Z",
|
|
"kill_chain_phases": [
|
|
{
|
|
"kill_chain_name": "misp-category",
|
|
"phase_name": "Payload delivery"
|
|
}
|
|
],
|
|
"labels": [
|
|
"misp:type=\"md5\"",
|
|
"misp:category=\"Payload delivery\"",
|
|
"misp:to_ids=\"True\""
|
|
]
|
|
},
|
|
{
|
|
"type": "indicator",
|
|
"spec_version": "2.1",
|
|
"id": "indicator--57c4432e-80f4-4a6a-9396-446e950d210f",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2016-08-29T14:14:06.000Z",
|
|
"modified": "2016-08-29T14:14:06.000Z",
|
|
"description": "Imported via the Freetext Import Tool",
|
|
"pattern": "[file:hashes.SHA256 = 'eaafbe1e54ccdcce487b6fb00fa4b0d366fd87deb400b0558a3a029800632ce4']",
|
|
"pattern_type": "stix",
|
|
"pattern_version": "2.1",
|
|
"valid_from": "2016-08-29T14:14:06Z",
|
|
"kill_chain_phases": [
|
|
{
|
|
"kill_chain_name": "misp-category",
|
|
"phase_name": "Payload delivery"
|
|
}
|
|
],
|
|
"labels": [
|
|
"misp:type=\"sha256\"",
|
|
"misp:category=\"Payload delivery\"",
|
|
"misp:to_ids=\"True\""
|
|
]
|
|
},
|
|
{
|
|
"type": "indicator",
|
|
"spec_version": "2.1",
|
|
"id": "indicator--57c4432e-9cf8-47cf-a50b-497d950d210f",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2016-08-29T14:14:06.000Z",
|
|
"modified": "2016-08-29T14:14:06.000Z",
|
|
"description": "Imported via the Freetext Import Tool",
|
|
"pattern": "[file:hashes.SHA256 = '84ec419f00674a81b4efe4d5495022eac7e7299dd1aab306c44703a467d752a0']",
|
|
"pattern_type": "stix",
|
|
"pattern_version": "2.1",
|
|
"valid_from": "2016-08-29T14:14:06Z",
|
|
"kill_chain_phases": [
|
|
{
|
|
"kill_chain_name": "misp-category",
|
|
"phase_name": "Payload delivery"
|
|
}
|
|
],
|
|
"labels": [
|
|
"misp:type=\"sha256\"",
|
|
"misp:category=\"Payload delivery\"",
|
|
"misp:to_ids=\"True\""
|
|
]
|
|
},
|
|
{
|
|
"type": "indicator",
|
|
"spec_version": "2.1",
|
|
"id": "indicator--57c4432e-08f0-4bc4-9131-49f0950d210f",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2016-08-29T14:14:06.000Z",
|
|
"modified": "2016-08-29T14:14:06.000Z",
|
|
"description": "Imported via the Freetext Import Tool",
|
|
"pattern": "[file:hashes.SHA256 = '95219933fa3f4178076f9e5306bc35753e35a58f147ed710fb3d644a22fffedb']",
|
|
"pattern_type": "stix",
|
|
"pattern_version": "2.1",
|
|
"valid_from": "2016-08-29T14:14:06Z",
|
|
"kill_chain_phases": [
|
|
{
|
|
"kill_chain_name": "misp-category",
|
|
"phase_name": "Payload delivery"
|
|
}
|
|
],
|
|
"labels": [
|
|
"misp:type=\"sha256\"",
|
|
"misp:category=\"Payload delivery\"",
|
|
"misp:to_ids=\"True\""
|
|
]
|
|
},
|
|
{
|
|
"type": "indicator",
|
|
"spec_version": "2.1",
|
|
"id": "indicator--57c4432f-7134-4967-b629-42fa950d210f",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2016-08-29T14:14:07.000Z",
|
|
"modified": "2016-08-29T14:14:07.000Z",
|
|
"description": "Imported via the Freetext Import Tool",
|
|
"pattern": "[file:hashes.SHA256 = '126395638de030e60d4a3a5cf7a8f8b664aac9ca37dc9a766182f8dfd5228fe4']",
|
|
"pattern_type": "stix",
|
|
"pattern_version": "2.1",
|
|
"valid_from": "2016-08-29T14:14:07Z",
|
|
"kill_chain_phases": [
|
|
{
|
|
"kill_chain_name": "misp-category",
|
|
"phase_name": "Payload delivery"
|
|
}
|
|
],
|
|
"labels": [
|
|
"misp:type=\"sha256\"",
|
|
"misp:category=\"Payload delivery\"",
|
|
"misp:to_ids=\"True\""
|
|
]
|
|
},
|
|
{
|
|
"type": "x-misp-attribute",
|
|
"spec_version": "2.1",
|
|
"id": "x-misp-attribute--57c44374-c6e8-489b-8533-461e950d210f",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2016-08-30T07:51:41.000Z",
|
|
"modified": "2016-08-30T07:51:41.000Z",
|
|
"labels": [
|
|
"misp:type=\"threat-actor\"",
|
|
"misp:category=\"Attribution\"",
|
|
"misp:to_ids=\"True\""
|
|
],
|
|
"x_misp_category": "Attribution",
|
|
"x_misp_comment": "Bitcoin miner sent to this address",
|
|
"x_misp_type": "threat-actor",
|
|
"x_misp_value": "wowamen41@gmail.com"
|
|
},
|
|
{
|
|
"type": "observed-data",
|
|
"spec_version": "2.1",
|
|
"id": "observed-data--57c53ab1-dec0-4c3d-9169-479202de0b81",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2016-08-30T07:50:09.000Z",
|
