pymisp 2.5.3__py3-none-any.whl → 2.5.7__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of pymisp might be problematic. Click here for more details.

Files changed (162) hide show
  1. CHANGELOG.txt +5380 -0
  2. examples/__init__.py +0 -0
  3. examples/add_attributes_from_csv.py +74 -0
  4. examples/add_email_object.py +29 -0
  5. examples/add_fail2ban_object.py +86 -0
  6. examples/add_feed.py +25 -0
  7. examples/add_file_object.py +47 -0
  8. examples/add_filetype_object_from_csv.py +53 -0
  9. examples/add_generic_object.py +26 -0
  10. examples/add_github_user.py +65 -0
  11. examples/add_gitlab_user.py +56 -0
  12. examples/add_named_attribute.py +25 -0
  13. examples/add_organisations.py +57 -0
  14. examples/add_ssh_authorized_keys.py +29 -0
  15. examples/add_user.py +22 -0
  16. examples/add_vehicle_object.py +22 -0
  17. examples/addtag2.py +45 -0
  18. examples/asciidoc_generator.py +114 -0
  19. examples/cache_all.py +10 -0
  20. examples/copyTagsFromAttributesToEvent.py +68 -0
  21. examples/copy_list.py +93 -0
  22. examples/create_events.py +26 -0
  23. examples/cytomic_orion.py +549 -0
  24. examples/del.py +22 -0
  25. examples/delete_user.py +16 -0
  26. examples/edit_organisation.py +20 -0
  27. examples/edit_user.py +20 -0
  28. examples/falsepositive_disabletoids.py +136 -0
  29. examples/fetch_events_feed.py +15 -0
  30. examples/fetch_warninglist_hits.py +38 -0
  31. examples/freetext.py +22 -0
  32. examples/generate_file_objects.py +78 -0
  33. examples/generate_meta_feed.py +15 -0
  34. examples/get.py +37 -0
  35. examples/get_csv.py +37 -0
  36. examples/get_network_activity.py +187 -0
  37. examples/last.py +48 -0
  38. examples/load_csv.py +94 -0
  39. examples/lookup.py +28 -0
  40. examples/misp2cef.py +71 -0
  41. examples/misp2clamav.py +52 -0
  42. examples/openioc_to_misp.py +27 -0
  43. examples/proofpoint_tap.py +203 -0
  44. examples/proofpoint_vap.py +65 -0
  45. examples/search.py +48 -0
  46. examples/search_attributes_yara.py +40 -0
  47. examples/search_sighting.py +42 -0
  48. examples/server_sync_check_conn.py +32 -0
  49. examples/sharing_groups.py +15 -0
  50. examples/show_sightings.py +168 -0
  51. examples/stats_report.py +405 -0
  52. examples/sync_sighting.py +171 -0
  53. examples/tags.py +25 -0
  54. examples/test_sign.py +19 -0
  55. examples/trustar_misp.py +59 -0
  56. examples/up.py +21 -0
  57. examples/upload.py +60 -0
  58. examples/users_list.py +15 -0
  59. examples/vmray_automation.py +281 -0
  60. examples/vt_to_misp.py +182 -0
  61. examples/warninglists.py +22 -0
  62. examples/yara.py +38 -0
  63. examples/yara_dump.py +98 -0
  64. pymisp/api.py +33 -5
  65. pymisp/data/misp-objects/objects/android-app/definition.json +8 -2
  66. pymisp/data/misp-objects/objects/instagram-account/definition.json +66 -0
  67. pymisp/data/misp-objects/objects/lnk/definition.json +13 -1
  68. pymisp/data/misp-objects/objects/rmm/definition.json +88 -0
  69. pymisp/data/misp-objects/objects/spambee-report/definition.json +54 -0
  70. pymisp/data/misp-objects/objects/target-system/definition.json +2 -2
  71. pymisp/data/misp-objects/objects/vulnerability/definition.json +5 -4
  72. pymisp/data/misp-objects/relationships/definition.json +17 -1
  73. pymisp/data/misp-objects/schema_objects.json +1 -1
  74. pymisp/mispevent.py +95 -23
  75. {pymisp-2.5.3.dist-info → pymisp-2.5.7.dist-info}/METADATA +23 -28
  76. {pymisp-2.5.3.dist-info → pymisp-2.5.7.dist-info}/RECORD +144 -30
  77. {pymisp-2.5.3.dist-info → pymisp-2.5.7.dist-info}/WHEEL +1 -1
  78. tests/57c4445b-c548-4654-af0b-4be3950d210f.json +1 -0
  79. tests/__init__.py +0 -0
  80. tests/csv_testfiles/invalid_fieldnames.csv +11 -0
  81. tests/csv_testfiles/valid_fieldnames.csv +4 -0
  82. tests/email_testfiles/mail_1.eml.zip +0 -0
  83. tests/email_testfiles/mail_1.msg +0 -0
  84. tests/email_testfiles/mail_1_bom.eml +858 -0
  85. tests/email_testfiles/mail_1_headers_only.eml +28 -0
  86. tests/email_testfiles/mail_2.eml +32 -0
  87. tests/email_testfiles/mail_3.eml +170 -0
  88. tests/email_testfiles/mail_3.msg +0 -0
  89. tests/email_testfiles/mail_4.msg +0 -0
