misp-circl-feed/feeds/circl/misp/58d3f093-d6f4-44d1-93ac-3449950d210f.json

6548 lines
No EOL
290 KiB
JSON

{
"type": "bundle",
"id": "bundle--58d3f093-d6f4-44d1-93ac-3449950d210f",
"objects": [
{
"type": "identity",
"spec_version": "2.1",
"id": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"name": "CIRCL",
"identity_class": "organization"
},
{
"type": "report",
"spec_version": "2.1",
"id": "report--58d3f093-d6f4-44d1-93ac-3449950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"name": "OSINT - How Malformed RTF Defeats Security Engines",
"published": "2017-03-23T16:22:03Z",
"object_refs": [
"observed-data--58d3f0a2-7ec0-46c6-b8fb-3450950d210f",
"url--58d3f0a2-7ec0-46c6-b8fb-3450950d210f",
"x-misp-attribute--58d3f194-baf0-4e4d-8d20-4ad3950d210f",
"vulnerability--58d3f1b9-9c30-40d1-be38-4cbb950d210f",
"indicator--58d3f1d4-7d90-432f-bce8-9f00950d210f",
"indicator--58d3f215-52e4-4921-9c65-4148950d210f",
"indicator--58d3f216-fa90-473d-a5ad-4317950d210f",
"indicator--58d3f216-2680-420b-b4a5-4c3e950d210f",
"indicator--58d3f31e-584c-4e36-b11b-9f05950d210f",
"indicator--58d3f31f-77c0-471c-964e-9f05950d210f",
"indicator--58d3f320-b490-472a-8d6e-9f05950d210f",
"indicator--58d3f321-af4c-4e22-95dc-9f05950d210f",
"indicator--58d3f322-7a70-486b-832c-9f05950d210f",
"indicator--58d3f323-c51c-4588-88f0-9f05950d210f",
"indicator--58d3f324-92bc-4e9e-a8a2-9f05950d210f",
"indicator--58d3f325-399c-49a9-86f8-9f05950d210f",
"indicator--58d3f326-9274-450a-9c6e-9f05950d210f",
"indicator--58d3f327-7164-44cd-b6ad-9f05950d210f",
"indicator--58d3f328-4a48-4753-863b-9f05950d210f",
"indicator--58d3f329-1314-4c6e-80d7-9f05950d210f",
"indicator--58d3f32a-d554-4ab3-9424-9f05950d210f",
"indicator--58d3f32b-5c40-4ab8-8f75-9f05950d210f",
"indicator--58d3f32c-10f4-4610-9776-9f05950d210f",
"indicator--58d3f32c-c590-47d0-853a-9f05950d210f",
"indicator--58d3f32d-0d48-4d6b-9a69-9f05950d210f",
"indicator--58d3f32e-88ec-418f-8291-9f05950d210f",
"indicator--58d3f32f-0fd8-483a-b0c8-9f05950d210f",
"indicator--58d3f330-f0d8-4ff5-9a7b-9f05950d210f",
"indicator--58d3f331-270c-4dc5-a268-9f05950d210f",
"indicator--58d3f333-b78c-4a9f-8901-9f05950d210f",
"indicator--58d3f334-7b70-40ea-88f1-9f05950d210f",
"indicator--58d3f335-54d8-458e-9c35-9f05950d210f",
"indicator--58d3f336-8900-4a80-8725-9f05950d210f",
"indicator--58d3f337-f6b0-44b3-8f57-9f05950d210f",
"indicator--58d3f338-ac9c-4a92-9639-9f05950d210f",
"indicator--58d3f339-dfa0-445a-9326-9f05950d210f",
"indicator--58d3f33a-2da4-4c6d-bcfc-9f05950d210f",
"indicator--58d3f33b-b164-45b0-a296-9f05950d210f",
"indicator--58d3f33c-ceb0-4254-80f9-9f05950d210f",
"indicator--58d3f33d-747c-4cb7-b239-9f05950d210f",
"indicator--58d3f33e-2bd4-4888-9b1d-9f05950d210f",
"indicator--58d3f33e-13fc-4eaa-8585-9f05950d210f",
"indicator--58d3f340-22d0-4aa9-a348-9f05950d210f",
"indicator--58d3f341-ad58-491e-9823-9f05950d210f",
"indicator--58d3f342-1444-4e2b-8894-9f05950d210f",
"indicator--58d3f342-08e4-4880-994b-9f05950d210f",
"indicator--58d3f343-f908-4d8a-b069-9f05950d210f",
"indicator--58d3f344-5248-41b7-913e-9f05950d210f",
"indicator--58d3f345-d110-465c-9157-9f05950d210f",
"indicator--58d3f346-e8f0-4a49-bf46-9f05950d210f",
"indicator--58d3f347-9aec-48a4-9925-9f05950d210f",
"indicator--58d3f349-6d20-48eb-a4d3-9f05950d210f",
"indicator--58d3f34a-f088-4db4-a896-9f05950d210f",
"indicator--58d3f34b-b0fc-4ff5-9292-9f05950d210f",
"indicator--58d3f34c-94f0-42c0-ad4c-9f05950d210f",
"indicator--58d3f34d-41c8-468a-aed2-9f05950d210f",
"indicator--58d3f34e-c8b0-4027-8e04-9f05950d210f",
"indicator--58d3f34f-ff70-4a64-af22-9f05950d210f",
"indicator--58d3f350-76c8-4773-853d-9f05950d210f",
"indicator--58d3f351-0488-455f-8212-9f05950d210f",
"indicator--58d3f352-0284-4377-813c-9f05950d210f",
"indicator--58d3f353-6c24-4733-907a-9f05950d210f",
"indicator--58d3f354-7cf4-43bd-9dda-9f05950d210f",
"indicator--58d3f355-ae80-4eac-a39a-9f05950d210f",
"indicator--58d3f356-c4f4-4131-911e-9f05950d210f",
"indicator--58d3f357-1054-4699-9347-9f05950d210f",
"indicator--58d3f358-8c9c-44eb-b43d-9f05950d210f",
"indicator--58d3f359-94f0-479e-81ef-9f05950d210f",
"indicator--58d3f359-c348-4414-96d1-9f05950d210f",
"indicator--58d3f35a-b1e8-4ea8-85b1-9f05950d210f",
"indicator--58d3f473-41a8-43cb-b70e-9f0702de0b81",
"indicator--58d3f474-4948-431f-a3ab-9f0702de0b81",
"observed-data--58d3f475-09c4-4aec-8cd9-9f0702de0b81",
"url--58d3f475-09c4-4aec-8cd9-9f0702de0b81",
"indicator--58d3f476-cce8-4fca-ad70-9f0702de0b81",
"indicator--58d3f477-1068-4f6c-9653-9f0702de0b81",
"observed-data--58d3f477-bcdc-472e-8af9-9f0702de0b81",
"url--58d3f477-bcdc-472e-8af9-9f0702de0b81",
"indicator--58d3f478-906c-4c70-95aa-9f0702de0b81",
"indicator--58d3f479-e5f0-48e0-b87a-9f0702de0b81",
"observed-data--58d3f47a-5340-4d5c-b014-9f0702de0b81",
"url--58d3f47a-5340-4d5c-b014-9f0702de0b81",
"indicator--58d3f47b-7af0-404e-aa7e-9f0702de0b81",
"indicator--58d3f47c-e300-4575-8384-9f0702de0b81",
"observed-data--58d3f47d-06b8-4e6d-8e5c-9f0702de0b81",
"url--58d3f47d-06b8-4e6d-8e5c-9f0702de0b81",
"indicator--58d3f47e-46dc-4f6d-ab77-9f0702de0b81",
"indicator--58d3f47f-edac-4091-80a4-9f0702de0b81",
"observed-data--58d3f47f-02e8-4528-9d5d-9f0702de0b81",
"url--58d3f47f-02e8-4528-9d5d-9f0702de0b81",
"indicator--58d3f480-fd5c-492b-b65c-9f0702de0b81",
"indicator--58d3f481-5c70-4976-9427-9f0702de0b81",
"observed-data--58d3f482-95dc-4161-99f9-9f0702de0b81",
"url--58d3f482-95dc-4161-99f9-9f0702de0b81",
"indicator--58d3f483-15d4-47ba-9207-9f0702de0b81",
"indicator--58d3f484-fe38-437e-9200-9f0702de0b81",
"observed-data--58d3f485-6e70-4db3-9ed5-9f0702de0b81",
"url--58d3f485-6e70-4db3-9ed5-9f0702de0b81",
"indicator--58d3f486-dfa4-4833-ba6a-9f0702de0b81",
"indicator--58d3f487-3070-48cd-a586-9f0702de0b81",
"observed-data--58d3f488-91b4-4fbd-a83b-9f0702de0b81",
"url--58d3f488-91b4-4fbd-a83b-9f0702de0b81",
"indicator--58d3f489-c2d8-4596-815a-9f0702de0b81",
"indicator--58d3f489-a69c-4247-bcc0-9f0702de0b81",
"observed-data--58d3f48a-2f20-4536-8866-9f0702de0b81",
"url--58d3f48a-2f20-4536-8866-9f0702de0b81",
"indicator--58d3f48b-d194-42c9-af6d-9f0702de0b81",
"indicator--58d3f48c-bc18-45fe-b514-9f0702de0b81",
"observed-data--58d3f48d-ed58-4832-b2c9-9f0702de0b81",
"url--58d3f48d-ed58-4832-b2c9-9f0702de0b81",
"indicator--58d3f48e-a8d0-4a80-bb64-9f0702de0b81",
"indicator--58d3f48f-2188-4f91-a5ae-9f0702de0b81",
"observed-data--58d3f490-4c58-4735-bad2-9f0702de0b81",
"url--58d3f490-4c58-4735-bad2-9f0702de0b81",
"indicator--58d3f491-4ddc-4653-8342-9f0702de0b81",
"indicator--58d3f491-950c-4e31-98dd-9f0702de0b81",
"observed-data--58d3f492-19dc-486e-a83e-9f0702de0b81",
"url--58d3f492-19dc-486e-a83e-9f0702de0b81",
"indicator--58d3f493-ba20-472a-8e83-9f0702de0b81",
"indicator--58d3f494-2564-475f-8b0d-9f0702de0b81",
"observed-data--58d3f495-2b6c-40b4-9246-9f0702de0b81",
"url--58d3f495-2b6c-40b4-9246-9f0702de0b81",
"indicator--58d3f496-3e7c-470a-a837-9f0702de0b81",
"indicator--58d3f497-6fa0-46b6-9633-9f0702de0b81",
"observed-data--58d3f498-3080-4592-84bb-9f0702de0b81",
"url--58d3f498-3080-4592-84bb-9f0702de0b81",
"indicator--58d3f499-82e8-4f8c-8f08-9f0702de0b81",
"indicator--58d3f49a-881c-4000-9b66-9f0702de0b81",
"observed-data--58d3f49a-4320-40bb-9485-9f0702de0b81",
"url--58d3f49a-4320-40bb-9485-9f0702de0b81",
"indicator--58d3f49b-83b8-4712-8b2f-9f0702de0b81",
"indicator--58d3f49c-0310-4f19-81c5-9f0702de0b81",
"observed-data--58d3f49d-b5a0-4e7f-960b-9f0702de0b81",
"url--58d3f49d-b5a0-4e7f-960b-9f0702de0b81",
"indicator--58d3f49e-dcb8-4253-ad25-9f0702de0b81",
"indicator--58d3f49f-141c-4677-ba9b-9f0702de0b81",
"observed-data--58d3f4a0-b594-48ef-aaab-9f0702de0b81",
"url--58d3f4a0-b594-48ef-aaab-9f0702de0b81",
"indicator--58d3f4a1-63a8-4fc4-b21b-9f0702de0b81",
"indicator--58d3f4a2-9eb8-4698-bcbb-9f0702de0b81",
"observed-data--58d3f4a3-fa88-4ee5-b387-9f0702de0b81",
"url--58d3f4a3-fa88-4ee5-b387-9f0702de0b81",
"indicator--58d3f4a4-2408-4323-b129-9f0702de0b81",
"indicator--58d3f4a5-64e0-4c3d-9349-9f0702de0b81",
"observed-data--58d3f4a5-e470-42e1-b47d-9f0702de0b81",
"url--58d3f4a5-e470-42e1-b47d-9f0702de0b81",
"indicator--58d3f4a6-ba10-4ebc-afaf-9f0702de0b81",
"indicator--58d3f4a7-18cc-4ead-ba97-9f0702de0b81",
"observed-data--58d3f4a8-c578-407a-b8c7-9f0702de0b81",
"url--58d3f4a8-c578-407a-b8c7-9f0702de0b81",
"indicator--58d3f4a9-c780-4a64-9fd3-9f0702de0b81",
"indicator--58d3f4aa-e0cc-42f0-9616-9f0702de0b81",
"observed-data--58d3f4ab-4168-4134-95c5-9f0702de0b81",
"url--58d3f4ab-4168-4134-95c5-9f0702de0b81",
"indicator--58d3f4ac-c624-4a96-979d-9f0702de0b81",
"indicator--58d3f4ad-8f60-44ab-ae9b-9f0702de0b81",
"observed-data--58d3f4ae-20a0-473a-a4dd-9f0702de0b81",
"url--58d3f4ae-20a0-473a-a4dd-9f0702de0b81",
"indicator--58d3f4af-b314-4f41-818d-9f0702de0b81",
"indicator--58d3f4af-1274-4b40-941e-9f0702de0b81",
"observed-data--58d3f4b0-6334-4fce-9704-9f0702de0b81",
"url--58d3f4b0-6334-4fce-9704-9f0702de0b81",
"indicator--58d3f4b1-ba78-4b17-b845-9f0702de0b81",
"indicator--58d3f4b2-a248-4911-8f00-9f0702de0b81",
"observed-data--58d3f4b3-44bc-420e-a5d9-9f0702de0b81",
"url--58d3f4b3-44bc-420e-a5d9-9f0702de0b81",
"indicator--58d3f4b4-f8e4-4f2b-bf75-9f0702de0b81",
"indicator--58d3f4b5-9f10-4dc4-868c-9f0702de0b81",
"observed-data--58d3f4b6-6eac-4220-8615-9f0702de0b81",
"url--58d3f4b6-6eac-4220-8615-9f0702de0b81",
"indicator--58d3f4b7-2258-49ec-a7a8-9f0702de0b81",
"indicator--58d3f4b8-87cc-41aa-8300-9f0702de0b81",
"observed-data--58d3f4b8-42f8-4743-b13a-9f0702de0b81",
"url--58d3f4b8-42f8-4743-b13a-9f0702de0b81",
"indicator--58d3f4b9-c48c-460a-8ae7-9f0702de0b81",
"indicator--58d3f4ba-7820-495f-9320-9f0702de0b81",
"observed-data--58d3f4bb-d08c-4568-8ae9-9f0702de0b81",
"url--58d3f4bb-d08c-4568-8ae9-9f0702de0b81",
"indicator--58d3f4bc-a700-4b97-b45f-9f0702de0b81",
"indicator--58d3f4bd-e1bc-47c6-a589-9f0702de0b81",
"observed-data--58d3f4be-7f68-4a67-9d7d-9f0702de0b81",
"url--58d3f4be-7f68-4a67-9d7d-9f0702de0b81",
"indicator--58d3f4bf-fcf8-40cb-8b69-9f0702de0b81",
"indicator--58d3f4c0-2198-424d-b375-9f0702de0b81",
"observed-data--58d3f4c1-4074-453b-ab12-9f0702de0b81",
"url--58d3f4c1-4074-453b-ab12-9f0702de0b81",
"indicator--58d3f4c1-d398-4488-8c7a-9f0702de0b81",
"indicator--58d3f4c2-1f0c-4b35-b40e-9f0702de0b81",
"observed-data--58d3f4c3-d014-4bb3-9961-9f0702de0b81",
"url--58d3f4c3-d014-4bb3-9961-9f0702de0b81",
"indicator--58d3f4c4-ef20-4174-affe-9f0702de0b81",
"indicator--58d3f4c5-5984-466b-835e-9f0702de0b81",
"observed-data--58d3f4c6-301c-4652-88c8-9f0702de0b81",
"url--58d3f4c6-301c-4652-88c8-9f0702de0b81",
"indicator--58d3f4c7-5ed0-493a-b5d4-9f0702de0b81",
"indicator--58d3f4c8-78f0-4e7e-8900-9f0702de0b81",
"observed-data--58d3f4c9-8ea4-4eff-b81c-9f0702de0b81",
"url--58d3f4c9-8ea4-4eff-b81c-9f0702de0b81",
"indicator--58d3f4c9-987c-4761-8c25-9f0702de0b81",
"indicator--58d3f4ca-9818-4277-9a2e-9f0702de0b81",
"observed-data--58d3f4cb-0944-496d-95f3-9f0702de0b81",
"url--58d3f4cb-0944-496d-95f3-9f0702de0b81",
"indicator--58d3f4cc-bb1c-4496-ac1d-9f0702de0b81",
"indicator--58d3f4cd-bba4-4e73-b121-9f0702de0b81",
"observed-data--58d3f4ce-f8f0-485e-9bf2-9f0702de0b81",
"url--58d3f4ce-f8f0-485e-9bf2-9f0702de0b81",
"indicator--58d3f4cf-75bc-426d-966d-9f0702de0b81",
"indicator--58d3f4d0-5580-4826-a76c-9f0702de0b81",
"observed-data--58d3f4d1-5b1c-47c3-b2cd-9f0702de0b81",
"url--58d3f4d1-5b1c-47c3-b2cd-9f0702de0b81",
"indicator--58d3f4d2-9d24-427b-a00c-9f0702de0b81",
"indicator--58d3f4d2-9570-4a5e-bf21-9f0702de0b81",
"observed-data--58d3f4d3-357c-4605-8899-9f0702de0b81",
"url--58d3f4d3-357c-4605-8899-9f0702de0b81",
"indicator--58d3f4d4-34a4-4d48-a27e-9f0702de0b81",
"indicator--58d3f4d5-6c54-46fe-8da0-9f0702de0b81",
"observed-data--58d3f4d6-5dbc-4b36-8b92-9f0702de0b81",
"url--58d3f4d6-5dbc-4b36-8b92-9f0702de0b81",
"indicator--58d3f4d7-6668-4ec1-b0c8-9f0702de0b81",
"indicator--58d3f4d8-cd78-4ddc-b420-9f0702de0b81",
"observed-data--58d3f4d9-36f8-4b3a-8da1-9f0702de0b81",
"url--58d3f4d9-36f8-4b3a-8da1-9f0702de0b81",
"indicator--58d3f4da-f654-4570-b92e-9f0702de0b81",
"indicator--58d3f4da-9464-4464-960e-9f0702de0b81",
"observed-data--58d3f4db-4fa4-4638-ae46-9f0702de0b81",
"url--58d3f4db-4fa4-4638-ae46-9f0702de0b81",
"indicator--58d3f4dc-b564-4558-a522-9f0702de0b81",
"indicator--58d3f4dd-5b30-4672-983f-9f0702de0b81",
"observed-data--58d3f4de-675c-49be-bced-9f0702de0b81",
"url--58d3f4de-675c-49be-bced-9f0702de0b81",
"indicator--58d3f4df-d2ac-4989-8f5f-9f0702de0b81",
"indicator--58d3f4e0-144c-428b-97b6-9f0702de0b81",
"observed-data--58d3f4e1-e650-4b87-8236-9f0702de0b81",
"url--58d3f4e1-e650-4b87-8236-9f0702de0b81",
"indicator--58d3f4e2-2764-40dc-b738-9f0702de0b81",
"indicator--58d3f4e3-ac74-476c-88d7-9f0702de0b81",
"observed-data--58d3f4e3-f2b4-4df3-bd6e-9f0702de0b81",
"url--58d3f4e3-f2b4-4df3-bd6e-9f0702de0b81",
"indicator--58d3f4e4-f018-471c-a801-9f0702de0b81",
"indicator--58d3f4e5-d3f4-4911-869f-9f0702de0b81",
"observed-data--58d3f4e6-bf80-47f8-8c5c-9f0702de0b81",
"url--58d3f4e6-bf80-47f8-8c5c-9f0702de0b81",
"indicator--58d3f4e7-b39c-41b3-aa8d-9f0702de0b81",
"indicator--58d3f4e8-26c4-4601-b9e6-9f0702de0b81",
"observed-data--58d3f4e9-b10c-4c7f-9fd2-9f0702de0b81",
"url--58d3f4e9-b10c-4c7f-9fd2-9f0702de0b81",
"indicator--58d3f4ea-da6c-4472-a666-9f0702de0b81",
"indicator--58d3f4eb-893c-4586-b9a4-9f0702de0b81",
"observed-data--58d3f4eb-5e8c-44d4-be1a-9f0702de0b81",
"url--58d3f4eb-5e8c-44d4-be1a-9f0702de0b81",
"indicator--58d3f4ec-7f6c-41b6-acf8-9f0702de0b81",
"indicator--58d3f4ed-5990-40e4-a4eb-9f0702de0b81",
"observed-data--58d3f4ee-ef48-4469-b86b-9f0702de0b81",
"url--58d3f4ee-ef48-4469-b86b-9f0702de0b81",
"indicator--58d3f4ef-0ea0-4202-ae79-9f0702de0b81",
"indicator--58d3f4f0-39c4-4a31-bfd1-9f0702de0b81",
"observed-data--58d3f4f1-139c-435a-8449-9f0702de0b81",
"url--58d3f4f1-139c-435a-8449-9f0702de0b81",
"indicator--58d3f4f2-10ec-4801-b454-9f0702de0b81",
"indicator--58d3f4f3-7c50-4e58-b7b8-9f0702de0b81",
"observed-data--58d3f4f3-64f4-4432-b3f2-9f0702de0b81",
"url--58d3f4f3-64f4-4432-b3f2-9f0702de0b81",
"indicator--58d3f4f4-ce20-4e35-8a8a-9f0702de0b81",
"indicator--58d3f4f5-a34c-4abe-b6b1-9f0702de0b81",
"observed-data--58d3f4f6-d2e4-4f6c-b80a-9f0702de0b81",
"url--58d3f4f6-d2e4-4f6c-b80a-9f0702de0b81",
"indicator--58d3f4f7-ded4-4b80-b9bd-9f0702de0b81",
"indicator--58d3f4f8-295c-4535-b5ba-9f0702de0b81",
"observed-data--58d3f4f9-6a74-491b-b612-9f0702de0b81",
"url--58d3f4f9-6a74-491b-b612-9f0702de0b81",
"indicator--58d3f4fa-d49c-4cf7-a12c-9f0702de0b81",
"indicator--58d3f4fb-940c-43f8-a8d0-9f0702de0b81",
"observed-data--58d3f4fc-2318-4024-8936-9f0702de0b81",
"url--58d3f4fc-2318-4024-8936-9f0702de0b81",
"indicator--58d3f4fc-71d4-4903-b449-9f0702de0b81",
"indicator--58d3f4fd-f1b8-4e6a-9127-9f0702de0b81",
"observed-data--58d3f4fe-3c20-47e9-84f6-9f0702de0b81",
"url--58d3f4fe-3c20-47e9-84f6-9f0702de0b81",
"indicator--58d3f4ff-a5e0-4591-a3aa-9f0702de0b81",
"indicator--58d3f501-5324-4530-9b4e-9f0702de0b81",
"observed-data--58d3f501-ccc0-4b1a-b1e1-9f0702de0b81",
"url--58d3f501-ccc0-4b1a-b1e1-9f0702de0b81",
"indicator--58d3f502-0cac-478f-8b4f-9f0702de0b81",
"indicator--58d3f503-e688-4a36-8c4d-9f0702de0b81",
"observed-data--58d3f504-b188-4f0b-9c62-9f0702de0b81",
"url--58d3f504-b188-4f0b-9c62-9f0702de0b81",
"indicator--58d3f505-2ad4-47e3-b8a3-9f0702de0b81",
"indicator--58d3f506-1874-4fc6-84ab-9f0702de0b81",
"observed-data--58d3f507-5540-4cb3-8caa-9f0702de0b81",
"url--58d3f507-5540-4cb3-8caa-9f0702de0b81",
"indicator--58d3f508-819c-4057-bcae-9f0702de0b81",
"indicator--58d3f509-5704-4fc4-9282-9f0702de0b81",
"observed-data--58d3f509-33c8-4d34-91d4-9f0702de0b81",
"url--58d3f509-33c8-4d34-91d4-9f0702de0b81",
"indicator--58d3f50a-058c-45da-9e00-9f0702de0b81",
"indicator--58d3f50b-81e8-4afc-8781-9f0702de0b81",
"observed-data--58d3f50c-75c4-4850-87d5-9f0702de0b81",
"url--58d3f50c-75c4-4850-87d5-9f0702de0b81",
"indicator--58d3f50d-1954-46db-8799-9f0702de0b81",
"indicator--58d3f50e-d3b8-4dd0-b191-9f0702de0b81",
"observed-data--58d3f50f-9e10-4588-956b-9f0702de0b81",
"url--58d3f50f-9e10-4588-956b-9f0702de0b81",
"indicator--58d3f510-2d88-45fc-8e3c-9f0702de0b81",