|
"modified": "2016-08-30T07:50:09.000Z",
|
|
"first_observed": "2016-08-30T07:50:09Z",
|
|
"last_observed": "2016-08-30T07:50:09Z",
|
|
"number_observed": 1,
|
|
"object_refs": [
|
|
"url--57c53ab1-dec0-4c3d-9169-479202de0b81"
|
|
],
|
|
"labels": [
|
|
"misp:type=\"link\"",
|
|
"misp:category=\"External analysis\""
|
|
]
|
|
},
|
|
{
|
|
"type": "url",
|
|
"spec_version": "2.1",
|
|
"id": "url--57c53ab1-dec0-4c3d-9169-479202de0b81",
|
|
"value": "https://www.virustotal.com/file/126395638de030e60d4a3a5cf7a8f8b664aac9ca37dc9a766182f8dfd5228fe4/analysis/1472200480/"
|
|
},
|
|
{
|
|
"type": "observed-data",
|
|
"spec_version": "2.1",
|
|
"id": "observed-data--57c53ab1-b66c-48cd-819d-47d302de0b81",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2016-08-30T07:50:09.000Z",
|
|
"modified": "2016-08-30T07:50:09.000Z",
|
|
"first_observed": "2016-08-30T07:50:09Z",
|
|
"last_observed": "2016-08-30T07:50:09Z",
|
|
"number_observed": 1,
|
|
"object_refs": [
|
|
"url--57c53ab1-b66c-48cd-819d-47d302de0b81"
|
|
],
|
|
"labels": [
|
|
"misp:type=\"link\"",
|
|
"misp:category=\"External analysis\""
|
|
]
|
|
},
|
|
{
|
|
"type": "url",
|
|
"spec_version": "2.1",
|
|
"id": "url--57c53ab1-b66c-48cd-819d-47d302de0b81",
|
|
"value": "https://www.virustotal.com/file/95219933fa3f4178076f9e5306bc35753e35a58f147ed710fb3d644a22fffedb/analysis/1472259147/"
|
|
},
|
|
{
|
|
"type": "observed-data",
|
|
"spec_version": "2.1",
|
|
"id": "observed-data--57c53ab1-e668-4000-8b97-4ecd02de0b81",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2016-08-30T07:50:09.000Z",
|
|
"modified": "2016-08-30T07:50:09.000Z",
|
|
"first_observed": "2016-08-30T07:50:09Z",
|
|
"last_observed": "2016-08-30T07:50:09Z",
|
|
"number_observed": 1,
|
|
"object_refs": [
|
|
"url--57c53ab1-e668-4000-8b97-4ecd02de0b81"
|
|
],
|
|
"labels": [
|
|
"misp:type=\"link\"",
|
|
"misp:category=\"External analysis\""
|
|
]
|
|
},
|
|
{
|
|
"type": "url",
|
|
"spec_version": "2.1",
|
|
"id": "url--57c53ab1-e668-4000-8b97-4ecd02de0b81",
|
|
"value": "https://www.virustotal.com/file/84ec419f00674a81b4efe4d5495022eac7e7299dd1aab306c44703a467d752a0/analysis/1472271937/"
|
|
},
|
|
{
|
|
"type": "observed-data",
|
|
"spec_version": "2.1",
|
|
"id": "observed-data--57c53ab1-c5e4-4fda-b253-418902de0b81",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2016-08-30T07:50:09.000Z",
|
|
"modified": "2016-08-30T07:50:09.000Z",
|
|
"first_observed": "2016-08-30T07:50:09Z",
|
|
"last_observed": "2016-08-30T07:50:09Z",
|
|
"number_observed": 1,
|
|
"object_refs": [
|
|
"url--57c53ab1-c5e4-4fda-b253-418902de0b81"
|
|
],
|
|
"labels": [
|
|
"misp:type=\"link\"",
|
|
"misp:category=\"External analysis\""
|
|
]
|
|
},
|
|
{
|
|
"type": "url",
|
|
"spec_version": "2.1",
|
|
"id": "url--57c53ab1-c5e4-4fda-b253-418902de0b81",
|
|
"value": "https://www.virustotal.com/file/eaafbe1e54ccdcce487b6fb00fa4b0d366fd87deb400b0558a3a029800632ce4/analysis/1472271938/"
|
|
},
|
|
{
|
|
"type": "indicator",
|
|
"spec_version": "2.1",
|
|
"id": "indicator--57c54b87-75b0-4d73-b816-4de3950d210f",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2016-08-30T09:01:59.000Z",
|
|
"modified": "2016-08-30T09:01:59.000Z",
|
|
"pattern": "[windows-registry-key:key = 'Software\\\\Wow6432Node\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Run' AND windows-registry-key:values.data = '\\\\%APPDATA\\\\%\\\\BT\\\\csrss.exe']",
|
|
"pattern_type": "stix",
|
|
"pattern_version": "2.1",
|
|
"valid_from": "2016-08-30T09:01:59Z",
|
|
"kill_chain_phases": [
|
|
{
|
|
"kill_chain_name": "misp-category",
|
|
"phase_name": "Persistence mechanism"
|
|
}
|
|
],
|
|
"labels": [
|
|
"misp:type=\"regkey|value\"",
|
|
"misp:category=\"Persistence mechanism\"",
|
|
"misp:to_ids=\"True\""
|
|
]
|
|
},
|
|
{
|
|
"type": "marking-definition",
|
|
"spec_version": "2.1",
|
|
"id": "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9",
|
|
"created": "2017-01-20T00:00:00.000Z",
|
|
"definition_type": "tlp",
|
|
"name": "TLP:WHITE",
|
|
"definition": {
|
|
"tlp": "white"
|
|
}
|
|
}
|
|
]
|
|
} |