  90. tests/email_testfiles/mail_5.msg +0 -0
  91. tests/email_testfiles/mail_multiple_to.eml +15 -0
  92. tests/email_testfiles/source +1 -0
  93. tests/git-vuln-finder-quagga.json +1493 -0
  94. tests/misp_event.json +76 -0
  95. tests/mispevent_testfiles/attribute.json +21 -0
  96. tests/mispevent_testfiles/attribute_del.json +23 -0
  97. tests/mispevent_testfiles/def_param.json +53 -0
  98. tests/mispevent_testfiles/event.json +8 -0
  99. tests/mispevent_testfiles/event_obj_attr_tag.json +57 -0
  100. tests/mispevent_testfiles/event_obj_def_param.json +62 -0
  101. tests/mispevent_testfiles/event_obj_tag.json +29 -0
  102. tests/mispevent_testfiles/event_tags.json +18 -0
  103. tests/mispevent_testfiles/existing_event.json +4599 -0
  104. tests/mispevent_testfiles/existing_event_edited.json +4601 -0
  105. tests/mispevent_testfiles/galaxy.json +25 -0
  106. tests/mispevent_testfiles/malware.json +19 -0
  107. tests/mispevent_testfiles/malware_exist.json +163 -0
  108. tests/mispevent_testfiles/misp_custom_obj.json +38 -0
  109. tests/mispevent_testfiles/overwrite_file/definition.json +457 -0
  110. tests/mispevent_testfiles/proposals.json +35 -0
  111. tests/mispevent_testfiles/shadow.json +148 -0
  112. tests/mispevent_testfiles/sighting.json +5 -0
  113. tests/mispevent_testfiles/simple.json +2 -0
  114. tests/mispevent_testfiles/test_object_template/definition.json +29 -0
  115. tests/new_misp_event.json +34 -0
  116. tests/reportlab_testfiles/HTML_event.json +1 -0
  117. tests/reportlab_testfiles/galaxy_1.json +1250 -0
  118. tests/reportlab_testfiles/image_event.json +2490 -0
  119. tests/reportlab_testfiles/japanese_test.json +156 -0
  120. tests/reportlab_testfiles/japanese_test_heavy.json +318 -0
  121. tests/reportlab_testfiles/long_event.json +3730 -0
  122. tests/reportlab_testfiles/mainly_objects_1.json +1092 -0
  123. tests/reportlab_testfiles/mainly_objects_2.json +977 -0
  124. tests/reportlab_testfiles/sighting_1.json +305 -0
  125. tests/reportlab_testfiles/sighting_2.json +221 -0
  126. tests/reportlab_testfiles/to_delete1.json +804 -0
  127. tests/reportlab_testfiles/to_delete2.json +1 -0
  128. tests/reportlab_testfiles/to_delete3.json +1 -0
  129. tests/reportlab_testfiles/very_long_event.json +1006 -0
  130. tests/reportlab_testoutputs/to_delete1.json.pdf +391 -0
  131. tests/reportlab_testoutputs/to_delete2.json.pdf +506 -0
  132. tests/reportlab_testoutputs/to_delete3.json.pdf +277 -0
  133. tests/search_index_result.json +69 -0
  134. tests/sharing_groups.json +98 -0
  135. tests/stix1.xml-utf8 +110 -0
  136. tests/stix2.json +1 -0
  137. tests/test_analyst_data.py +123 -0
  138. tests/test_emailobject.py +157 -0
  139. tests/test_fileobject.py +20 -0
  140. tests/test_mispevent.py +473 -0
  141. tests/test_reportlab.py +431 -0
  142. tests/testlive_comprehensive.py +3734 -0
  143. tests/testlive_sync.py +474 -0
  144. pymisp/data/misp-objects/.git +0 -1
  145. pymisp/data/misp-objects/.gitchangelog.rc +0 -289
  146. pymisp/data/misp-objects/.github/workflows/codeql.yml +0 -41
  147. pymisp/data/misp-objects/.github/workflows/nosetests.yml +0 -39
  148. pymisp/data/misp-objects/.travis.yml +0 -16
  149. pymisp/data/misp-objects/LICENSE-software-only.md +0 -661
  150. pymisp/data/misp-objects/LICENSE.md +0 -36
  151. pymisp/data/misp-objects/README.md +0 -566
  152. pymisp/data/misp-objects/docs/time-related-objects.ods +0 -0
  153. pymisp/data/misp-objects/docs/time-related-objects.pdf +0 -0
  154. pymisp/data/misp-objects/jq_all_the_things.sh +0 -29
  155. pymisp/data/misp-objects/tools/adoc_objects.py +0 -145
  156. pymisp/data/misp-objects/tools/alfred_links_to_relarelationships.py +0 -48
  157. pymisp/data/misp-objects/tools/list_of_objects.py +0 -50
  158. pymisp/data/misp-objects/tools/updated.sh +0 -6
  159. pymisp/data/misp-objects/tools/validate_opposites.sh +0 -17
  160. pymisp/data/misp-objects/unique_uuid.py +0 -16
  161. pymisp/data/misp-objects/validate_all.sh +0 -38
  162. {pymisp-2.5.3.dist-info → pymisp-2.5.7.dist-info}/LICENSE +0 -0
@@ -0,0 +1,804 @@
1
+ {
2
+ "Event": {
3
+ "info": "OSINT - New Malware with Ties to SunOrcal Discovered",
4