"indicator--58d3f511-233c-45a7-8baa-9f0702de0b81",
"observed-data--58d3f511-5498-4ea5-ab36-9f0702de0b81",
"url--58d3f511-5498-4ea5-ab36-9f0702de0b81",
"indicator--58d3f512-ece8-4295-a27c-9f0702de0b81",
"indicator--58d3f513-7240-4980-b6f8-9f0702de0b81",
"observed-data--58d3f514-d40c-4065-b661-9f0702de0b81",
"url--58d3f514-d40c-4065-b661-9f0702de0b81",
"indicator--58d3f515-e7c0-45bc-91c2-9f0702de0b81",
"indicator--58d3f516-836c-442c-a32f-9f0702de0b81",
"observed-data--58d3f517-1164-4ebb-b531-9f0702de0b81",
"url--58d3f517-1164-4ebb-b531-9f0702de0b81",
"indicator--58d3f518-ae40-4b54-8a05-9f0702de0b81",
"indicator--58d3f519-f824-448b-bfbf-9f0702de0b81",
"observed-data--58d3f519-8b20-4235-ae02-9f0702de0b81",
"url--58d3f519-8b20-4235-ae02-9f0702de0b81",
"indicator--58d3f51a-de34-4885-885f-9f0702de0b81",
"indicator--58d3f51b-6944-4b48-99ea-9f0702de0b81",
"observed-data--58d3f51c-7490-49b5-9a64-9f0702de0b81",
"url--58d3f51c-7490-49b5-9a64-9f0702de0b81"
],
"labels": [
"Threat-Report",
"misp:tool=\"MISP-STIX-Converter\""
],
"object_marking_refs": [
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58d3f0a2-7ec0-46c6-b8fb-3450950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"first_observed": "2017-03-23T16:13:41Z",
"last_observed": "2017-03-23T16:13:41Z",
"number_observed": 1,
"object_refs": [
"url--58d3f0a2-7ec0-46c6-b8fb-3450950d210f"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\"",
"osint:source-type=\"blog-post\"",
"admiralty-scale:source-reliability=\"b\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58d3f0a2-7ec0-46c6-b8fb-3450950d210f",
"value": "http://blog.talosintelligence.com/2017/03/how-malformed-rtf-defeats-security.html"
},
{
"type": "x-misp-attribute",
"spec_version": "2.1",
"id": "x-misp-attribute--58d3f194-baf0-4e4d-8d20-4ad3950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"labels": [
"misp:type=\"text\"",
"misp:category=\"External analysis\"",
"osint:source-type=\"blog-post\"",
"admiralty-scale:source-reliability=\"b\""
],
"x_misp_category": "External analysis",
"x_misp_type": "text",
"x_misp_value": "Talos has discovered a new spam campaign used to infect targets with the well known Loki Bot stealer. The infection vector is an RTF document abusing an old exploit (CVE-2012-1856), however the most interesting part is the effort put into the generation of the RTF. The document contains several malformations designed to defeat security engines and parsers. The attacker has gone out of their way to attempt to evade content inspection devices like AV or network security devices. According to VirusTotal, the initial detection rate of a malicious RTF document recovered from a recent spam campaign is only 3 out of 45 available engines.\r\n\r\nDespite the known vulnerability, many security products fail to identify the exploit because they are unable to correctly classify the RTF file format and scan the embedded OLE document within in the RTF. Even open-source parsers such as rtfobj.py from oletools have difficulties extracting the embedded OLE:"
},
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--58d3f1b9-9c30-40d1-be38-4cbb950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"name": "CVE-2012-1856",
"labels": [
"misp:type=\"vulnerability\"",
"misp:category=\"Payload delivery\""
],
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2012-1856"
}
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f1d4-7d90-432f-bce8-9f00950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"pattern": "[url:value = 'http://paneltestghelp.xyz:80/eval/server/readonly/fre.php']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"url\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f215-52e4-4921-9c65-4148950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "dropped executables",
"pattern": "[file:hashes.SHA256 = 'da1a6747a3329c3a317d4bd7ecf029e89bd76192075f84834563103a54bac968']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f216-fa90-473d-a5ad-4317950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "dropped executables",
"pattern": "[file:hashes.SHA256 = '2e65f8fc7901505dd4225ec66cca0ef308f2b6fbe48d37f5055775854bf7a5f8']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f216-2680-420b-b4a5-4c3e950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "dropped executables",
"pattern": "[file:hashes.SHA256 = 'a3c3abcd461d00e1f928e375770e39e3a33f719d7287a2fee661d82ce8de1c56']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f31e-584c-4e36-b11b-9f05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "malicious samples with similar malformations of the RTF file format:",
"pattern": "[file:hashes.SHA256 = '7b684ad97bb9f5093e5cfb100352ad2f0ec3dfce63232207daf0aa736d6438c9']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f31f-77c0-471c-964e-9f05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "malicious samples with similar malformations of the RTF file format:",
"pattern": "[file:hashes.SHA256 = '14a6e04a60b1bb5f4d0fb3fffa240b7b34bf9c0b8504da19caeb31182510c139']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f320-b490-472a-8d6e-9f05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "malicious samples with similar malformations of the RTF file format:",
"pattern": "[file:hashes.SHA256 = '1ae6aa92ce8ee9a2ab78631663fa5a9bdcc14490c4c5fe799b41d26455b5b696']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f321-af4c-4e22-95dc-9f05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "malicious samples with similar malformations of the RTF file format:",
"pattern": "[file:hashes.SHA256 = '4f2c10b64d4f4b56d56b5a271331c92484b6ddf8c4eb9f56669ed60545a4c06d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f322-7a70-486b-832c-9f05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "malicious samples with similar malformations of the RTF file format:",
"pattern": "[file:hashes.SHA256 = 'b1da2cb4fcee52cdc94c06325c339ac11a3fb1e399e1ed5a2a55107f5f64867f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f323-c51c-4588-88f0-9f05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "malicious samples with similar malformations of the RTF file format:",
"pattern": "[file:hashes.SHA256 = '41c4483cfcc0b5a10504aa137ec3824d139663b7ec318d5e1fb6c9f5db8af8f9']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f324-92bc-4e9e-a8a2-9f05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "malicious samples with similar malformations of the RTF file format:",
"pattern": "[file:hashes.SHA256 = 'f07f87ab68482d329eeac5525ea5f189bcd720d2b2d149db61ab81ae04be957a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f325-399c-49a9-86f8-9f05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "malicious samples with similar malformations of the RTF file format:",
"pattern": "[file:hashes.SHA256 = 'be81741ae3c7c2c5000785a2573c901068a2906054690ac22119ac794aa9e8e2']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f326-9274-450a-9c6e-9f05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "malicious samples with similar malformations of the RTF file format:",
"pattern": "[file:hashes.SHA256 = 'cd16e420fbc39b63de93198cdb1265c1bfe83119c7d4d75d5501465cdd0847f1']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f327-7164-44cd-b6ad-9f05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "malicious samples with similar malformations of the RTF file format:",
"pattern": "[file:hashes.SHA256 = 'b330fadeb337e9fb5aa9f8046462e3d1d418946fd6237bc252a80a2d4fb2fff7']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f328-4a48-4753-863b-9f05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "malicious samples with similar malformations of the RTF file format:",
"pattern": "[file:hashes.SHA256 = '629d1afbedd7cc082549d5c3fc3926b6b4e55abc3c07f8d994a791893a2fd530']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f329-1314-4c6e-80d7-9f05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "malicious samples with similar malformations of the RTF file format:",
"pattern": "[file:hashes.SHA256 = '9f48ce01ac99033c03e9aa983c09fa273eae0e168e55de8cc364311ae4fc88b9']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f32a-d554-4ab3-9424-9f05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "malicious samples with similar malformations of the RTF file format:",
"pattern": "[file:hashes.SHA256 = 'dd783bcdbc81bc605cf07545a01273596d4e51b198874253815069cd6708b2fa']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f32b-5c40-4ab8-8f75-9f05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "malicious samples with similar malformations of the RTF file format:",
"pattern": "[file:hashes.SHA256 = '59011fa80db84cea54bc6ec7f7bc689d916f04e8df9950b259ad524142225731']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f32c-10f4-4610-9776-9f05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "malicious samples with similar malformations of the RTF file format:",
"pattern": "[file:hashes.SHA256 = '7aa0abedd75c46680ac65814d9433a04bb9f6bc6f094d66cc33a918f32dcb2fa']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f32c-c590-47d0-853a-9f05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "malicious samples with similar malformations of the RTF file format:",
"pattern": "[file:hashes.SHA256 = 'ad3af8a7ab469fa930d0873475214c3160f52b17c06f296d6ce9cc6fc92e8a79']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f32d-0d48-4d6b-9a69-9f05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "malicious samples with similar malformations of the RTF file format:",
"pattern": "[file:hashes.SHA256 = '89a1264bd7facf02d48aff46724a0215c2fb1974d06451cebefdb2ea7ea9a71a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f32e-88ec-418f-8291-9f05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "malicious samples with similar malformations of the RTF file format:",
"pattern": "[file:hashes.SHA256 = 'c53bf11adb48a00393c30a0902716e0088f650750349f5966ba3b60a0fa17487']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f32f-0fd8-483a-b0c8-9f05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "malicious samples with similar malformations of the RTF file format:",
"pattern": "[file:hashes.SHA256 = '4a7d6c770c5fdbb32534b535efe0324e3bc25a8bcd3551b7fe0ff3610ee81299']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f330-f0d8-4ff5-9a7b-9f05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "malicious samples with similar malformations of the RTF file format:",
"pattern": "[file:hashes.SHA256 = '6077c3ed4dc67526f89b2c59fc16b389530a73b326f63fff17ae7c824b7770fd']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f331-270c-4dc5-a268-9f05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "malicious samples with similar malformations of the RTF file format:",
"pattern": "[file:hashes.SHA256 = '11836837753c754997adf8ccf4fa8ba824e57725f56fbcd3b0d903e1fa30ac5b']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f333-b78c-4a9f-8901-9f05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "malicious samples with similar malformations of the RTF file format:",
"pattern": "[file:hashes.SHA256 = '737d1468b20dc39300bc2be38285b6482940d2be9ae59b7dc984cf4dc6d82053']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f334-7b70-40ea-88f1-9f05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "malicious samples with similar malformations of the RTF file format:",
"pattern": "[file:hashes.SHA256 = '415b9e72811cd7c50366d9c9038df02fe3bbfc6446ef42b099d85ea576fbd35d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f335-54d8-458e-9c35-9f05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "malicious samples with similar malformations of the RTF file format:",
"pattern": "[file:hashes.SHA256 = '84a2ded87681e65be35994ea26f4b2287e52438bbeebaac784c291196a6f94c6']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f336-8900-4a80-8725-9f05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "malicious samples with similar malformations of the RTF file format:",
"pattern": "[file:hashes.SHA256 = '9c62f4947a572356f43f71fb55f2b702b78c2e1688c67eff89c36da50137ed21']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f337-f6b0-44b3-8f57-9f05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "malicious samples with similar malformations of the RTF file format:",
"pattern": "[file:hashes.SHA256 = 'c201e4bb7b68b4655ab7ac85c8a7c93abe2238ec3d24914d86e8a543b6c6abbd']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f338-ac9c-4a92-9639-9f05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "malicious samples with similar malformations of the RTF file format:",
"pattern": "[file:hashes.SHA256 = '17ae8d128938131ebc944f5d77be7009fd05c8831f88ef3558cc9c00f0633f97']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f339-dfa0-445a-9326-9f05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "malicious samples with similar malformations of the RTF file format:",
"pattern": "[file:hashes.SHA256 = 'dbc97df1e5036ac572d8a247a6b073ab1f1dabd20676443598135c6743534028']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f33a-2da4-4c6d-bcfc-9f05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "malicious samples with similar malformations of the RTF file format:",
"pattern": "[file:hashes.SHA256 = '79316e4c2601a5721d5d6ada0f152790ad44aa9ac5badf17e12c7825fb1f46aa']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f33b-b164-45b0-a296-9f05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "malicious samples with similar malformations of the RTF file format:",
"pattern": "[file:hashes.SHA256 = 'a406f0208c914ff28f8e30eda539acb6abd23bbdecf704be4b77615a27f62e8d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f33c-ceb0-4254-80f9-9f05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "malicious samples with similar malformations of the RTF file format:",
"pattern": "[file:hashes.SHA256 = '552fe8b5fd175822d4479552078331dbfb16881fea9514377a802f3cce87ac02']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f33d-747c-4cb7-b239-9f05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "malicious samples with similar malformations of the RTF file format:",
"pattern": "[file:hashes.SHA256 = '27290fd934092cf1ca2a242e6847665a16771376af8f5c81ef1c851463e77709']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f33e-2bd4-4888-9b1d-9f05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "malicious samples with similar malformations of the RTF file format:",
"pattern": "[file:hashes.SHA256 = '66de8e2f1d5ebbf3f8c511d5cd6394e24be3c694e78d614dfe703f8aa198906f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f33e-13fc-4eaa-8585-9f05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "malicious samples with similar malformations of the RTF file format:",
"pattern": "[file:hashes.SHA256 = 'a0e529ed847b78fd68a871688a7e99e6abc87295c671a3e2d02a61a1e04f5ce9']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f340-22d0-4aa9-a348-9f05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "malicious samples with similar malformations of the RTF file format:",
"pattern": "[file:hashes.SHA256 = '5c1db6ce5989645bbc8cb8489dee2fb99eba7b4093eaad96cd5a6c692a53c245']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f341-ad58-491e-9823-9f05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "malicious samples with similar malformations of the RTF file format:",
"pattern": "[file:hashes.SHA256 = 'c343e92d30c1374c631efa8cf612faf5567e8bd66330e1ff58ac9296c3373304']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f342-1444-4e2b-8894-9f05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "malicious samples with similar malformations of the RTF file format:",
"pattern": "[file:hashes.SHA256 = 'ecc9526b380bd109dbcb3d9c4635c1866234d302658758d6ecf4e927a12af9a1']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f342-08e4-4880-994b-9f05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "malicious samples with similar malformations of the RTF file format:",
"pattern": "[file:hashes.SHA256 = '450b2d6741a452d3bff491fb3a40ec8e29cbaf24fb1b400863efe1a7f920543e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f343-f908-4d8a-b069-9f05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "malicious samples with similar malformations of the RTF file format:",
"pattern": "[file:hashes.SHA256 = '99a3939d654e4c424dcf33fbc18c7568d1030981ad1ae8f2a6da2966efbff669']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f344-5248-41b7-913e-9f05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "malicious samples with similar malformations of the RTF file format:",
"pattern": "[file:hashes.SHA256 = 'e7fc4527e4cb65e05069b871e06226ce9c9669649ed9cfbad2dcb41cdd9fe94c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f345-d110-465c-9157-9f05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "malicious samples with similar malformations of the RTF file format:",
"pattern": "[file:hashes.SHA256 = '1d73428619f69cbdfc5158f1682cc304ba6af2a0b425244bcd8c2c432d4a50d7']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f346-e8f0-4a49-bf46-9f05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "malicious samples with similar malformations of the RTF file format:",
"pattern": "[file:hashes.SHA256 = 'cbb58841ef2179e52fcfb918d085503ccf4482014fa1f0714e11fd667de974a0']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f347-9aec-48a4-9925-9f05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "malicious samples with similar malformations of the RTF file format:",
"pattern": "[file:hashes.SHA256 = '44583aca68ce734bccc79d28f666bdc81a1436c257f035875df15a82f35e6910']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f349-6d20-48eb-a4d3-9f05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "malicious samples with similar malformations of the RTF file format:",
"pattern": "[file:hashes.SHA256 = '5872ec86add4892f061cc1fd2478da098645876d0b13d3ce3e789f526c5b8ec8']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f34a-f088-4db4-a896-9f05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "malicious samples with similar malformations of the RTF file format:",
"pattern": "[file:hashes.SHA256 = '9eb85367bd59854ccd7b8e13a22deec92bbe746a5de83820d7265055f96da40f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f34b-b0fc-4ff5-9292-9f05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "malicious samples with similar malformations of the RTF file format:",
"pattern": "[file:hashes.SHA256 = '6d33cd5b7cfcc4a55583adbf75f578d71d6aa572e93c5a7392ece4dc8204d0f8']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f34c-94f0-42c0-ad4c-9f05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "malicious samples with similar malformations of the RTF file format:",
"pattern": "[file:hashes.SHA256 = '4d46087599b246cd297883341859561b3b1794419c704b167a28c7891ff5d7b1']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f34d-41c8-468a-aed2-9f05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "malicious samples with similar malformations of the RTF file format:",
"pattern": "[file:hashes.SHA256 = '7c5337250b6a1ede2472e4acc74366e8a425eaf2c36e3805d36200ad560d0feb']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f34e-c8b0-4027-8e04-9f05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "malicious samples with similar malformations of the RTF file format:",
"pattern": "[file:hashes.SHA256 = 'bc4f30177538628f93d57ae1e59859c50409afefe133956ec801c040ab9253f5']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f34f-ff70-4a64-af22-9f05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "malicious samples with similar malformations of the RTF file format:",
"pattern": "[file:hashes.SHA256 = '726f170f13b9a24d409c0c4fbf0a14aff0f3cd1662762230bfaf7a8822257880']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f350-76c8-4773-853d-9f05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "malicious samples with similar malformations of the RTF file format:",
"pattern": "[file:hashes.SHA256 = '885877989df73bafd087f7c689eedfa5e2fe3620ab62d6ff57a3394702761751']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f351-0488-455f-8212-9f05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "malicious samples with similar malformations of the RTF file format:",
"pattern": "[file:hashes.SHA256 = '9f40662ebbd3a848219aa47c149c174c292cea5e62dcc0bd26f12e1bf5ba7d7c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f352-0284-4377-813c-9f05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "malicious samples with similar malformations of the RTF file format:",
"pattern": "[file:hashes.SHA256 = '0882c8a38ca485fe9763b0c0c7c5a22c330cebe86101a9e1ffa5a70c4f58faac']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f353-6c24-4733-907a-9f05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "malicious samples with similar malformations of the RTF file format:",
"pattern": "[file:hashes.SHA256 = '156cbbb25240e246a2340e1bca1692b7110277bac30f76dcacd48dd5f2042caa']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f354-7cf4-43bd-9dda-9f05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "malicious samples with similar malformations of the RTF file format:",
"pattern": "[file:hashes.SHA256 = 'a28c3c075ecfb982e6e3cb237c0eab1308f023e7bcf207d0fd1f2b4f29791074']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f355-ae80-4eac-a39a-9f05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "malicious samples with similar malformations of the RTF file format:",
"pattern": "[file:hashes.SHA256 = 'e5de4a14367d1a7b599d7afae07aa66c63941238ff25f4f17dea54db6d8ac350']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f356-c4f4-4131-911e-9f05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "malicious samples with similar malformations of the RTF file format:",
"pattern": "[file:hashes.SHA256 = '5d6b52287f4fdefe0621d9fadd83b0531f56811937b023ce49e426e320b372f5']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f357-1054-4699-9347-9f05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "malicious samples with similar malformations of the RTF file format:",
"pattern": "[file:hashes.SHA256 = '599a60601345bf8fc05f27d35f3c3f2ed80b6e7890d5f33a57f75c09a089356a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f358-8c9c-44eb-b43d-9f05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "malicious samples with similar malformations of the RTF file format:",
"pattern": "[file:hashes.SHA256 = '194549b3fd0be8a701b8433db1b2cff396a4492c342632fa22d6af89570eff46']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f359-94f0-479e-81ef-9f05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "malicious samples with similar malformations of the RTF file format:",
"pattern": "[file:hashes.SHA256 = '673f9469ff150c8c821ea3b5b1cda8175d09719fbd7d1359d334dbf17f74adbe']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f359-c348-4414-96d1-9f05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "malicious samples with similar malformations of the RTF file format:",
"pattern": "[file:hashes.SHA256 = 'f81be30a7d6792e59f5a0ade225472042c9eb9bf59b03f67e85b0642c16e59ce']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f35a-b1e8-4ea8-85b1-9f05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:13:41.000Z",
"modified": "2017-03-23T16:13:41.000Z",
"description": "malicious samples with similar malformations of the RTF file format:",
"pattern": "[file:hashes.SHA256 = '5957fe5e38f2b2530569e21f040a92b1fb36816b6d5187d8a0ecf0ba84f36519']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:13:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f473-41a8-43cb-b70e-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:14:43.000Z",
"modified": "2017-03-23T16:14:43.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 5957fe5e38f2b2530569e21f040a92b1fb36816b6d5187d8a0ecf0ba84f36519",
"pattern": "[file:hashes.SHA1 = '8f7850d8bfe42451aaf632e36734d2f06e42ca51']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:14:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f474-4948-431f-a3ab-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:14:44.000Z",
"modified": "2017-03-23T16:14:44.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 5957fe5e38f2b2530569e21f040a92b1fb36816b6d5187d8a0ecf0ba84f36519",
"pattern": "[file:hashes.MD5 = '9e204cd2ff089fb2e9d4cbdc013168f6']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:14:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58d3f475-09c4-4aec-8cd9-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:14:45.000Z",
"modified": "2017-03-23T16:14:45.000Z",
"first_observed": "2017-03-23T16:14:45Z",
"last_observed": "2017-03-23T16:14:45Z",
"number_observed": 1,
"object_refs": [
"url--58d3f475-09c4-4aec-8cd9-9f0702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58d3f475-09c4-4aec-8cd9-9f0702de0b81",
"value": "https://www.virustotal.com/file/5957fe5e38f2b2530569e21f040a92b1fb36816b6d5187d8a0ecf0ba84f36519/analysis/1487240495/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f476-cce8-4fca-ad70-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:14:46.000Z",
"modified": "2017-03-23T16:14:46.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: f81be30a7d6792e59f5a0ade225472042c9eb9bf59b03f67e85b0642c16e59ce",
"pattern": "[file:hashes.SHA1 = 'b74554d4b0dd17d4b6f752303c606c6db7d491ef']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:14:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f477-1068-4f6c-9653-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:14:47.000Z",
"modified": "2017-03-23T16:14:47.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: f81be30a7d6792e59f5a0ade225472042c9eb9bf59b03f67e85b0642c16e59ce",
"pattern": "[file:hashes.MD5 = '2ddc4bcef5703502ee4732ccb0fcc6b8']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:14:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58d3f477-bcdc-472e-8af9-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:14:47.000Z",
"modified": "2017-03-23T16:14:47.000Z",
"first_observed": "2017-03-23T16:14:47Z",
"last_observed": "2017-03-23T16:14:47Z",
"number_observed": 1,
"object_refs": [
"url--58d3f477-bcdc-472e-8af9-9f0702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58d3f477-bcdc-472e-8af9-9f0702de0b81",
"value": "https://www.virustotal.com/file/f81be30a7d6792e59f5a0ade225472042c9eb9bf59b03f67e85b0642c16e59ce/analysis/1490260467/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f478-906c-4c70-95aa-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:14:48.000Z",
"modified": "2017-03-23T16:14:48.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 194549b3fd0be8a701b8433db1b2cff396a4492c342632fa22d6af89570eff46",
"pattern": "[file:hashes.SHA1 = 'a414e57a7f6dc810634cd74e31523c897cebcade']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:14:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f479-e5f0-48e0-b87a-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:14:49.000Z",
"modified": "2017-03-23T16:14:49.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 194549b3fd0be8a701b8433db1b2cff396a4492c342632fa22d6af89570eff46",
"pattern": "[file:hashes.MD5 = 'b83a4559bc8f56ba70e54854f7151833']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:14:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58d3f47a-5340-4d5c-b014-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:14:50.000Z",
"modified": "2017-03-23T16:14:50.000Z",
"first_observed": "2017-03-23T16:14:50Z",
"last_observed": "2017-03-23T16:14:50Z",
"number_observed": 1,
"object_refs": [
"url--58d3f47a-5340-4d5c-b014-9f0702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58d3f47a-5340-4d5c-b014-9f0702de0b81",
"value": "https://www.virustotal.com/file/194549b3fd0be8a701b8433db1b2cff396a4492c342632fa22d6af89570eff46/analysis/1489752432/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f47b-7af0-404e-aa7e-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:14:51.000Z",
"modified": "2017-03-23T16:14:51.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 599a60601345bf8fc05f27d35f3c3f2ed80b6e7890d5f33a57f75c09a089356a",
"pattern": "[file:hashes.SHA1 = '9acb08a11da72f26f9411685ae68681689ddf0ac']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:14:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f47c-e300-4575-8384-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:14:52.000Z",
"modified": "2017-03-23T16:14:52.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 599a60601345bf8fc05f27d35f3c3f2ed80b6e7890d5f33a57f75c09a089356a",
"pattern": "[file:hashes.MD5 = 'ce581d3b871320a9fad4105baffc1d6d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:14:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58d3f47d-06b8-4e6d-8e5c-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:14:53.000Z",
"modified": "2017-03-23T16:14:53.000Z",
"first_observed": "2017-03-23T16:14:53Z",
"last_observed": "2017-03-23T16:14:53Z",
"number_observed": 1,
"object_refs": [
"url--58d3f47d-06b8-4e6d-8e5c-9f0702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58d3f47d-06b8-4e6d-8e5c-9f0702de0b81",
"value": "https://www.virustotal.com/file/599a60601345bf8fc05f27d35f3c3f2ed80b6e7890d5f33a57f75c09a089356a/analysis/1488980041/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f47e-46dc-4f6d-ab77-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:14:54.000Z",
"modified": "2017-03-23T16:14:54.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 5d6b52287f4fdefe0621d9fadd83b0531f56811937b023ce49e426e320b372f5",
"pattern": "[file:hashes.SHA1 = '4b58c0437799f442f22a162cad2989eace61b8ee']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:14:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f47f-edac-4091-80a4-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:14:55.000Z",
"modified": "2017-03-23T16:14:55.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 5d6b52287f4fdefe0621d9fadd83b0531f56811937b023ce49e426e320b372f5",
"pattern": "[file:hashes.MD5 = 'efb3eb8e8c4c0061b3aa41f059376d0e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:14:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58d3f47f-02e8-4528-9d5d-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:14:55.000Z",
"modified": "2017-03-23T16:14:55.000Z",
"first_observed": "2017-03-23T16:14:55Z",
"last_observed": "2017-03-23T16:14:55Z",
"number_observed": 1,
"object_refs": [
"url--58d3f47f-02e8-4528-9d5d-9f0702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58d3f47f-02e8-4528-9d5d-9f0702de0b81",
"value": "https://www.virustotal.com/file/5d6b52287f4fdefe0621d9fadd83b0531f56811937b023ce49e426e320b372f5/analysis/1489722634/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f480-fd5c-492b-b65c-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:14:56.000Z",
"modified": "2017-03-23T16:14:56.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: e5de4a14367d1a7b599d7afae07aa66c63941238ff25f4f17dea54db6d8ac350",
"pattern": "[file:hashes.SHA1 = '3b730baed16931a4f3734755d3c235ea941d93fa']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:14:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f481-5c70-4976-9427-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:14:57.000Z",
"modified": "2017-03-23T16:14:57.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: e5de4a14367d1a7b599d7afae07aa66c63941238ff25f4f17dea54db6d8ac350",
"pattern": "[file:hashes.MD5 = '54506270b7e558f783fff7b6cb33c118']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:14:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58d3f482-95dc-4161-99f9-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:14:58.000Z",
"modified": "2017-03-23T16:14:58.000Z",
"first_observed": "2017-03-23T16:14:58Z",
"last_observed": "2017-03-23T16:14:58Z",
"number_observed": 1,
"object_refs": [
"url--58d3f482-95dc-4161-99f9-9f0702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58d3f482-95dc-4161-99f9-9f0702de0b81",
"value": "https://www.virustotal.com/file/e5de4a14367d1a7b599d7afae07aa66c63941238ff25f4f17dea54db6d8ac350/analysis/1490174058/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f483-15d4-47ba-9207-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:14:59.000Z",
"modified": "2017-03-23T16:14:59.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: a28c3c075ecfb982e6e3cb237c0eab1308f023e7bcf207d0fd1f2b4f29791074",