+ "publish_timestamp": "1518455494",
5
+ "timestamp": "1510922435",
6
+ "analysis": "2",
7
+ "Attribute": [
8
+ {
9
+ "comment": "",
10
+ "category": "External analysis",
11
+ "uuid": "5a0a9ade-3b60-4fbb-87d2-4628950d210f",
12
+ "timestamp": "1510922426",
13
+ "to_ids": false,
14
+ "value": "https://researchcenter.paloaltonetworks.com/2017/11/unit42-new-malware-with-ties-to-sunorcal-discovered/",
15
+ "Tag": [
16
+ {
17
+ "colour": "#00223b",
18
+ "exportable": true,
19
+ "name": "osint:source-type=\"blog-post\""
20
+ }
21
+ ],
22
+ "object_relation": null,
23
+ "type": "link"
24
+ },
25
+ {
26
+ "comment": "",
27
+ "category": "External analysis",
28
+ "uuid": "5a0a9af4-0d1c-4ae0-8903-45c4950d210f",
29
+ "timestamp": "1510922426",
30
+ "to_ids": false,
31
+ "value": "Unit 42 has discovered a new malware family we\u2019ve named \u201cReaver\u201d with ties to attackers who use SunOrcal malware. SunOrcal activity has been documented to at least 2013, and based on metadata surrounding some of the C2s, may have been active as early as 2010. The new family appears to have been in the wild since late 2016 and to date we have only identified 10 unique samples, indicating it may be sparingly used. Reaver is also somewhat unique in the fact that its final payload is in the form of a Control panel item, or CPL file. To date, only 0.006% of all malware seen by Palo Alto Networks employs this technique, indicating that it is in fact fairly rare.",
32
+ "Tag": [
33
+ {
34
+ "colour": "#00223b",
35
+ "exportable": true,
36
+ "name": "osint:source-type=\"blog-post\""
37
+ }
38
+ ],
39
+ "object_relation": null,
40
+ "type": "comment"
41
+ },
42
+ {
43
+ "comment": "",
44
+ "category": "Persistence mechanism",
45
+ "uuid": "5a0a9d47-1c7c-4353-8523-440b950d210f",
46
+ "timestamp": "1510922426",
47
+ "to_ids": false,
48
+ "value": "%COMMONPROGRAMFILES%\\services\\",
49
+ "object_relation": null,
50
+ "type": "regkey"
51
+ },
52
+ {
53
+ "comment": "",
54
+ "category": "Persistence mechanism",
55
+ "uuid": "5a0a9d47-808c-4833-b739-43bf950d210f",
56
+ "timestamp": "1510922426",
57
+ "to_ids": false,
58
+ "value": "%APPDATA%\\microsoft\\mmc\\",
59
+ "object_relation": null,
60
+ "type": "regkey"
61
+ },
62
+ {
63
+ "comment": "",
64
+ "category": "Persistence mechanism",
65
+ "uuid": "5a0a9d47-91e0-4fea-8a8d-48ce950d210f",
66
+ "timestamp": "1510922426",
67
+ "to_ids": false,
68
+ "value": "HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Shell Folders\\Common Startup",
69
+ "object_relation": null,
70
+ "type": "regkey"
71
+ },
72
+ {
73
+ "comment": "",
74
+ "category": "Persistence mechanism",
75
+ "uuid": "5a0a9d47-0d2c-4f98-9913-4ea3950d210f",
76
+ "timestamp": "1510922426",
77
+ "to_ids": false,
78
+ "value": "HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Shell Folders\\Startup",
79
+ "object_relation": null,
80
+ "type": "regkey"
81
+ },
82
+ {
83
+ "comment": "",
84
+ "category": "Payload delivery",
85
+ "uuid": "5a0a9d47-a0a4-4f6b-bd53-42b4950d210f",
86
+ "timestamp": "1510922426",
87
+ "to_ids": true,
88
+ "value": "\u2018%TEMP%\\~WUpdate.lnk",
89
+ "object_relation": null,
90
+ "type": "filename"
91
+ },
92
+ {
93
+ "comment": "",
94
+ "category": "Payload delivery",
95
+ "uuid": "5a0a9d96-48d4-4538-b643-4c26950d210f",
96
+ "timestamp": "1510922426",
97
+ "to_ids": true,
98
+ "value": "%TEMP%\\~Update.lnk",
99
+ "object_relation": null,
100
+ "type": "filename"
101
+ },
102
+ {
103
+ "comment": "",
104
+ "category": "Persistence mechanism",
105
+ "uuid": "5a0a9d96-d87c-4b6f-b3a6-4eea950d210f",
106
+ "timestamp": "1510922426",
107
+ "to_ids": false,
108
+ "value": "%APPDATA%\\microsoft\\credentials\\",
109
+ "object_relation": null,
110
+ "type": "regkey"
111
+ },
112
+ {
113
+ "comment": "",
114
+ "category": "Payload delivery",
115
+ "uuid": "5a0a9d96-83dc-4a40-90fe-46d9950d210f",
116
+ "timestamp": "1510922426",
117
+ "to_ids": true,
118
+ "value": "%TEMP%\\winhelp.dat",
119
+ "object_relation": null,
120
+ "type": "filename"
121
+ },
122
+ {
123
+ "comment": "",
124
+ "category": "Payload delivery",
125
+ "uuid": "5a0a9d96-cc18-491c-b16b-4ffe950d210f",
126
+ "timestamp": "1510922426",