"pattern": "[file:hashes.SHA1 = 'fb1121a40ad44d1992af96a89803d93b9f2238af']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:14:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f484-fe38-437e-9200-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:00.000Z",
"modified": "2017-03-23T16:15:00.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: a28c3c075ecfb982e6e3cb237c0eab1308f023e7bcf207d0fd1f2b4f29791074",
"pattern": "[file:hashes.MD5 = '432bc47556733fc6430556191013f817']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:15:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58d3f485-6e70-4db3-9ed5-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:01.000Z",
"modified": "2017-03-23T16:15:01.000Z",
"first_observed": "2017-03-23T16:15:01Z",
"last_observed": "2017-03-23T16:15:01Z",
"number_observed": 1,
"object_refs": [
"url--58d3f485-6e70-4db3-9ed5-9f0702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58d3f485-6e70-4db3-9ed5-9f0702de0b81",
"value": "https://www.virustotal.com/file/a28c3c075ecfb982e6e3cb237c0eab1308f023e7bcf207d0fd1f2b4f29791074/analysis/1489656320/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f486-dfa4-4833-ba6a-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:02.000Z",
"modified": "2017-03-23T16:15:02.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 156cbbb25240e246a2340e1bca1692b7110277bac30f76dcacd48dd5f2042caa",
"pattern": "[file:hashes.SHA1 = '52594e603c08626f8198804b47c0f33b5a487c5e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:15:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f487-3070-48cd-a586-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:03.000Z",
"modified": "2017-03-23T16:15:03.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 156cbbb25240e246a2340e1bca1692b7110277bac30f76dcacd48dd5f2042caa",
"pattern": "[file:hashes.MD5 = '9e4a4e881981fdeadcbf3b538d757a08']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:15:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58d3f488-91b4-4fbd-a83b-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:04.000Z",
"modified": "2017-03-23T16:15:04.000Z",
"first_observed": "2017-03-23T16:15:04Z",
"last_observed": "2017-03-23T16:15:04Z",
"number_observed": 1,
"object_refs": [
"url--58d3f488-91b4-4fbd-a83b-9f0702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58d3f488-91b4-4fbd-a83b-9f0702de0b81",
"value": "https://www.virustotal.com/file/156cbbb25240e246a2340e1bca1692b7110277bac30f76dcacd48dd5f2042caa/analysis/1487800971/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f489-c2d8-4596-815a-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:05.000Z",
"modified": "2017-03-23T16:15:05.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 0882c8a38ca485fe9763b0c0c7c5a22c330cebe86101a9e1ffa5a70c4f58faac",
"pattern": "[file:hashes.SHA1 = '6d53c60a5ccb6ed9282863979e34dfc18ca2bd22']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:15:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f489-a69c-4247-bcc0-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:05.000Z",
"modified": "2017-03-23T16:15:05.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 0882c8a38ca485fe9763b0c0c7c5a22c330cebe86101a9e1ffa5a70c4f58faac",
"pattern": "[file:hashes.MD5 = '14c93af313c1c96c57c23b88572f6cc9']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:15:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58d3f48a-2f20-4536-8866-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:06.000Z",
"modified": "2017-03-23T16:15:06.000Z",
"first_observed": "2017-03-23T16:15:06Z",
"last_observed": "2017-03-23T16:15:06Z",
"number_observed": 1,
"object_refs": [
"url--58d3f48a-2f20-4536-8866-9f0702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58d3f48a-2f20-4536-8866-9f0702de0b81",
"value": "https://www.virustotal.com/file/0882c8a38ca485fe9763b0c0c7c5a22c330cebe86101a9e1ffa5a70c4f58faac/analysis/1487737901/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f48b-d194-42c9-af6d-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:07.000Z",
"modified": "2017-03-23T16:15:07.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 9f40662ebbd3a848219aa47c149c174c292cea5e62dcc0bd26f12e1bf5ba7d7c",
"pattern": "[file:hashes.SHA1 = '3b20c41374a6e5ae04600c6cc248e7ebaa47d8af']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:15:07Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f48c-bc18-45fe-b514-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:08.000Z",
"modified": "2017-03-23T16:15:08.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 9f40662ebbd3a848219aa47c149c174c292cea5e62dcc0bd26f12e1bf5ba7d7c",
"pattern": "[file:hashes.MD5 = 'b4525dae66b645664212c44b2325777d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:15:08Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58d3f48d-ed58-4832-b2c9-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:09.000Z",
"modified": "2017-03-23T16:15:09.000Z",
"first_observed": "2017-03-23T16:15:09Z",
"last_observed": "2017-03-23T16:15:09Z",
"number_observed": 1,
"object_refs": [
"url--58d3f48d-ed58-4832-b2c9-9f0702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58d3f48d-ed58-4832-b2c9-9f0702de0b81",
"value": "https://www.virustotal.com/file/9f40662ebbd3a848219aa47c149c174c292cea5e62dcc0bd26f12e1bf5ba7d7c/analysis/1490199819/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f48e-a8d0-4a80-bb64-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:10.000Z",
"modified": "2017-03-23T16:15:10.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 885877989df73bafd087f7c689eedfa5e2fe3620ab62d6ff57a3394702761751",
"pattern": "[file:hashes.SHA1 = '245961eb098174ab176cb042e1d195c5ff8e1c57']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:15:10Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f48f-2188-4f91-a5ae-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:11.000Z",
"modified": "2017-03-23T16:15:11.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 885877989df73bafd087f7c689eedfa5e2fe3620ab62d6ff57a3394702761751",
"pattern": "[file:hashes.MD5 = 'b4e93af7aa9c0c6c4231f8d62e56b904']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:15:11Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58d3f490-4c58-4735-bad2-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:12.000Z",
"modified": "2017-03-23T16:15:12.000Z",
"first_observed": "2017-03-23T16:15:12Z",
"last_observed": "2017-03-23T16:15:12Z",
"number_observed": 1,
"object_refs": [
"url--58d3f490-4c58-4735-bad2-9f0702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58d3f490-4c58-4735-bad2-9f0702de0b81",
"value": "https://www.virustotal.com/file/885877989df73bafd087f7c689eedfa5e2fe3620ab62d6ff57a3394702761751/analysis/1489710082/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f491-4ddc-4653-8342-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:13.000Z",
"modified": "2017-03-23T16:15:13.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 726f170f13b9a24d409c0c4fbf0a14aff0f3cd1662762230bfaf7a8822257880",
"pattern": "[file:hashes.SHA1 = '248d77facd849c606a09afa3ed23a53c94f49868']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:15:13Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f491-950c-4e31-98dd-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:13.000Z",
"modified": "2017-03-23T16:15:13.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 726f170f13b9a24d409c0c4fbf0a14aff0f3cd1662762230bfaf7a8822257880",
"pattern": "[file:hashes.MD5 = 'c5197060f32efe8f06fbdacd1f7ccc6d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:15:13Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58d3f492-19dc-486e-a83e-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:14.000Z",
"modified": "2017-03-23T16:15:14.000Z",
"first_observed": "2017-03-23T16:15:14Z",
"last_observed": "2017-03-23T16:15:14Z",
"number_observed": 1,
"object_refs": [
"url--58d3f492-19dc-486e-a83e-9f0702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58d3f492-19dc-486e-a83e-9f0702de0b81",
"value": "https://www.virustotal.com/file/726f170f13b9a24d409c0c4fbf0a14aff0f3cd1662762230bfaf7a8822257880/analysis/1489105110/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f493-ba20-472a-8e83-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:15.000Z",
"modified": "2017-03-23T16:15:15.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: bc4f30177538628f93d57ae1e59859c50409afefe133956ec801c040ab9253f5",
"pattern": "[file:hashes.SHA1 = '4335311c55cfdd75b8577fd59aec688461805f00']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:15:15Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f494-2564-475f-8b0d-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:16.000Z",
"modified": "2017-03-23T16:15:16.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: bc4f30177538628f93d57ae1e59859c50409afefe133956ec801c040ab9253f5",
"pattern": "[file:hashes.MD5 = '4e71b67ada100e0e9a2be1303e97053c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:15:16Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58d3f495-2b6c-40b4-9246-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:17.000Z",
"modified": "2017-03-23T16:15:17.000Z",
"first_observed": "2017-03-23T16:15:17Z",
"last_observed": "2017-03-23T16:15:17Z",
"number_observed": 1,
"object_refs": [
"url--58d3f495-2b6c-40b4-9246-9f0702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58d3f495-2b6c-40b4-9246-9f0702de0b81",
"value": "https://www.virustotal.com/file/bc4f30177538628f93d57ae1e59859c50409afefe133956ec801c040ab9253f5/analysis/1490018428/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f496-3e7c-470a-a837-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:18.000Z",
"modified": "2017-03-23T16:15:18.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 7c5337250b6a1ede2472e4acc74366e8a425eaf2c36e3805d36200ad560d0feb",
"pattern": "[file:hashes.SHA1 = 'c884caa2af7e60989b4ea5be649a894b09cff14b']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:15:18Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f497-6fa0-46b6-9633-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:19.000Z",
"modified": "2017-03-23T16:15:19.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 7c5337250b6a1ede2472e4acc74366e8a425eaf2c36e3805d36200ad560d0feb",
"pattern": "[file:hashes.MD5 = '91723d3297db56d27f76f11c22465d57']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:15:19Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58d3f498-3080-4592-84bb-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:20.000Z",
"modified": "2017-03-23T16:15:20.000Z",
"first_observed": "2017-03-23T16:15:20Z",
"last_observed": "2017-03-23T16:15:20Z",
"number_observed": 1,
"object_refs": [
"url--58d3f498-3080-4592-84bb-9f0702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58d3f498-3080-4592-84bb-9f0702de0b81",
"value": "https://www.virustotal.com/file/7c5337250b6a1ede2472e4acc74366e8a425eaf2c36e3805d36200ad560d0feb/analysis/1489081066/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f499-82e8-4f8c-8f08-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:21.000Z",
"modified": "2017-03-23T16:15:21.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 4d46087599b246cd297883341859561b3b1794419c704b167a28c7891ff5d7b1",
"pattern": "[file:hashes.SHA1 = 'fbe3fd88576d2235d66ad349245c3cfc1ff6efb9']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:15:21Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f49a-881c-4000-9b66-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:22.000Z",
"modified": "2017-03-23T16:15:22.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 4d46087599b246cd297883341859561b3b1794419c704b167a28c7891ff5d7b1",
"pattern": "[file:hashes.MD5 = '376cd33189c74cd3213b6ebf58bedd9f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:15:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58d3f49a-4320-40bb-9485-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:22.000Z",
"modified": "2017-03-23T16:15:22.000Z",
"first_observed": "2017-03-23T16:15:22Z",
"last_observed": "2017-03-23T16:15:22Z",
"number_observed": 1,
"object_refs": [
"url--58d3f49a-4320-40bb-9485-9f0702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58d3f49a-4320-40bb-9485-9f0702de0b81",
"value": "https://www.virustotal.com/file/4d46087599b246cd297883341859561b3b1794419c704b167a28c7891ff5d7b1/analysis/1490178042/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f49b-83b8-4712-8b2f-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:23.000Z",
"modified": "2017-03-23T16:15:23.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 6d33cd5b7cfcc4a55583adbf75f578d71d6aa572e93c5a7392ece4dc8204d0f8",
"pattern": "[file:hashes.SHA1 = 'b78dcc00427ab7562330a9fe1345d2f0c579856a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:15:23Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f49c-0310-4f19-81c5-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:24.000Z",
"modified": "2017-03-23T16:15:24.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 6d33cd5b7cfcc4a55583adbf75f578d71d6aa572e93c5a7392ece4dc8204d0f8",
"pattern": "[file:hashes.MD5 = '6f989159f08f3bdee9ddf5aa66a77f38']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:15:24Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58d3f49d-b5a0-4e7f-960b-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:25.000Z",
"modified": "2017-03-23T16:15:25.000Z",
"first_observed": "2017-03-23T16:15:25Z",
"last_observed": "2017-03-23T16:15:25Z",
"number_observed": 1,
"object_refs": [
"url--58d3f49d-b5a0-4e7f-960b-9f0702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58d3f49d-b5a0-4e7f-960b-9f0702de0b81",
"value": "https://www.virustotal.com/file/6d33cd5b7cfcc4a55583adbf75f578d71d6aa572e93c5a7392ece4dc8204d0f8/analysis/1490245613/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f49e-dcb8-4253-ad25-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:26.000Z",
"modified": "2017-03-23T16:15:26.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 9eb85367bd59854ccd7b8e13a22deec92bbe746a5de83820d7265055f96da40f",
"pattern": "[file:hashes.SHA1 = '953d32f490475fe04e1e07e5cef415297ae3a864']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:15:26Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f49f-141c-4677-ba9b-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:27.000Z",
"modified": "2017-03-23T16:15:27.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 9eb85367bd59854ccd7b8e13a22deec92bbe746a5de83820d7265055f96da40f",
"pattern": "[file:hashes.MD5 = '9181db58d9145fb1ccc32ea4667fc226']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:15:27Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58d3f4a0-b594-48ef-aaab-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:28.000Z",
"modified": "2017-03-23T16:15:28.000Z",
"first_observed": "2017-03-23T16:15:28Z",
"last_observed": "2017-03-23T16:15:28Z",
"number_observed": 1,
"object_refs": [
"url--58d3f4a0-b594-48ef-aaab-9f0702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58d3f4a0-b594-48ef-aaab-9f0702de0b81",
"value": "https://www.virustotal.com/file/9eb85367bd59854ccd7b8e13a22deec92bbe746a5de83820d7265055f96da40f/analysis/1489660837/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4a1-63a8-4fc4-b21b-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:29.000Z",
"modified": "2017-03-23T16:15:29.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 5872ec86add4892f061cc1fd2478da098645876d0b13d3ce3e789f526c5b8ec8",
"pattern": "[file:hashes.SHA1 = 'b8d6186dbbce77bc264c004fbbd6adfb1ec8fb50']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:15:29Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4a2-9eb8-4698-bcbb-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:30.000Z",
"modified": "2017-03-23T16:15:30.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 5872ec86add4892f061cc1fd2478da098645876d0b13d3ce3e789f526c5b8ec8",
"pattern": "[file:hashes.MD5 = 'ee35461e320213caf8308bd5416d525c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:15:30Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58d3f4a3-fa88-4ee5-b387-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:31.000Z",
"modified": "2017-03-23T16:15:31.000Z",
"first_observed": "2017-03-23T16:15:31Z",
"last_observed": "2017-03-23T16:15:31Z",
"number_observed": 1,
"object_refs": [
"url--58d3f4a3-fa88-4ee5-b387-9f0702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58d3f4a3-fa88-4ee5-b387-9f0702de0b81",
"value": "https://www.virustotal.com/file/5872ec86add4892f061cc1fd2478da098645876d0b13d3ce3e789f526c5b8ec8/analysis/1487038202/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4a4-2408-4323-b129-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:32.000Z",
"modified": "2017-03-23T16:15:32.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 44583aca68ce734bccc79d28f666bdc81a1436c257f035875df15a82f35e6910",
"pattern": "[file:hashes.SHA1 = '81cf84c5f699f618b681a7df64c7b1191db38359']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:15:32Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4a5-64e0-4c3d-9349-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:33.000Z",
"modified": "2017-03-23T16:15:33.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 44583aca68ce734bccc79d28f666bdc81a1436c257f035875df15a82f35e6910",
"pattern": "[file:hashes.MD5 = '0ea4ea09627484cfe037000b1da47e84']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:15:33Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58d3f4a5-e470-42e1-b47d-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:33.000Z",
"modified": "2017-03-23T16:15:33.000Z",
"first_observed": "2017-03-23T16:15:33Z",
"last_observed": "2017-03-23T16:15:33Z",
"number_observed": 1,
"object_refs": [
"url--58d3f4a5-e470-42e1-b47d-9f0702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58d3f4a5-e470-42e1-b47d-9f0702de0b81",
"value": "https://www.virustotal.com/file/44583aca68ce734bccc79d28f666bdc81a1436c257f035875df15a82f35e6910/analysis/1486569365/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4a6-ba10-4ebc-afaf-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:34.000Z",
"modified": "2017-03-23T16:15:34.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: cbb58841ef2179e52fcfb918d085503ccf4482014fa1f0714e11fd667de974a0",
"pattern": "[file:hashes.SHA1 = 'acd37c026021a7d834afd1eea693d200ed3966a9']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:15:34Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4a7-18cc-4ead-ba97-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:35.000Z",
"modified": "2017-03-23T16:15:35.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: cbb58841ef2179e52fcfb918d085503ccf4482014fa1f0714e11fd667de974a0",
"pattern": "[file:hashes.MD5 = '25b3494084faf4d320c4688c63b9608a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:15:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58d3f4a8-c578-407a-b8c7-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:36.000Z",
"modified": "2017-03-23T16:15:36.000Z",
"first_observed": "2017-03-23T16:15:36Z",
"last_observed": "2017-03-23T16:15:36Z",
"number_observed": 1,
"object_refs": [
"url--58d3f4a8-c578-407a-b8c7-9f0702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58d3f4a8-c578-407a-b8c7-9f0702de0b81",
"value": "https://www.virustotal.com/file/cbb58841ef2179e52fcfb918d085503ccf4482014fa1f0714e11fd667de974a0/analysis/1490244446/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4a9-c780-4a64-9fd3-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:37.000Z",
"modified": "2017-03-23T16:15:37.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 1d73428619f69cbdfc5158f1682cc304ba6af2a0b425244bcd8c2c432d4a50d7",
"pattern": "[file:hashes.SHA1 = '53fab257bf206ba8741cf002f64bce68dba4bc8f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:15:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4aa-e0cc-42f0-9616-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:38.000Z",
"modified": "2017-03-23T16:15:38.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 1d73428619f69cbdfc5158f1682cc304ba6af2a0b425244bcd8c2c432d4a50d7",
"pattern": "[file:hashes.MD5 = '59073cdda35e5646469f9557ed187fe8']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:15:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58d3f4ab-4168-4134-95c5-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:39.000Z",
"modified": "2017-03-23T16:15:39.000Z",
"first_observed": "2017-03-23T16:15:39Z",
"last_observed": "2017-03-23T16:15:39Z",
"number_observed": 1,
"object_refs": [
"url--58d3f4ab-4168-4134-95c5-9f0702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58d3f4ab-4168-4134-95c5-9f0702de0b81",
"value": "https://www.virustotal.com/file/1d73428619f69cbdfc5158f1682cc304ba6af2a0b425244bcd8c2c432d4a50d7/analysis/1487713727/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4ac-c624-4a96-979d-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:40.000Z",
"modified": "2017-03-23T16:15:40.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: e7fc4527e4cb65e05069b871e06226ce9c9669649ed9cfbad2dcb41cdd9fe94c",
"pattern": "[file:hashes.SHA1 = 'ade5df4cc9fefe20e524fe822cfc799f0f9c5ac7']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:15:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4ad-8f60-44ab-ae9b-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:41.000Z",
"modified": "2017-03-23T16:15:41.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: e7fc4527e4cb65e05069b871e06226ce9c9669649ed9cfbad2dcb41cdd9fe94c",
"pattern": "[file:hashes.MD5 = '00f9cd32ba4d79d5c8d1821d82834e66']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:15:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58d3f4ae-20a0-473a-a4dd-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:42.000Z",
"modified": "2017-03-23T16:15:42.000Z",
"first_observed": "2017-03-23T16:15:42Z",
"last_observed": "2017-03-23T16:15:42Z",
"number_observed": 1,
"object_refs": [
"url--58d3f4ae-20a0-473a-a4dd-9f0702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58d3f4ae-20a0-473a-a4dd-9f0702de0b81",
"value": "https://www.virustotal.com/file/e7fc4527e4cb65e05069b871e06226ce9c9669649ed9cfbad2dcb41cdd9fe94c/analysis/1487565053/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4af-b314-4f41-818d-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:43.000Z",
"modified": "2017-03-23T16:15:43.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 99a3939d654e4c424dcf33fbc18c7568d1030981ad1ae8f2a6da2966efbff669",
"pattern": "[file:hashes.SHA1 = 'c3d5baad23b756093fc67b7db7830f6c37c23a59']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:15:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4af-1274-4b40-941e-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:43.000Z",
"modified": "2017-03-23T16:15:43.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 99a3939d654e4c424dcf33fbc18c7568d1030981ad1ae8f2a6da2966efbff669",
"pattern": "[file:hashes.MD5 = '978679966dc7797816f3ad0a6f63e70e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:15:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58d3f4b0-6334-4fce-9704-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:44.000Z",
"modified": "2017-03-23T16:15:44.000Z",
"first_observed": "2017-03-23T16:15:44Z",
"last_observed": "2017-03-23T16:15:44Z",
"number_observed": 1,
"object_refs": [
"url--58d3f4b0-6334-4fce-9704-9f0702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58d3f4b0-6334-4fce-9704-9f0702de0b81",
"value": "https://www.virustotal.com/file/99a3939d654e4c424dcf33fbc18c7568d1030981ad1ae8f2a6da2966efbff669/analysis/1489681560/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4b1-ba78-4b17-b845-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:45.000Z",
"modified": "2017-03-23T16:15:45.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 450b2d6741a452d3bff491fb3a40ec8e29cbaf24fb1b400863efe1a7f920543e",
"pattern": "[file:hashes.SHA1 = 'a14565053de9facb97c6d1d283b37fc6333078fb']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:15:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4b2-a248-4911-8f00-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:46.000Z",
"modified": "2017-03-23T16:15:46.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 450b2d6741a452d3bff491fb3a40ec8e29cbaf24fb1b400863efe1a7f920543e",
"pattern": "[file:hashes.MD5 = 'bc652907773d5d2f15e2b9f922fb87ab']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:15:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58d3f4b3-44bc-420e-a5d9-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:47.000Z",
"modified": "2017-03-23T16:15:47.000Z",
"first_observed": "2017-03-23T16:15:47Z",
"last_observed": "2017-03-23T16:15:47Z",
"number_observed": 1,
"object_refs": [
"url--58d3f4b3-44bc-420e-a5d9-9f0702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58d3f4b3-44bc-420e-a5d9-9f0702de0b81",
"value": "https://www.virustotal.com/file/450b2d6741a452d3bff491fb3a40ec8e29cbaf24fb1b400863efe1a7f920543e/analysis/1486718178/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4b4-f8e4-4f2b-bf75-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:48.000Z",
"modified": "2017-03-23T16:15:48.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: ecc9526b380bd109dbcb3d9c4635c1866234d302658758d6ecf4e927a12af9a1",
"pattern": "[file:hashes.SHA1 = '6cd11dbf35ebf83f1c416324d9d883e2c593dbc1']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:15:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4b5-9f10-4dc4-868c-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:49.000Z",
"modified": "2017-03-23T16:15:49.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: ecc9526b380bd109dbcb3d9c4635c1866234d302658758d6ecf4e927a12af9a1",
"pattern": "[file:hashes.MD5 = '72c326f6915bde95d89898a7e8e298da']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:15:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58d3f4b6-6eac-4220-8615-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:50.000Z",
"modified": "2017-03-23T16:15:50.000Z",
"first_observed": "2017-03-23T16:15:50Z",
"last_observed": "2017-03-23T16:15:50Z",
"number_observed": 1,
"object_refs": [
"url--58d3f4b6-6eac-4220-8615-9f0702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58d3f4b6-6eac-4220-8615-9f0702de0b81",
"value": "https://www.virustotal.com/file/ecc9526b380bd109dbcb3d9c4635c1866234d302658758d6ecf4e927a12af9a1/analysis/1489592673/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4b7-2258-49ec-a7a8-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:51.000Z",
"modified": "2017-03-23T16:15:51.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: c343e92d30c1374c631efa8cf612faf5567e8bd66330e1ff58ac9296c3373304",
"pattern": "[file:hashes.SHA1 = '9adcc8a2ce8cc94968d43b51f8c867b46b1c0c7c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:15:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4b8-87cc-41aa-8300-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:52.000Z",
"modified": "2017-03-23T16:15:52.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: c343e92d30c1374c631efa8cf612faf5567e8bd66330e1ff58ac9296c3373304",
"pattern": "[file:hashes.MD5 = '50f00680e95100a3b808d1675875873a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:15:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58d3f4b8-42f8-4743-b13a-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:52.000Z",
"modified": "2017-03-23T16:15:52.000Z",
"first_observed": "2017-03-23T16:15:52Z",
"last_observed": "2017-03-23T16:15:52Z",
"number_observed": 1,
"object_refs": [
"url--58d3f4b8-42f8-4743-b13a-9f0702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58d3f4b8-42f8-4743-b13a-9f0702de0b81",
"value": "https://www.virustotal.com/file/c343e92d30c1374c631efa8cf612faf5567e8bd66330e1ff58ac9296c3373304/analysis/1490174627/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4b9-c48c-460a-8ae7-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:53.000Z",
"modified": "2017-03-23T16:15:53.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 5c1db6ce5989645bbc8cb8489dee2fb99eba7b4093eaad96cd5a6c692a53c245",
"pattern": "[file:hashes.SHA1 = 'cd65ed59eddc98cb4cc3dc56ba3796427908c893']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:15:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4ba-7820-495f-9320-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:54.000Z",
"modified": "2017-03-23T16:15:54.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 5c1db6ce5989645bbc8cb8489dee2fb99eba7b4093eaad96cd5a6c692a53c245",
"pattern": "[file:hashes.MD5 = '51186182ad3a1698119204f5194a1213']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:15:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58d3f4bb-d08c-4568-8ae9-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:55.000Z",
"modified": "2017-03-23T16:15:55.000Z",
"first_observed": "2017-03-23T16:15:55Z",
"last_observed": "2017-03-23T16:15:55Z",
"number_observed": 1,
"object_refs": [
"url--58d3f4bb-d08c-4568-8ae9-9f0702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58d3f4bb-d08c-4568-8ae9-9f0702de0b81",
"value": "https://www.virustotal.com/file/5c1db6ce5989645bbc8cb8489dee2fb99eba7b4093eaad96cd5a6c692a53c245/analysis/1489482718/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4bc-a700-4b97-b45f-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:56.000Z",
"modified": "2017-03-23T16:15:56.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: a0e529ed847b78fd68a871688a7e99e6abc87295c671a3e2d02a61a1e04f5ce9",
"pattern": "[file:hashes.SHA1 = 'da86b97fe62db0c32274961b27a407510c2b2c79']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:15:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4bd-e1bc-47c6-a589-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:57.000Z",
"modified": "2017-03-23T16:15:57.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: a0e529ed847b78fd68a871688a7e99e6abc87295c671a3e2d02a61a1e04f5ce9",
"pattern": "[file:hashes.MD5 = '7d0a63918683e92163a34d89e39d0032']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:15:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58d3f4be-7f68-4a67-9d7d-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:58.000Z",
"modified": "2017-03-23T16:15:58.000Z",
"first_observed": "2017-03-23T16:15:58Z",
"last_observed": "2017-03-23T16:15:58Z",
"number_observed": 1,
"object_refs": [
"url--58d3f4be-7f68-4a67-9d7d-9f0702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58d3f4be-7f68-4a67-9d7d-9f0702de0b81",
"value": "https://www.virustotal.com/file/a0e529ed847b78fd68a871688a7e99e6abc87295c671a3e2d02a61a1e04f5ce9/analysis/1489161096/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4bf-fcf8-40cb-8b69-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:15:59.000Z",
"modified": "2017-03-23T16:15:59.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 66de8e2f1d5ebbf3f8c511d5cd6394e24be3c694e78d614dfe703f8aa198906f",
"pattern": "[file:hashes.SHA1 = '1bcb8314231b2346e22b5384947aee5b7500fd5e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:15:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4c0-2198-424d-b375-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:00.000Z",
"modified": "2017-03-23T16:16:00.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 66de8e2f1d5ebbf3f8c511d5cd6394e24be3c694e78d614dfe703f8aa198906f",
"pattern": "[file:hashes.MD5 = 'd5afa01d01ee54e8567d889f691fce8e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:16:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58d3f4c1-4074-453b-ab12-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:01.000Z",
"modified": "2017-03-23T16:16:01.000Z",
"first_observed": "2017-03-23T16:16:01Z",
"last_observed": "2017-03-23T16:16:01Z",
"number_observed": 1,
"object_refs": [
"url--58d3f4c1-4074-453b-ab12-9f0702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58d3f4c1-4074-453b-ab12-9f0702de0b81",
"value": "https://www.virustotal.com/file/66de8e2f1d5ebbf3f8c511d5cd6394e24be3c694e78d614dfe703f8aa198906f/analysis/1490280326/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4c1-d398-4488-8c7a-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:01.000Z",