127
+ "to_ids": true,
128
+ "value": "[path_previously_identified]\\winhelp.cpl",
129
+ "object_relation": null,
130
+ "type": "filename"
131
+ },
132
+ {
133
+ "comment": "C2",
134
+ "category": "Network activity",
135
+ "uuid": "5a0a9e4c-1c14-49c0-bee2-4f7d950d210f",
136
+ "timestamp": "1510922426",
137
+ "to_ids": true,
138
+ "value": "www.fyoutside.com",
139
+ "object_relation": null,
140
+ "type": "hostname"
141
+ },
142
+ {
143
+ "comment": "C2",
144
+ "category": "Network activity",
145
+ "uuid": "5a0a9e4c-ab08-47f8-991f-471c950d210f",
146
+ "timestamp": "1510922426",
147
+ "to_ids": true,
148
+ "value": "www.tashdqdxp.com",
149
+ "object_relation": null,
150
+ "type": "hostname"
151
+ },
152
+ {
153
+ "comment": "C2",
154
+ "category": "Network activity",
155
+ "uuid": "5a0a9e4c-8ba4-43d7-a8e3-4b52950d210f",
156
+ "timestamp": "1510922426",
157
+ "to_ids": true,
158
+ "value": "www.weryhstui.com",
159
+ "object_relation": null,
160
+ "type": "hostname"
161
+ },
162
+ {
163
+ "comment": "",
164
+ "category": "Network activity",
165
+ "uuid": "5a0a9e4c-bcf8-42ac-86dc-48b0950d210f",
166
+ "timestamp": "1510922426",
167
+ "to_ids": true,
168
+ "value": "98.126.156.210",
169
+ "object_relation": null,
170
+ "type": "ip-dst"
171
+ },
172
+ {
173
+ "comment": "C2",
174
+ "category": "Network activity",
175
+ "uuid": "5a0a9e4c-9440-40fa-ac80-4320950d210f",
176
+ "timestamp": "1510922426",
177
+ "to_ids": true,
178
+ "value": "www.olinaodi.com",
179
+ "object_relation": null,
180
+ "type": "hostname"
181
+ },
182
+ {
183
+ "comment": "Reaver.v1",
184
+ "category": "Payload delivery",
185
+ "uuid": "5a0a9eae-a23c-4b65-b46b-4683950d210f",
186
+ "timestamp": "1510922427",
187
+ "to_ids": true,
188
+ "value": "d560f44188fb56d3abb11d9508e1167329470de19b811163eb1167534722e666",
189
+ "object_relation": null,
190
+ "type": "sha256"
191
+ },
192
+ {
193
+ "comment": "Reaver.v2",
194
+ "category": "Payload delivery",
195
+ "uuid": "5a0a9eae-5e1c-411a-b1ba-49ac950d210f",
196
+ "timestamp": "1510922427",
197
+ "to_ids": true,
198
+ "value": "98eb5465c6330b9b49df2e7c9ad0b1164aa5b35423d9e80495a178eb510cdc1c",
199
+ "object_relation": null,
200
+ "type": "sha256"
201
+ },
202
+ {
203
+ "comment": "Reaver.v2",
204
+ "category": "Payload delivery",
205
+ "uuid": "5a0a9eae-ccf0-4390-bcde-43bd950d210f",
206
+ "timestamp": "1510922427",
207
+ "to_ids": true,
208
+ "value": "05ddbd0506ec95fb460b3994e5b21cdb0418ba4aa406374ca1b91249349b7640",
209
+ "object_relation": null,
210
+ "type": "sha256"
211
+ },
212
+ {
213
+ "comment": "Reaver.v3",
214
+ "category": "Payload delivery",
215
+ "uuid": "5a0a9eae-3ef4-42d5-baca-44c4950d210f",
216
+ "timestamp": "1510922427",
217
+ "to_ids": true,
218
+ "value": "18ac3b14300ecfeed4b64a844c16dccb06b0e3513d0954d6c6182f2ea14e4c92",
219
+ "object_relation": null,
220
+ "type": "sha256"
221
+ },
222
+ {
223
+ "comment": "Reaver.v3",
224
+ "category": "Payload delivery",
225
+ "uuid": "5a0a9eae-8cc8-4bbd-adec-4e38950d210f",
226
+ "timestamp": "1510922427",
227
+ "to_ids": true,
228
+ "value": "c0f8bb77284b96e07cab1c3fab8800b1bbd030720c74628c4ee5666694ef903d",
229
+ "object_relation": null,
230
+ "type": "sha256"
231
+ },
232
+ {
233
+ "comment": "Reaver.v3",
234
+ "category": "Payload delivery",
235
+ "uuid": "5a0a9eae-486c-4820-b2b3-4bf0950d210f",
236
+ "timestamp": "1510922427",
237
+ "to_ids": true,
238
+ "value": "9213f70bce491991c4cbbbd7dc3e67d3a3d535b965d7064973b35c50f265e59b",
239
+ "object_relation": null,
240
+ "type": "sha256"
241
+ },
242
+ {
243
+ "comment": "Reaver.v3",
244
+ "category": "Payload delivery",
245
+ "uuid": "5a0a9eae-bef4-4696-a1ab-4c83950d210f",
246
+ "timestamp": "1510922427",
247
+ "to_ids": true,
248
+ "value": "26c234c73e2c3448589c7d4a0cf17f615ad3666541a4e611e2d8b77637205bcf",
249
+ "object_relation": null,
250
+ "type": "sha256"
251
+ },
252
+ {
253
+ "comment": "Reaver.v3",
254
+ "category": "Payload delivery",
255
+ "uuid": "5a0a9eae-7560-4794-90d1-4f4d950d210f",
256
+ "timestamp": "1510922427",
257
+ "to_ids": true,
258
+ "value": "ae9f158e4886cfdbfb4f1b3b25707d05f6fd873d0be9d8e7334a2c28741228ee",
259
+ "object_relation": null,
260