"modified": "2017-03-23T16:16:01.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 27290fd934092cf1ca2a242e6847665a16771376af8f5c81ef1c851463e77709",
"pattern": "[file:hashes.SHA1 = '25a387375f6055a2b7e48efeda4ca1c608795ce4']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:16:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4c2-1f0c-4b35-b40e-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:02.000Z",
"modified": "2017-03-23T16:16:02.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 27290fd934092cf1ca2a242e6847665a16771376af8f5c81ef1c851463e77709",
"pattern": "[file:hashes.MD5 = 'e565863cae9c7e131a6558bfbb5d797d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:16:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58d3f4c3-d014-4bb3-9961-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:03.000Z",
"modified": "2017-03-23T16:16:03.000Z",
"first_observed": "2017-03-23T16:16:03Z",
"last_observed": "2017-03-23T16:16:03Z",
"number_observed": 1,
"object_refs": [
"url--58d3f4c3-d014-4bb3-9961-9f0702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58d3f4c3-d014-4bb3-9961-9f0702de0b81",
"value": "https://www.virustotal.com/file/27290fd934092cf1ca2a242e6847665a16771376af8f5c81ef1c851463e77709/analysis/1487844593/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4c4-ef20-4174-affe-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:04.000Z",
"modified": "2017-03-23T16:16:04.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 552fe8b5fd175822d4479552078331dbfb16881fea9514377a802f3cce87ac02",
"pattern": "[file:hashes.SHA1 = 'f822cafde38c48c813a1e98c628f23e0a082c02d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:16:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4c5-5984-466b-835e-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:05.000Z",
"modified": "2017-03-23T16:16:05.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 552fe8b5fd175822d4479552078331dbfb16881fea9514377a802f3cce87ac02",
"pattern": "[file:hashes.MD5 = '15b201d48cbf5f94644fe4d30d741bd2']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:16:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58d3f4c6-301c-4652-88c8-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:06.000Z",
"modified": "2017-03-23T16:16:06.000Z",
"first_observed": "2017-03-23T16:16:06Z",
"last_observed": "2017-03-23T16:16:06Z",
"number_observed": 1,
"object_refs": [
"url--58d3f4c6-301c-4652-88c8-9f0702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58d3f4c6-301c-4652-88c8-9f0702de0b81",
"value": "https://www.virustotal.com/file/552fe8b5fd175822d4479552078331dbfb16881fea9514377a802f3cce87ac02/analysis/1490261112/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4c7-5ed0-493a-b5d4-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:07.000Z",
"modified": "2017-03-23T16:16:07.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: a406f0208c914ff28f8e30eda539acb6abd23bbdecf704be4b77615a27f62e8d",
"pattern": "[file:hashes.SHA1 = 'f3e1fe6ea74b283f6e8b10b211891a24ea13de29']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:16:07Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4c8-78f0-4e7e-8900-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:08.000Z",
"modified": "2017-03-23T16:16:08.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: a406f0208c914ff28f8e30eda539acb6abd23bbdecf704be4b77615a27f62e8d",
"pattern": "[file:hashes.MD5 = '1cdc6f8d329741d6a5525528278fc609']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:16:08Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58d3f4c9-8ea4-4eff-b81c-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:09.000Z",
"modified": "2017-03-23T16:16:09.000Z",
"first_observed": "2017-03-23T16:16:09Z",
"last_observed": "2017-03-23T16:16:09Z",
"number_observed": 1,
"object_refs": [
"url--58d3f4c9-8ea4-4eff-b81c-9f0702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58d3f4c9-8ea4-4eff-b81c-9f0702de0b81",
"value": "https://www.virustotal.com/file/a406f0208c914ff28f8e30eda539acb6abd23bbdecf704be4b77615a27f62e8d/analysis/1486569476/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4c9-987c-4761-8c25-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:09.000Z",
"modified": "2017-03-23T16:16:09.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 79316e4c2601a5721d5d6ada0f152790ad44aa9ac5badf17e12c7825fb1f46aa",
"pattern": "[file:hashes.SHA1 = 'f103a119a779b4071309b4768ea4930a321cd07a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:16:09Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4ca-9818-4277-9a2e-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:10.000Z",
"modified": "2017-03-23T16:16:10.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 79316e4c2601a5721d5d6ada0f152790ad44aa9ac5badf17e12c7825fb1f46aa",
"pattern": "[file:hashes.MD5 = '7948214cc9830abc636eb1fa71ea6827']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:16:10Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58d3f4cb-0944-496d-95f3-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:11.000Z",
"modified": "2017-03-23T16:16:11.000Z",
"first_observed": "2017-03-23T16:16:11Z",
"last_observed": "2017-03-23T16:16:11Z",
"number_observed": 1,
"object_refs": [
"url--58d3f4cb-0944-496d-95f3-9f0702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58d3f4cb-0944-496d-95f3-9f0702de0b81",
"value": "https://www.virustotal.com/file/79316e4c2601a5721d5d6ada0f152790ad44aa9ac5badf17e12c7825fb1f46aa/analysis/1489420783/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4cc-bb1c-4496-ac1d-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:12.000Z",
"modified": "2017-03-23T16:16:12.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: dbc97df1e5036ac572d8a247a6b073ab1f1dabd20676443598135c6743534028",
"pattern": "[file:hashes.SHA1 = 'd11c3e0003c5cec7363c6fd58d09d72726971d19']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:16:12Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4cd-bba4-4e73-b121-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:13.000Z",
"modified": "2017-03-23T16:16:13.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: dbc97df1e5036ac572d8a247a6b073ab1f1dabd20676443598135c6743534028",
"pattern": "[file:hashes.MD5 = '9f721ef90d7ec58d48f25eb68b16aae7']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:16:13Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58d3f4ce-f8f0-485e-9bf2-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:14.000Z",
"modified": "2017-03-23T16:16:14.000Z",
"first_observed": "2017-03-23T16:16:14Z",
"last_observed": "2017-03-23T16:16:14Z",
"number_observed": 1,
"object_refs": [
"url--58d3f4ce-f8f0-485e-9bf2-9f0702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58d3f4ce-f8f0-485e-9bf2-9f0702de0b81",
"value": "https://www.virustotal.com/file/dbc97df1e5036ac572d8a247a6b073ab1f1dabd20676443598135c6743534028/analysis/1490246791/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4cf-75bc-426d-966d-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:15.000Z",
"modified": "2017-03-23T16:16:15.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 17ae8d128938131ebc944f5d77be7009fd05c8831f88ef3558cc9c00f0633f97",
"pattern": "[file:hashes.SHA1 = '18d9199cc35cd76003ee065b769a6bb9a1ed9d0f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:16:15Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4d0-5580-4826-a76c-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:16.000Z",
"modified": "2017-03-23T16:16:16.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 17ae8d128938131ebc944f5d77be7009fd05c8831f88ef3558cc9c00f0633f97",
"pattern": "[file:hashes.MD5 = '6993c2e110a8b4c4f12e07ac4afdad30']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:16:16Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58d3f4d1-5b1c-47c3-b2cd-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:17.000Z",
"modified": "2017-03-23T16:16:17.000Z",
"first_observed": "2017-03-23T16:16:17Z",
"last_observed": "2017-03-23T16:16:17Z",
"number_observed": 1,
"object_refs": [
"url--58d3f4d1-5b1c-47c3-b2cd-9f0702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58d3f4d1-5b1c-47c3-b2cd-9f0702de0b81",
"value": "https://www.virustotal.com/file/17ae8d128938131ebc944f5d77be7009fd05c8831f88ef3558cc9c00f0633f97/analysis/1489232312/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4d2-9d24-427b-a00c-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:18.000Z",
"modified": "2017-03-23T16:16:18.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: c201e4bb7b68b4655ab7ac85c8a7c93abe2238ec3d24914d86e8a543b6c6abbd",
"pattern": "[file:hashes.SHA1 = 'bd69ba1cc4a7c5d9eb14582f94573434312ce691']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:16:18Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4d2-9570-4a5e-bf21-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:18.000Z",
"modified": "2017-03-23T16:16:18.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: c201e4bb7b68b4655ab7ac85c8a7c93abe2238ec3d24914d86e8a543b6c6abbd",
"pattern": "[file:hashes.MD5 = 'a1ffba962b2e96bb0213fde45485d839']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:16:18Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58d3f4d3-357c-4605-8899-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:19.000Z",
"modified": "2017-03-23T16:16:19.000Z",
"first_observed": "2017-03-23T16:16:19Z",
"last_observed": "2017-03-23T16:16:19Z",
"number_observed": 1,
"object_refs": [
"url--58d3f4d3-357c-4605-8899-9f0702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58d3f4d3-357c-4605-8899-9f0702de0b81",
"value": "https://www.virustotal.com/file/c201e4bb7b68b4655ab7ac85c8a7c93abe2238ec3d24914d86e8a543b6c6abbd/analysis/1487706989/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4d4-34a4-4d48-a27e-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:20.000Z",
"modified": "2017-03-23T16:16:20.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 9c62f4947a572356f43f71fb55f2b702b78c2e1688c67eff89c36da50137ed21",
"pattern": "[file:hashes.SHA1 = 'f9675515ac8fc84a2fd29e62d2f1b9a420ecf6ab']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:16:20Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4d5-6c54-46fe-8da0-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:21.000Z",
"modified": "2017-03-23T16:16:21.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 9c62f4947a572356f43f71fb55f2b702b78c2e1688c67eff89c36da50137ed21",
"pattern": "[file:hashes.MD5 = '69d71124701a58d254effc455474175e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:16:21Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58d3f4d6-5dbc-4b36-8b92-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:22.000Z",
"modified": "2017-03-23T16:16:22.000Z",
"first_observed": "2017-03-23T16:16:22Z",
"last_observed": "2017-03-23T16:16:22Z",
"number_observed": 1,
"object_refs": [
"url--58d3f4d6-5dbc-4b36-8b92-9f0702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58d3f4d6-5dbc-4b36-8b92-9f0702de0b81",
"value": "https://www.virustotal.com/file/9c62f4947a572356f43f71fb55f2b702b78c2e1688c67eff89c36da50137ed21/analysis/1489498491/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4d7-6668-4ec1-b0c8-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:23.000Z",
"modified": "2017-03-23T16:16:23.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 84a2ded87681e65be35994ea26f4b2287e52438bbeebaac784c291196a6f94c6",
"pattern": "[file:hashes.SHA1 = '6660780579e0f416901921ef910a0a5d05fc11e4']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:16:23Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4d8-cd78-4ddc-b420-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:24.000Z",
"modified": "2017-03-23T16:16:24.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 84a2ded87681e65be35994ea26f4b2287e52438bbeebaac784c291196a6f94c6",
"pattern": "[file:hashes.MD5 = 'ab377c359cf4328ce8e0996a44aa2ddd']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:16:24Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58d3f4d9-36f8-4b3a-8da1-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:25.000Z",
"modified": "2017-03-23T16:16:25.000Z",
"first_observed": "2017-03-23T16:16:25Z",
"last_observed": "2017-03-23T16:16:25Z",
"number_observed": 1,
"object_refs": [
"url--58d3f4d9-36f8-4b3a-8da1-9f0702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58d3f4d9-36f8-4b3a-8da1-9f0702de0b81",
"value": "https://www.virustotal.com/file/84a2ded87681e65be35994ea26f4b2287e52438bbeebaac784c291196a6f94c6/analysis/1490174459/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4da-f654-4570-b92e-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:26.000Z",
"modified": "2017-03-23T16:16:26.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 415b9e72811cd7c50366d9c9038df02fe3bbfc6446ef42b099d85ea576fbd35d",
"pattern": "[file:hashes.SHA1 = '82cf01470fa321496bd7b6229e5d03589f7a7cca']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:16:26Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4da-9464-4464-960e-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:26.000Z",
"modified": "2017-03-23T16:16:26.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 415b9e72811cd7c50366d9c9038df02fe3bbfc6446ef42b099d85ea576fbd35d",
"pattern": "[file:hashes.MD5 = '6379f5b1f34f72a0268f843c47f85f32']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:16:26Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58d3f4db-4fa4-4638-ae46-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:27.000Z",
"modified": "2017-03-23T16:16:27.000Z",
"first_observed": "2017-03-23T16:16:27Z",
"last_observed": "2017-03-23T16:16:27Z",
"number_observed": 1,
"object_refs": [
"url--58d3f4db-4fa4-4638-ae46-9f0702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58d3f4db-4fa4-4638-ae46-9f0702de0b81",
"value": "https://www.virustotal.com/file/415b9e72811cd7c50366d9c9038df02fe3bbfc6446ef42b099d85ea576fbd35d/analysis/1490245303/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4dc-b564-4558-a522-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:28.000Z",
"modified": "2017-03-23T16:16:28.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 737d1468b20dc39300bc2be38285b6482940d2be9ae59b7dc984cf4dc6d82053",
"pattern": "[file:hashes.SHA1 = '03094768ec13f6d326caa3560ecc60e28d0a7845']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:16:28Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4dd-5b30-4672-983f-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:29.000Z",
"modified": "2017-03-23T16:16:29.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 737d1468b20dc39300bc2be38285b6482940d2be9ae59b7dc984cf4dc6d82053",
"pattern": "[file:hashes.MD5 = '8eb9d5405f1746025318c4cf52e7759d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:16:29Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58d3f4de-675c-49be-bced-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:30.000Z",
"modified": "2017-03-23T16:16:30.000Z",
"first_observed": "2017-03-23T16:16:30Z",
"last_observed": "2017-03-23T16:16:30Z",
"number_observed": 1,
"object_refs": [
"url--58d3f4de-675c-49be-bced-9f0702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58d3f4de-675c-49be-bced-9f0702de0b81",
"value": "https://www.virustotal.com/file/737d1468b20dc39300bc2be38285b6482940d2be9ae59b7dc984cf4dc6d82053/analysis/1486541106/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4df-d2ac-4989-8f5f-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:31.000Z",
"modified": "2017-03-23T16:16:31.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 11836837753c754997adf8ccf4fa8ba824e57725f56fbcd3b0d903e1fa30ac5b",
"pattern": "[file:hashes.SHA1 = '4ea0a2b4f90358c3147b5cbc6613506ed7ef00bc']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:16:31Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4e0-144c-428b-97b6-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:32.000Z",
"modified": "2017-03-23T16:16:32.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 11836837753c754997adf8ccf4fa8ba824e57725f56fbcd3b0d903e1fa30ac5b",