+ "type": "sha256"
261
+ },
262
+ {
263
+ "comment": "Reaver.v3",
264
+ "category": "Payload delivery",
265
+ "uuid": "5a0a9eae-d3c4-4809-aea5-435c950d210f",
266
+ "timestamp": "1510922427",
267
+ "to_ids": true,
268
+ "value": "1fcda755e8fa23d27329e4bc0443a82e1c1e9a6c1691639db256a187365e4db1",
269
+ "object_relation": null,
270
+ "type": "sha256"
271
+ },
272
+ {
273
+ "comment": "Reaver.v3",
274
+ "category": "Payload delivery",
275
+ "uuid": "5a0a9eae-a5dc-43ab-9158-451c950d210f",
276
+ "timestamp": "1510922427",
277
+ "to_ids": true,
278
+ "value": "c906250e0a4c457663e37119ebe1efa1e4b97eef1d975f383ac3243f9f09908c",
279
+ "object_relation": null,
280
+ "type": "sha256"
281
+ },
282
+ {
283
+ "comment": "Reaver.v3",
284
+ "category": "Payload delivery",
285
+ "uuid": "5a0a9eae-1d70-4f14-b316-4ce4950d210f",
286
+ "timestamp": "1510922427",
287
+ "to_ids": true,
288
+ "value": "1813f10bcf74beb582c824c64fff63cb150d178bef93af81d875ca84214307a1",
289
+ "object_relation": null,
290
+ "type": "sha256"
291
+ },
292
+ {
293
+ "comment": "SunOrcal",
294
+ "category": "Payload delivery",
295
+ "uuid": "5a0a9eae-7674-4a3f-a595-4006950d210f",
296
+ "timestamp": "1510922427",
297
+ "to_ids": true,
298
+ "value": "799139b5278dc2ac24279cc6c3db44f4ef0ea78ee7b721b0ace38fd8018c51ac",
299
+ "object_relation": null,
300
+ "type": "sha256"
301
+ },
302
+ {
303
+ "comment": "SunOrcal",
304
+ "category": "Payload delivery",
305
+ "uuid": "5a0a9eae-4a58-4535-9998-49b7950d210f",
306
+ "timestamp": "1510922427",
307
+ "to_ids": true,
308
+ "value": "81d887fefdbb0219647991c2b7bddf45c2fede4dc6fc18408f1706e0279615b2",
309
+ "object_relation": null,
310
+ "type": "sha256"
311
+ },
312
+ {
313
+ "comment": "SunOrcal",
314
+ "category": "Payload delivery",
315
+ "uuid": "5a0a9eae-6ae4-41a1-8402-4328950d210f",
316
+ "timestamp": "1510922427",
317
+ "to_ids": true,
318
+ "value": "58312fb742ce881e040e1b5b8555f00a402b8dd4fc886acaae2f862040b3bfc5",
319
+ "object_relation": null,
320
+ "type": "sha256"
321
+ },
322
+ {
323
+ "comment": "SunOrcal",
324
+ "category": "Payload delivery",
325
+ "uuid": "5a0a9eae-6edc-4177-afd5-4c93950d210f",
326
+ "timestamp": "1510922427",
327
+ "to_ids": true,
328
+ "value": "38ea33dab0ba2edd16ecd98cba161c550d1036b253c8666c4110d198948329fb",
329
+ "object_relation": null,
330
+ "type": "sha256"
331
+ },
332
+ {
333
+ "comment": "SunOrcal",
334
+ "category": "Payload delivery",
335
+ "uuid": "5a0a9eae-8388-4e7f-ab5b-4e95950d210f",
336
+ "timestamp": "1510922427",
337
+ "to_ids": true,
338
+ "value": "cb7c0cf1750baaa11783e93369230ee666b9f3da7298e4d1bb9a07af6a439f2f",
339
+ "object_relation": null,
340
+ "type": "sha256"
341
+ },
342
+ {
343
+ "comment": "C2",
344
+ "category": "Network activity",
345
+ "uuid": "5a0a9efc-6604-4cd9-acbb-4632950d210f",
346
+ "timestamp": "1510922427",
347
+ "to_ids": true,
348
+ "value": "104.148.70.217",
349
+ "object_relation": null,
350
+ "type": "ip-dst"
351
+ },
352
+ {
353
+ "comment": "SunOrcal - Xchecked via VT: cb7c0cf1750baaa11783e93369230ee666b9f3da7298e4d1bb9a07af6a439f2f",
354
+ "category": "Payload delivery",
355
+ "uuid": "5a0ed8bb-5df0-47a8-9785-44a702de0b81",
356
+ "timestamp": "1510922427",
357
+ "to_ids": true,
358
+ "value": "da7a5e54d1d45462bda65807c1ef03ee34b7e777",
359
+ "object_relation": null,
360
+ "type": "sha1"
361
+ },
362
+ {
363
+ "comment": "SunOrcal - Xchecked via VT: cb7c0cf1750baaa11783e93369230ee666b9f3da7298e4d1bb9a07af6a439f2f",
364
+ "category": "Payload delivery",
365
+ "uuid": "5a0ed8bb-f580-4b51-a866-482602de0b81",
366
+ "timestamp": "1510922427",
367
+ "to_ids": true,
368
+ "value": "7dcf79a66192e88b92ccc12810e61329",
369
+ "object_relation": null,
370
+ "type": "md5"
371
+ },
372
+ {
373
+ "comment": "SunOrcal - Xchecked via VT: cb7c0cf1750baaa11783e93369230ee666b9f3da7298e4d1bb9a07af6a439f2f",
374
+ "category": "External analysis",
375
+ "uuid": "5a0ed8bb-8a94-47be-9f1e-463f02de0b81",
376
+ "timestamp": "1510922427",
377
+ "to_ids": false,
378
+ "value": "https://www.virustotal.com/file/cb7c0cf1750baaa11783e93369230ee666b9f3da7298e4d1bb9a07af6a439f2f/analysis/1510574305/",
379
+ "object_relation": null,
380
+ "type": "link"
381
+ },
382
+ {
383
+ "comment": "SunOrcal - Xchecked via VT: 38ea33dab0ba2edd16ecd98cba161c550d1036b253c8666c4110d198948329fb",
384
+ "category": "Payload delivery",
385
+ "uuid": "5a0ed8bb-3f4c-411b-9507-4d1602de0b81",
386
+ "timestamp": "1510922427",
387
+ "to_ids": true,
388
+ "value": "704886d56ded5817e39d7442b0203c2f76207f92",
389
+ "object_relation": null,
390
+ "type": "sha1"
391
+ },
392
+ {
393
+ "comment": "SunOrcal - Xchecked via VT: 38ea33dab0ba2edd16ecd98cba161c550d1036b253c8666c4110d198948329fb",
394
+ "category": "Payload delivery",
395
+ "uuid": "5a0ed8bb-6f34-4e76-ba5b-45ae02de0b81",
396
+ "timestamp": "1510922427",
397
+ "to_ids": true,
398
+ "value": "af6a25fc28e0560860c01d74854a2cba",
399
+ "object_relation": null,
400
+ "type": "md5"
401
+ },
402
+ {
403
+ "comment": "SunOrcal - Xchecked via VT: 38ea33dab0ba2edd16ecd98cba161c550d1036b253c8666c4110d198948329fb",
404
+ "category": "External analysis",
405
+ "uuid": "5a0ed8bb-5b24-48ce-82c4-4e2b02de0b81",
406
+ "timestamp": "1510922427",
407
+ "to_ids": false,
408
+ "value": "https://www.virustotal.com/file/38ea33dab0ba2edd16ecd98cba161c550d1036b253c8666c4110d198948329fb/analysis/1510574322/",
409
+ "object_relation": null,
410
+ "type": "link"
411
+ },
412
+ {
413
+ "comment": "SunOrcal - Xchecked via VT: 58312fb742ce881e040e1b5b8555f00a402b8dd4fc886acaae2f862040b3bfc5",
414
+ "category": "Payload delivery",
415
+ "uuid": "5a0ed8bb-830c-472b-9d19-481002de0b81",
416
+ "timestamp": "1510922427",
417
+ "to_ids": true,
418
+ "value": "9adbe92835ee2cc93e0d99b9d4536eb7727acf47",
419
+ "object_relation": null,
420
+ "type": "sha1"
421
+ },
422
+ {
423
+ "comment": "SunOrcal - Xchecked via VT: 58312fb742ce881e040e1b5b8555f00a402b8dd4fc886acaae2f862040b3bfc5",
424
+ "category": "Payload delivery",
425
+ "uuid": "5a0ed8bb-b94c-4e75-a47d-488002de0b81",
426
+ "timestamp": "1510922427",
427
+ "to_ids": true,
428
+ "value": "47cc3592bbf8c3b516ae74c95efb3344",
429
+ "object_relation": null,
430
+ "type": "md5"
431
+ },
432
+ {
433
+ "comment": "SunOrcal - Xchecked via VT: 58312fb742ce881e040e1b5b8555f00a402b8dd4fc886acaae2f862040b3bfc5",
434
+ "category": "External analysis",
435
+ "uuid": "5a0ed8bb-8d8c-4b7a-a223-498e02de0b81",
436
+ "timestamp": "1510922427",
437
+ "to_ids": false,
438
+ "value": "https://www.virustotal.com/file/58312fb742ce881e040e1b5b8555f00a402b8dd4fc886acaae2f862040b3bfc5/analysis/1510574347/",
439
+ "object_relation": null,
440
+ "type": "link"
441
+ },
442
+ {
443
+ "comment": "SunOrcal - Xchecked via VT: 81d887fefdbb0219647991c2b7bddf45c2fede4dc6fc18408f1706e0279615b2",
444
+ "category": "Payload delivery",
445
+ "uuid": "5a0ed8bb-b9b0-40ac-a84f-4b6002de0b81",
446
+ "timestamp": "1510922427",
447
+ "to_ids": true,
448
+ "value": "7fa8bfc051b98698e6b95cbc7163e4aa41880279",
449
+ "object_relation": null,
450
+ "type": "sha1"
451
+ },
452
+ {
453
+ "comment": "SunOrcal - Xchecked via VT: 81d887fefdbb0219647991c2b7bddf45c2fede4dc6fc18408f1706e0279615b2",
454
+ "category": "Payload delivery",
455
+ "uuid": "5a0ed8bb-65e8-471f-9a66-4e3102de0b81",
456
+ "timestamp": "1510922427",
457
+ "to_ids": true,
458
+ "value": "5eb3a846092cae378fcd45bdf5453536",
459
+ "object_relation": null,
460
+ "type": "md5"
461
+ },
462
+ {
463
+ "comment": "SunOrcal - Xchecked via VT: 81d887fefdbb0219647991c2b7bddf45c2fede4dc6fc18408f1706e0279615b2",
464
+ "category": "External analysis",
465
+ "uuid": "5a0ed8bb-d7c0-4ed1-9bdc-497002de0b81",
466
+ "timestamp": "1510922427",
467
+ "to_ids": false,
468
+ "value": "https://www.virustotal.com/file/81d887fefdbb0219647991c2b7bddf45c2fede4dc6fc18408f1706e0279615b2/analysis/1510574318/",
469
+ "object_relation": null,
470
+ "type": "link"
471
+ },
472
+ {
473
+ "comment": "SunOrcal - Xchecked via VT: 799139b5278dc2ac24279cc6c3db44f4ef0ea78ee7b721b0ace38fd8018c51ac",
474
+ "category": "Payload delivery",
475
+ "uuid": "5a0ed8bb-a260-4d97-b3c8-43eb02de0b81",
476
+ "timestamp": "1510922427",
477
+ "to_ids": true,
478
+ "value": "a6e538a01c366580e90e49249251b66dfe39c72f",
479
+ "object_relation": null,
480
+ "type": "sha1"
481
+ },
482
+ {
483