"pattern": "[file:hashes.MD5 = '92b4f31afa1471d510d48ed6c285ed61']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:16:32Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58d3f4e1-e650-4b87-8236-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:33.000Z",
"modified": "2017-03-23T16:16:33.000Z",
"first_observed": "2017-03-23T16:16:33Z",
"last_observed": "2017-03-23T16:16:33Z",
"number_observed": 1,
"object_refs": [
"url--58d3f4e1-e650-4b87-8236-9f0702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58d3f4e1-e650-4b87-8236-9f0702de0b81",
"value": "https://www.virustotal.com/file/11836837753c754997adf8ccf4fa8ba824e57725f56fbcd3b0d903e1fa30ac5b/analysis/1487931205/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4e2-2764-40dc-b738-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:34.000Z",
"modified": "2017-03-23T16:16:34.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 6077c3ed4dc67526f89b2c59fc16b389530a73b326f63fff17ae7c824b7770fd",
"pattern": "[file:hashes.SHA1 = '57f56d5a295058f22d6dbe99863f5db842091c15']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:16:34Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4e3-ac74-476c-88d7-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:35.000Z",
"modified": "2017-03-23T16:16:35.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 6077c3ed4dc67526f89b2c59fc16b389530a73b326f63fff17ae7c824b7770fd",
"pattern": "[file:hashes.MD5 = 'a2b79d655e1f000510f1f73de236960f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:16:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58d3f4e3-f2b4-4df3-bd6e-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:35.000Z",
"modified": "2017-03-23T16:16:35.000Z",
"first_observed": "2017-03-23T16:16:35Z",
"last_observed": "2017-03-23T16:16:35Z",
"number_observed": 1,
"object_refs": [
"url--58d3f4e3-f2b4-4df3-bd6e-9f0702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58d3f4e3-f2b4-4df3-bd6e-9f0702de0b81",
"value": "https://www.virustotal.com/file/6077c3ed4dc67526f89b2c59fc16b389530a73b326f63fff17ae7c824b7770fd/analysis/1486984912/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4e4-f018-471c-a801-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:36.000Z",
"modified": "2017-03-23T16:16:36.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 4a7d6c770c5fdbb32534b535efe0324e3bc25a8bcd3551b7fe0ff3610ee81299",
"pattern": "[file:hashes.SHA1 = '0599357139722cbf3b634b957073ce66f501a7b3']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:16:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4e5-d3f4-4911-869f-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:37.000Z",
"modified": "2017-03-23T16:16:37.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 4a7d6c770c5fdbb32534b535efe0324e3bc25a8bcd3551b7fe0ff3610ee81299",
"pattern": "[file:hashes.MD5 = '7e05a8f63ad73092e0a3f66bdb6b7dae']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:16:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58d3f4e6-bf80-47f8-8c5c-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:38.000Z",
"modified": "2017-03-23T16:16:38.000Z",
"first_observed": "2017-03-23T16:16:38Z",
"last_observed": "2017-03-23T16:16:38Z",
"number_observed": 1,
"object_refs": [
"url--58d3f4e6-bf80-47f8-8c5c-9f0702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58d3f4e6-bf80-47f8-8c5c-9f0702de0b81",
"value": "https://www.virustotal.com/file/4a7d6c770c5fdbb32534b535efe0324e3bc25a8bcd3551b7fe0ff3610ee81299/analysis/1490173985/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4e7-b39c-41b3-aa8d-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:39.000Z",
"modified": "2017-03-23T16:16:39.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: c53bf11adb48a00393c30a0902716e0088f650750349f5966ba3b60a0fa17487",
"pattern": "[file:hashes.SHA1 = '3976d852993a9febbc512870ee177acec4ebf3a9']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:16:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4e8-26c4-4601-b9e6-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:40.000Z",
"modified": "2017-03-23T16:16:40.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: c53bf11adb48a00393c30a0902716e0088f650750349f5966ba3b60a0fa17487",
"pattern": "[file:hashes.MD5 = '2412d1e94a5eacf0d066c2330cc2585c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:16:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58d3f4e9-b10c-4c7f-9fd2-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:41.000Z",
"modified": "2017-03-23T16:16:41.000Z",
"first_observed": "2017-03-23T16:16:41Z",
"last_observed": "2017-03-23T16:16:41Z",
"number_observed": 1,
"object_refs": [
"url--58d3f4e9-b10c-4c7f-9fd2-9f0702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58d3f4e9-b10c-4c7f-9fd2-9f0702de0b81",
"value": "https://www.virustotal.com/file/c53bf11adb48a00393c30a0902716e0088f650750349f5966ba3b60a0fa17487/analysis/1489993470/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4ea-da6c-4472-a666-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:42.000Z",
"modified": "2017-03-23T16:16:42.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 89a1264bd7facf02d48aff46724a0215c2fb1974d06451cebefdb2ea7ea9a71a",
"pattern": "[file:hashes.SHA1 = '524a23cabe678f6042e4c872a1454d1714b02ccc']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:16:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4eb-893c-4586-b9a4-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:43.000Z",
"modified": "2017-03-23T16:16:43.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 89a1264bd7facf02d48aff46724a0215c2fb1974d06451cebefdb2ea7ea9a71a",
"pattern": "[file:hashes.MD5 = 'e692a01b1aa01e20ef6f281a6182ca7a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:16:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58d3f4eb-5e8c-44d4-be1a-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:43.000Z",
"modified": "2017-03-23T16:16:43.000Z",
"first_observed": "2017-03-23T16:16:43Z",
"last_observed": "2017-03-23T16:16:43Z",
"number_observed": 1,
"object_refs": [
"url--58d3f4eb-5e8c-44d4-be1a-9f0702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58d3f4eb-5e8c-44d4-be1a-9f0702de0b81",
"value": "https://www.virustotal.com/file/89a1264bd7facf02d48aff46724a0215c2fb1974d06451cebefdb2ea7ea9a71a/analysis/1489658266/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4ec-7f6c-41b6-acf8-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:44.000Z",
"modified": "2017-03-23T16:16:44.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: ad3af8a7ab469fa930d0873475214c3160f52b17c06f296d6ce9cc6fc92e8a79",
"pattern": "[file:hashes.SHA1 = '91b157648296683f50551f60c6653ebb452f902b']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:16:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4ed-5990-40e4-a4eb-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:45.000Z",
"modified": "2017-03-23T16:16:45.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: ad3af8a7ab469fa930d0873475214c3160f52b17c06f296d6ce9cc6fc92e8a79",
"pattern": "[file:hashes.MD5 = 'abf4e672f6c7f353f6a0ca0a6c9e23b9']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:16:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58d3f4ee-ef48-4469-b86b-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:46.000Z",
"modified": "2017-03-23T16:16:46.000Z",
"first_observed": "2017-03-23T16:16:46Z",
"last_observed": "2017-03-23T16:16:46Z",
"number_observed": 1,
"object_refs": [
"url--58d3f4ee-ef48-4469-b86b-9f0702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58d3f4ee-ef48-4469-b86b-9f0702de0b81",
"value": "https://www.virustotal.com/file/ad3af8a7ab469fa930d0873475214c3160f52b17c06f296d6ce9cc6fc92e8a79/analysis/1489568479/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4ef-0ea0-4202-ae79-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:47.000Z",
"modified": "2017-03-23T16:16:47.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 7aa0abedd75c46680ac65814d9433a04bb9f6bc6f094d66cc33a918f32dcb2fa",
"pattern": "[file:hashes.SHA1 = 'fd2eb0321699cf9b46ad8ace68beb4247f1bd9bb']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:16:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4f0-39c4-4a31-bfd1-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:48.000Z",
"modified": "2017-03-23T16:16:48.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 7aa0abedd75c46680ac65814d9433a04bb9f6bc6f094d66cc33a918f32dcb2fa",
"pattern": "[file:hashes.MD5 = '9f8144db1ffecbcc7c69bae783d85d9d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:16:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58d3f4f1-139c-435a-8449-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:49.000Z",
"modified": "2017-03-23T16:16:49.000Z",
"first_observed": "2017-03-23T16:16:49Z",
"last_observed": "2017-03-23T16:16:49Z",
"number_observed": 1,
"object_refs": [
"url--58d3f4f1-139c-435a-8449-9f0702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58d3f4f1-139c-435a-8449-9f0702de0b81",
"value": "https://www.virustotal.com/file/7aa0abedd75c46680ac65814d9433a04bb9f6bc6f094d66cc33a918f32dcb2fa/analysis/1489645405/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4f2-10ec-4801-b454-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:50.000Z",
"modified": "2017-03-23T16:16:50.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 59011fa80db84cea54bc6ec7f7bc689d916f04e8df9950b259ad524142225731",
"pattern": "[file:hashes.SHA1 = '6180bb93948116371cd0a060ec11186fb4845595']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:16:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4f3-7c50-4e58-b7b8-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:51.000Z",
"modified": "2017-03-23T16:16:51.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 59011fa80db84cea54bc6ec7f7bc689d916f04e8df9950b259ad524142225731",
"pattern": "[file:hashes.MD5 = '1b187f7e1eb6c256f6c7e00ae387a478']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:16:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58d3f4f3-64f4-4432-b3f2-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:51.000Z",
"modified": "2017-03-23T16:16:51.000Z",
"first_observed": "2017-03-23T16:16:51Z",
"last_observed": "2017-03-23T16:16:51Z",
"number_observed": 1,
"object_refs": [
"url--58d3f4f3-64f4-4432-b3f2-9f0702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58d3f4f3-64f4-4432-b3f2-9f0702de0b81",
"value": "https://www.virustotal.com/file/59011fa80db84cea54bc6ec7f7bc689d916f04e8df9950b259ad524142225731/analysis/1490158625/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4f4-ce20-4e35-8a8a-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:52.000Z",
"modified": "2017-03-23T16:16:52.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: dd783bcdbc81bc605cf07545a01273596d4e51b198874253815069cd6708b2fa",
"pattern": "[file:hashes.SHA1 = 'a9b7cc4a0f3f043b0775d53a60b45ed34d5144d0']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:16:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4f5-a34c-4abe-b6b1-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:53.000Z",
"modified": "2017-03-23T16:16:53.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: dd783bcdbc81bc605cf07545a01273596d4e51b198874253815069cd6708b2fa",
"pattern": "[file:hashes.MD5 = '0eae6cd107eef9b21b009dbf8f1991a6']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:16:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58d3f4f6-d2e4-4f6c-b80a-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:54.000Z",
"modified": "2017-03-23T16:16:54.000Z",
"first_observed": "2017-03-23T16:16:54Z",
"last_observed": "2017-03-23T16:16:54Z",
"number_observed": 1,
"object_refs": [
"url--58d3f4f6-d2e4-4f6c-b80a-9f0702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58d3f4f6-d2e4-4f6c-b80a-9f0702de0b81",
"value": "https://www.virustotal.com/file/dd783bcdbc81bc605cf07545a01273596d4e51b198874253815069cd6708b2fa/analysis/1487997184/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4f7-ded4-4b80-b9bd-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:55.000Z",
"modified": "2017-03-23T16:16:55.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 9f48ce01ac99033c03e9aa983c09fa273eae0e168e55de8cc364311ae4fc88b9",
"pattern": "[file:hashes.SHA1 = '6f7d89a5014f839457b59e1fcf3849d57df4d34f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:16:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4f8-295c-4535-b5ba-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:56.000Z",
"modified": "2017-03-23T16:16:56.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 9f48ce01ac99033c03e9aa983c09fa273eae0e168e55de8cc364311ae4fc88b9",
"pattern": "[file:hashes.MD5 = '79f72ea2fee5d8c5e488a20f188d9e3d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:16:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58d3f4f9-6a74-491b-b612-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:57.000Z",
"modified": "2017-03-23T16:16:57.000Z",
"first_observed": "2017-03-23T16:16:57Z",
"last_observed": "2017-03-23T16:16:57Z",
"number_observed": 1,
"object_refs": [
"url--58d3f4f9-6a74-491b-b612-9f0702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58d3f4f9-6a74-491b-b612-9f0702de0b81",
"value": "https://www.virustotal.com/file/9f48ce01ac99033c03e9aa983c09fa273eae0e168e55de8cc364311ae4fc88b9/analysis/1487844739/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4fa-d49c-4cf7-a12c-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:58.000Z",
"modified": "2017-03-23T16:16:58.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 629d1afbedd7cc082549d5c3fc3926b6b4e55abc3c07f8d994a791893a2fd530",
"pattern": "[file:hashes.SHA1 = 'fd86a08c0705b06fe4d2a16090af943ea4139a95']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:16:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4fb-940c-43f8-a8d0-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:16:59.000Z",
"modified": "2017-03-23T16:16:59.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 629d1afbedd7cc082549d5c3fc3926b6b4e55abc3c07f8d994a791893a2fd530",
"pattern": "[file:hashes.MD5 = '1bc15ec752aedd92a46534362f6c0e82']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:16:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58d3f4fc-2318-4024-8936-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:17:00.000Z",
"modified": "2017-03-23T16:17:00.000Z",
"first_observed": "2017-03-23T16:17:00Z",
"last_observed": "2017-03-23T16:17:00Z",
"number_observed": 1,
"object_refs": [
"url--58d3f4fc-2318-4024-8936-9f0702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58d3f4fc-2318-4024-8936-9f0702de0b81",
"value": "https://www.virustotal.com/file/629d1afbedd7cc082549d5c3fc3926b6b4e55abc3c07f8d994a791893a2fd530/analysis/1487910889/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4fc-71d4-4903-b449-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:17:00.000Z",
"modified": "2017-03-23T16:17:00.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: b330fadeb337e9fb5aa9f8046462e3d1d418946fd6237bc252a80a2d4fb2fff7",
"pattern": "[file:hashes.SHA1 = 'd2cd8cb500e9baae94c2df1e9a3bdf4c1c42ba1d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:17:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4fd-f1b8-4e6a-9127-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:17:01.000Z",
"modified": "2017-03-23T16:17:01.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: b330fadeb337e9fb5aa9f8046462e3d1d418946fd6237bc252a80a2d4fb2fff7",
"pattern": "[file:hashes.MD5 = 'ad311fbba70dd1fdc5b069f57b6afe5e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:17:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58d3f4fe-3c20-47e9-84f6-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:17:02.000Z",
"modified": "2017-03-23T16:17:02.000Z",
"first_observed": "2017-03-23T16:17:02Z",
"last_observed": "2017-03-23T16:17:02Z",
"number_observed": 1,
"object_refs": [
"url--58d3f4fe-3c20-47e9-84f6-9f0702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58d3f4fe-3c20-47e9-84f6-9f0702de0b81",