+ "comment": "SunOrcal - Xchecked via VT: 799139b5278dc2ac24279cc6c3db44f4ef0ea78ee7b721b0ace38fd8018c51ac",
484
+ "category": "Payload delivery",
485
+ "uuid": "5a0ed8bb-61ec-48e1-8327-492b02de0b81",
486
+ "timestamp": "1510922427",
487
+ "to_ids": true,
488
+ "value": "11a5b1901243396984670af7acc6cf72",
489
+ "object_relation": null,
490
+ "type": "md5"
491
+ },
492
+ {
493
+ "comment": "SunOrcal - Xchecked via VT: 799139b5278dc2ac24279cc6c3db44f4ef0ea78ee7b721b0ace38fd8018c51ac",
494
+ "category": "External analysis",
495
+ "uuid": "5a0ed8bb-4f20-46d8-b762-4cf702de0b81",
496
+ "timestamp": "1510922427",
497
+ "to_ids": false,
498
+ "value": "https://www.virustotal.com/file/799139b5278dc2ac24279cc6c3db44f4ef0ea78ee7b721b0ace38fd8018c51ac/analysis/1510574343/",
499
+ "object_relation": null,
500
+ "type": "link"
501
+ },
502
+ {
503
+ "comment": "Reaver.v3 - Xchecked via VT: 1813f10bcf74beb582c824c64fff63cb150d178bef93af81d875ca84214307a1",
504
+ "category": "Payload delivery",
505
+ "uuid": "5a0ed8bb-b6ec-4b31-8078-4c9b02de0b81",
506
+ "timestamp": "1510922427",
507
+ "to_ids": true,
508
+ "value": "03bc4181fb54af3151cab60406a01a44158e5277",
509
+ "object_relation": null,
510
+ "type": "sha1"
511
+ },
512
+ {
513
+ "comment": "Reaver.v3 - Xchecked via VT: 1813f10bcf74beb582c824c64fff63cb150d178bef93af81d875ca84214307a1",
514
+ "category": "Payload delivery",
515
+ "uuid": "5a0ed8bb-67e0-45e3-86d3-4a9d02de0b81",
516
+ "timestamp": "1510922427",
517
+ "to_ids": true,
518
+ "value": "17587683361d8458aebd9b8fdd07137a",
519
+ "object_relation": null,
520
+ "type": "md5"
521
+ },
522
+ {
523
+ "comment": "Reaver.v3 - Xchecked via VT: 1813f10bcf74beb582c824c64fff63cb150d178bef93af81d875ca84214307a1",
524
+ "category": "External analysis",
525
+ "uuid": "5a0ed8bb-cfec-48d4-9919-49ab02de0b81",
526
+ "timestamp": "1510922427",
527
+ "to_ids": false,
528
+ "value": "https://www.virustotal.com/file/1813f10bcf74beb582c824c64fff63cb150d178bef93af81d875ca84214307a1/analysis/1510849386/",
529
+ "object_relation": null,
530
+ "type": "link"
531
+ },
532
+ {
533
+ "comment": "Reaver.v3 - Xchecked via VT: c906250e0a4c457663e37119ebe1efa1e4b97eef1d975f383ac3243f9f09908c",
534
+ "category": "Payload delivery",
535
+ "uuid": "5a0ed8bb-cb84-4739-a17e-456b02de0b81",
536
+ "timestamp": "1510922427",
537
+ "to_ids": true,
538
+ "value": "b31160953ff19e6abf12fc8319420ab2e1c88e77",
539
+ "object_relation": null,
540
+ "type": "sha1"
541
+ },
542
+ {
543
+ "comment": "Reaver.v3 - Xchecked via VT: c906250e0a4c457663e37119ebe1efa1e4b97eef1d975f383ac3243f9f09908c",
544
+ "category": "Payload delivery",
545
+ "uuid": "5a0ed8bb-8bd8-4a20-a99e-498b02de0b81",
546
+ "timestamp": "1510922427",
547
+ "to_ids": true,
548
+ "value": "2d563bf83bddca1f24e8a0ffb951a7e9",
549
+ "object_relation": null,
550
+ "type": "md5"
551
+ },
552
+ {
553
+ "comment": "Reaver.v3 - Xchecked via VT: c906250e0a4c457663e37119ebe1efa1e4b97eef1d975f383ac3243f9f09908c",
554
+ "category": "External analysis",
555
+ "uuid": "5a0ed8bb-c264-45c1-acf8-4ece02de0b81",
556
+ "timestamp": "1510922427",
557
+ "to_ids": false,
558
+ "value": "https://www.virustotal.com/file/c906250e0a4c457663e37119ebe1efa1e4b97eef1d975f383ac3243f9f09908c/analysis/1510574300/",
559
+ "object_relation": null,
560
+ "type": "link"
561
+ },
562
+ {
563
+ "comment": "Reaver.v3 - Xchecked via VT: 1fcda755e8fa23d27329e4bc0443a82e1c1e9a6c1691639db256a187365e4db1",
564
+ "category": "Payload delivery",
565
+ "uuid": "5a0ed8bb-bc04-47cf-8f7b-49cb02de0b81",
566
+ "timestamp": "1510922427",
567
+ "to_ids": true,
568
+ "value": "172b4578cb50985b08c227360d9c9df2cf32117a",
569
+ "object_relation": null,
570
+ "type": "sha1"
571
+ },
572
+ {
573
+ "comment": "Reaver.v3 - Xchecked via VT: 1fcda755e8fa23d27329e4bc0443a82e1c1e9a6c1691639db256a187365e4db1",
574
+ "category": "Payload delivery",
575
+ "uuid": "5a0ed8bb-9340-4443-b23e-4e1902de0b81",
576
+ "timestamp": "1510922427",
577
+ "to_ids": true,
578
+ "value": "aab319d9715d38a37a10d82e87478dfc",
579
+ "object_relation": null,
580
+ "type": "md5"
581
+ },
582
+ {
583
+ "comment": "Reaver.v3 - Xchecked via VT: 1fcda755e8fa23d27329e4bc0443a82e1c1e9a6c1691639db256a187365e4db1",