"value": "https://www.virustotal.com/file/b330fadeb337e9fb5aa9f8046462e3d1d418946fd6237bc252a80a2d4fb2fff7/analysis/1487717141/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f4ff-a5e0-4591-a3aa-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:17:03.000Z",
"modified": "2017-03-23T16:17:03.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: cd16e420fbc39b63de93198cdb1265c1bfe83119c7d4d75d5501465cdd0847f1",
"pattern": "[file:hashes.SHA1 = '19013eb9d291e421261473ca5d1fa166ff92554d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:17:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f501-5324-4530-9b4e-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:17:05.000Z",
"modified": "2017-03-23T16:17:05.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: cd16e420fbc39b63de93198cdb1265c1bfe83119c7d4d75d5501465cdd0847f1",
"pattern": "[file:hashes.MD5 = '24681993ce5ae4126905dd051fb29caa']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:17:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58d3f501-ccc0-4b1a-b1e1-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:17:05.000Z",
"modified": "2017-03-23T16:17:05.000Z",
"first_observed": "2017-03-23T16:17:05Z",
"last_observed": "2017-03-23T16:17:05Z",
"number_observed": 1,
"object_refs": [
"url--58d3f501-ccc0-4b1a-b1e1-9f0702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58d3f501-ccc0-4b1a-b1e1-9f0702de0b81",
"value": "https://www.virustotal.com/file/cd16e420fbc39b63de93198cdb1265c1bfe83119c7d4d75d5501465cdd0847f1/analysis/1489124421/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f502-0cac-478f-8b4f-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:17:06.000Z",
"modified": "2017-03-23T16:17:06.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: be81741ae3c7c2c5000785a2573c901068a2906054690ac22119ac794aa9e8e2",
"pattern": "[file:hashes.SHA1 = '37bc0b13f3d040a071cc0a7a119c65a0709a8258']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:17:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f503-e688-4a36-8c4d-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:17:07.000Z",
"modified": "2017-03-23T16:17:07.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: be81741ae3c7c2c5000785a2573c901068a2906054690ac22119ac794aa9e8e2",
"pattern": "[file:hashes.MD5 = '4dd24284c7e6d95d58f5b7a8004b23ce']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:17:07Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58d3f504-b188-4f0b-9c62-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:17:08.000Z",
"modified": "2017-03-23T16:17:08.000Z",
"first_observed": "2017-03-23T16:17:08Z",
"last_observed": "2017-03-23T16:17:08Z",
"number_observed": 1,
"object_refs": [
"url--58d3f504-b188-4f0b-9c62-9f0702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58d3f504-b188-4f0b-9c62-9f0702de0b81",
"value": "https://www.virustotal.com/file/be81741ae3c7c2c5000785a2573c901068a2906054690ac22119ac794aa9e8e2/analysis/1489638430/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f505-2ad4-47e3-b8a3-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:17:09.000Z",
"modified": "2017-03-23T16:17:09.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: f07f87ab68482d329eeac5525ea5f189bcd720d2b2d149db61ab81ae04be957a",
"pattern": "[file:hashes.SHA1 = '3141e21f51171c12d2ffb5cf3d913b2ddd8fab14']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:17:09Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f506-1874-4fc6-84ab-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:17:10.000Z",
"modified": "2017-03-23T16:17:10.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: f07f87ab68482d329eeac5525ea5f189bcd720d2b2d149db61ab81ae04be957a",
"pattern": "[file:hashes.MD5 = '7fde245137e0ed3a335a4c3086e0911e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:17:10Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58d3f507-5540-4cb3-8caa-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:17:11.000Z",
"modified": "2017-03-23T16:17:11.000Z",
"first_observed": "2017-03-23T16:17:11Z",
"last_observed": "2017-03-23T16:17:11Z",
"number_observed": 1,
"object_refs": [
"url--58d3f507-5540-4cb3-8caa-9f0702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58d3f507-5540-4cb3-8caa-9f0702de0b81",
"value": "https://www.virustotal.com/file/f07f87ab68482d329eeac5525ea5f189bcd720d2b2d149db61ab81ae04be957a/analysis/1486655768/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f508-819c-4057-bcae-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:17:12.000Z",
"modified": "2017-03-23T16:17:12.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 41c4483cfcc0b5a10504aa137ec3824d139663b7ec318d5e1fb6c9f5db8af8f9",
"pattern": "[file:hashes.SHA1 = '6bfc8580d74920f484441b7146ca31b26ae494f8']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:17:12Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f509-5704-4fc4-9282-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:17:13.000Z",
"modified": "2017-03-23T16:17:13.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 41c4483cfcc0b5a10504aa137ec3824d139663b7ec318d5e1fb6c9f5db8af8f9",
"pattern": "[file:hashes.MD5 = 'bfa4002b794ab5900866d10fc44997f8']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:17:13Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58d3f509-33c8-4d34-91d4-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:17:13.000Z",
"modified": "2017-03-23T16:17:13.000Z",
"first_observed": "2017-03-23T16:17:13Z",
"last_observed": "2017-03-23T16:17:13Z",
"number_observed": 1,
"object_refs": [
"url--58d3f509-33c8-4d34-91d4-9f0702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58d3f509-33c8-4d34-91d4-9f0702de0b81",
"value": "https://www.virustotal.com/file/41c4483cfcc0b5a10504aa137ec3824d139663b7ec318d5e1fb6c9f5db8af8f9/analysis/1490279633/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f50a-058c-45da-9e00-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:17:14.000Z",
"modified": "2017-03-23T16:17:14.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: b1da2cb4fcee52cdc94c06325c339ac11a3fb1e399e1ed5a2a55107f5f64867f",
"pattern": "[file:hashes.SHA1 = '28651d200780f28b1289f41ac0aab5619cdbb090']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:17:14Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f50b-81e8-4afc-8781-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:17:15.000Z",
"modified": "2017-03-23T16:17:15.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: b1da2cb4fcee52cdc94c06325c339ac11a3fb1e399e1ed5a2a55107f5f64867f",
"pattern": "[file:hashes.MD5 = 'f7b6f70ba69fbfce3d5670f3bcc3f13d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:17:15Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58d3f50c-75c4-4850-87d5-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:17:16.000Z",
"modified": "2017-03-23T16:17:16.000Z",
"first_observed": "2017-03-23T16:17:16Z",
"last_observed": "2017-03-23T16:17:16Z",
"number_observed": 1,
"object_refs": [
"url--58d3f50c-75c4-4850-87d5-9f0702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58d3f50c-75c4-4850-87d5-9f0702de0b81",
"value": "https://www.virustotal.com/file/b1da2cb4fcee52cdc94c06325c339ac11a3fb1e399e1ed5a2a55107f5f64867f/analysis/1490174190/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f50d-1954-46db-8799-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:17:17.000Z",
"modified": "2017-03-23T16:17:17.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 4f2c10b64d4f4b56d56b5a271331c92484b6ddf8c4eb9f56669ed60545a4c06d",
"pattern": "[file:hashes.SHA1 = 'b535f6fdcb4ca3da7fb6a28677fe7430ca6b8089']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:17:17Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f50e-d3b8-4dd0-b191-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:17:18.000Z",
"modified": "2017-03-23T16:17:18.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 4f2c10b64d4f4b56d56b5a271331c92484b6ddf8c4eb9f56669ed60545a4c06d",
"pattern": "[file:hashes.MD5 = '46e5de82b73e15609028e11c38918ed9']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:17:18Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58d3f50f-9e10-4588-956b-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:17:19.000Z",
"modified": "2017-03-23T16:17:19.000Z",
"first_observed": "2017-03-23T16:17:19Z",
"last_observed": "2017-03-23T16:17:19Z",
"number_observed": 1,
"object_refs": [
"url--58d3f50f-9e10-4588-956b-9f0702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58d3f50f-9e10-4588-956b-9f0702de0b81",
"value": "https://www.virustotal.com/file/4f2c10b64d4f4b56d56b5a271331c92484b6ddf8c4eb9f56669ed60545a4c06d/analysis/1490244732/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f510-2d88-45fc-8e3c-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:17:20.000Z",
"modified": "2017-03-23T16:17:20.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 1ae6aa92ce8ee9a2ab78631663fa5a9bdcc14490c4c5fe799b41d26455b5b696",
"pattern": "[file:hashes.SHA1 = 'ea1f99b2bd8eae0d7dd35f78013cfe9ec8aa2be1']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:17:20Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f511-233c-45a7-8baa-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:17:21.000Z",
"modified": "2017-03-23T16:17:21.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 1ae6aa92ce8ee9a2ab78631663fa5a9bdcc14490c4c5fe799b41d26455b5b696",
"pattern": "[file:hashes.MD5 = 'e93338fb2a8653089b236a3c051b5c21']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:17:21Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58d3f511-5498-4ea5-ab36-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:17:21.000Z",
"modified": "2017-03-23T16:17:21.000Z",
"first_observed": "2017-03-23T16:17:21Z",
"last_observed": "2017-03-23T16:17:21Z",
"number_observed": 1,
"object_refs": [
"url--58d3f511-5498-4ea5-ab36-9f0702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58d3f511-5498-4ea5-ab36-9f0702de0b81",
"value": "https://www.virustotal.com/file/1ae6aa92ce8ee9a2ab78631663fa5a9bdcc14490c4c5fe799b41d26455b5b696/analysis/1489752442/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f512-ece8-4295-a27c-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:17:22.000Z",
"modified": "2017-03-23T16:17:22.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 14a6e04a60b1bb5f4d0fb3fffa240b7b34bf9c0b8504da19caeb31182510c139",
"pattern": "[file:hashes.SHA1 = '059f7a95d4621a0a2370f14617e75cbb673e0fb9']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:17:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f513-7240-4980-b6f8-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:17:23.000Z",
"modified": "2017-03-23T16:17:23.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 14a6e04a60b1bb5f4d0fb3fffa240b7b34bf9c0b8504da19caeb31182510c139",
"pattern": "[file:hashes.MD5 = 'fe16d984a645b66f50b204b5de79590e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:17:23Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58d3f514-d40c-4065-b661-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:17:24.000Z",
"modified": "2017-03-23T16:17:24.000Z",
"first_observed": "2017-03-23T16:17:24Z",
"last_observed": "2017-03-23T16:17:24Z",
"number_observed": 1,
"object_refs": [
"url--58d3f514-d40c-4065-b661-9f0702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58d3f514-d40c-4065-b661-9f0702de0b81",
"value": "https://www.virustotal.com/file/14a6e04a60b1bb5f4d0fb3fffa240b7b34bf9c0b8504da19caeb31182510c139/analysis/1487931142/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f515-e7c0-45bc-91c2-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:17:25.000Z",
"modified": "2017-03-23T16:17:25.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 7b684ad97bb9f5093e5cfb100352ad2f0ec3dfce63232207daf0aa736d6438c9",
"pattern": "[file:hashes.SHA1 = 'e0c7dc12e146b5ffc948cb913599817e1c50796e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:17:25Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f516-836c-442c-a32f-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:17:26.000Z",
"modified": "2017-03-23T16:17:26.000Z",
"description": "malicious samples with similar malformations of the RTF file format: - Xchecked via VT: 7b684ad97bb9f5093e5cfb100352ad2f0ec3dfce63232207daf0aa736d6438c9",
"pattern": "[file:hashes.MD5 = 'ce4a4bccdad5b85ea2138893c9070232']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:17:26Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58d3f517-1164-4ebb-b531-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:17:27.000Z",
"modified": "2017-03-23T16:17:27.000Z",
"first_observed": "2017-03-23T16:17:27Z",
"last_observed": "2017-03-23T16:17:27Z",
"number_observed": 1,
"object_refs": [
"url--58d3f517-1164-4ebb-b531-9f0702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58d3f517-1164-4ebb-b531-9f0702de0b81",
"value": "https://www.virustotal.com/file/7b684ad97bb9f5093e5cfb100352ad2f0ec3dfce63232207daf0aa736d6438c9/analysis/1486619722/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f518-ae40-4b54-8a05-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:17:28.000Z",
"modified": "2017-03-23T16:17:28.000Z",
"description": "dropped executables - Xchecked via VT: a3c3abcd461d00e1f928e375770e39e3a33f719d7287a2fee661d82ce8de1c56",
"pattern": "[file:hashes.SHA1 = '942c04608285c4540def1704961a906f86df04ee']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:17:28Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f519-f824-448b-bfbf-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:17:29.000Z",
"modified": "2017-03-23T16:17:29.000Z",
"description": "dropped executables - Xchecked via VT: a3c3abcd461d00e1f928e375770e39e3a33f719d7287a2fee661d82ce8de1c56",
"pattern": "[file:hashes.MD5 = '77c1e477fd120dd7cd8093d9eb355a46']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:17:29Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58d3f519-8b20-4235-ae02-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:17:29.000Z",
"modified": "2017-03-23T16:17:29.000Z",
"first_observed": "2017-03-23T16:17:29Z",
"last_observed": "2017-03-23T16:17:29Z",
"number_observed": 1,
"object_refs": [
"url--58d3f519-8b20-4235-ae02-9f0702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58d3f519-8b20-4235-ae02-9f0702de0b81",
"value": "https://www.virustotal.com/file/a3c3abcd461d00e1f928e375770e39e3a33f719d7287a2fee661d82ce8de1c56/analysis/1489664454/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f51a-de34-4885-885f-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:17:30.000Z",
"modified": "2017-03-23T16:17:30.000Z",
"description": "dropped executables - Xchecked via VT: da1a6747a3329c3a317d4bd7ecf029e89bd76192075f84834563103a54bac968",
"pattern": "[file:hashes.SHA1 = '5d1862dc83c051b255ebdc238eab861466c48680']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:17:30Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58d3f51b-6944-4b48-99ea-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:17:31.000Z",
"modified": "2017-03-23T16:17:31.000Z",
"description": "dropped executables - Xchecked via VT: da1a6747a3329c3a317d4bd7ecf029e89bd76192075f84834563103a54bac968",
"pattern": "[file:hashes.MD5 = 'efcc5cfb3e0c1a52889642c5d02aa301']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-23T16:17:31Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58d3f51c-7490-49b5-9a64-9f0702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-23T16:17:32.000Z",
"modified": "2017-03-23T16:17:32.000Z",
"first_observed": "2017-03-23T16:17:32Z",
"last_observed": "2017-03-23T16:17:32Z",
"number_observed": 1,
"object_refs": [
"url--58d3f51c-7490-49b5-9a64-9f0702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58d3f51c-7490-49b5-9a64-9f0702de0b81",
"value": "https://www.virustotal.com/file/da1a6747a3329c3a317d4bd7ecf029e89bd76192075f84834563103a54bac968/analysis/1489664348/"
},
{
"type": "marking-definition",
"spec_version": "2.1",
"id": "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9",
"created": "2017-01-20T00:00:00.000Z",
"definition_type": "tlp",
"name": "TLP:WHITE",
"definition": {
"tlp": "white"
}
}
]
}