584
+ "category": "External analysis",
585
+ "uuid": "5a0ed8bb-b9c8-43aa-8797-462302de0b81",
586
+ "timestamp": "1510922427",
587
+ "to_ids": false,
588
+ "value": "https://www.virustotal.com/file/1fcda755e8fa23d27329e4bc0443a82e1c1e9a6c1691639db256a187365e4db1/analysis/1510574331/",
589
+ "object_relation": null,
590
+ "type": "link"
591
+ },
592
+ {
593
+ "comment": "Reaver.v3 - Xchecked via VT: ae9f158e4886cfdbfb4f1b3b25707d05f6fd873d0be9d8e7334a2c28741228ee",
594
+ "category": "Payload delivery",
595
+ "uuid": "5a0ed8bb-8a68-4f7a-adcb-46c302de0b81",
596
+ "timestamp": "1510922427",
597
+ "to_ids": true,
598
+ "value": "d62f1f039d0be1d7b2a8ed122d97ee917dbc9ce8",
599
+ "object_relation": null,
600
+ "type": "sha1"
601
+ },
602
+ {
603
+ "comment": "Reaver.v3 - Xchecked via VT: ae9f158e4886cfdbfb4f1b3b25707d05f6fd873d0be9d8e7334a2c28741228ee",
604
+ "category": "Payload delivery",
605
+ "uuid": "5a0ed8bb-dcf8-4fe9-bdee-484502de0b81",
606
+ "timestamp": "1510922427",
607
+ "to_ids": true,
608
+ "value": "892350b2a44efd9fa1e7c88aec013818",
609
+ "object_relation": null,
610
+ "type": "md5"
611
+ },
612
+ {
613
+ "comment": "Reaver.v3 - Xchecked via VT: ae9f158e4886cfdbfb4f1b3b25707d05f6fd873d0be9d8e7334a2c28741228ee",
614
+ "category": "External analysis",
615
+ "uuid": "5a0ed8bb-23d8-4bbe-b367-4fae02de0b81",
616
+ "timestamp": "1510922427",
617
+ "to_ids": false,
618
+ "value": "https://www.virustotal.com/file/ae9f158e4886cfdbfb4f1b3b25707d05f6fd873d0be9d8e7334a2c28741228ee/analysis/1510574327/",
619
+ "object_relation": null,
620
+ "type": "link"
621
+ },
622
+ {
623
+ "comment": "Reaver.v3 - Xchecked via VT: 9213f70bce491991c4cbbbd7dc3e67d3a3d535b965d7064973b35c50f265e59b",
624
+ "category": "Payload delivery",
625
+ "uuid": "5a0ed8bb-d850-43f6-aa30-4f5702de0b81",
626
+ "timestamp": "1510922427",
627
+ "to_ids": true,
628
+ "value": "e96be5b542d100913a5bca0f02fb094d6f3ad85b",
629
+ "object_relation": null,
630
+ "type": "sha1"
631
+ },
632
+ {
633
+ "comment": "Reaver.v3 - Xchecked via VT: 9213f70bce491991c4cbbbd7dc3e67d3a3d535b965d7064973b35c50f265e59b",
634
+ "category": "Payload delivery",
635
+ "uuid": "5a0ed8bb-3ae4-4f3e-b592-474002de0b81",
636
+ "timestamp": "1510922427",
637
+ "to_ids": true,
638
+ "value": "dd7edadd019bc120978a4dad284fbea6",
639
+ "object_relation": null,
640
+ "type": "md5"
641
+ },
642
+ {
643
+ "comment": "Reaver.v3 - Xchecked via VT: 9213f70bce491991c4cbbbd7dc3e67d3a3d535b965d7064973b35c50f265e59b",
644
+ "category": "External analysis",
645
+ "uuid": "5a0ed8bb-c9a4-4669-a3ba-47e002de0b81",
646
+ "timestamp": "1510922427",
647
+ "to_ids": false,
648
+ "value": "https://www.virustotal.com/file/9213f70bce491991c4cbbbd7dc3e67d3a3d535b965d7064973b35c50f265e59b/analysis/1510574335/",
649
+ "object_relation": null,
650
+ "type": "link"
651
+ },
652
+ {
653
+ "comment": "Reaver.v3 - Xchecked via VT: c0f8bb77284b96e07cab1c3fab8800b1bbd030720c74628c4ee5666694ef903d",
654
+ "category": "Payload delivery",
655
+ "uuid": "5a0ed8bb-e764-4ad4-8cdb-438902de0b81",
656
+ "timestamp": "1510922427",
657
+ "to_ids": true,
658
+ "value": "cbde40a234bff8870f8746eca969c364da7f4aec",
659
+ "object_relation": null,
660
+ "type": "sha1"
661
+ },
662
+ {
663
+ "comment": "Reaver.v3 - Xchecked via VT: c0f8bb77284b96e07cab1c3fab8800b1bbd030720c74628c4ee5666694ef903d",
664
+ "category": "Payload delivery",
665
+ "uuid": "5a0ed8bb-02e0-4eb5-9e34-41e602de0b81",
666
+ "timestamp": "1510922427",
667
+ "to_ids": true,
668
+ "value": "ae185e9c43bb1498a3c653a0886896e3",
669
+ "object_relation": null,
670
+ "type": "md5"
671
+ },
672
+ {
673
+ "comment": "Reaver.v3 - Xchecked via VT: c0f8bb77284b96e07cab1c3fab8800b1bbd030720c74628c4ee5666694ef903d",
674
+ "category": "External analysis",
675
+ "uuid": "5a0ed8bb-586c-4a4d-aa3b-4f7c02de0b81",
676
+ "timestamp": "1510922427",
677
+ "to_ids": false,
678
+ "value": "https://www.virustotal.com/file/c0f8bb77284b96e07cab1c3fab8800b1bbd030720c74628c4ee5666694ef903d/analysis/1510921773/",
679
+ "object_relation": null,
680
+ "type": "link"
681
+ },
682
+ {
683
+ "comment": "Reaver.v3 - Xchecked via VT: 18ac3b14300ecfeed4b64a844c16dccb06b0e3513d0954d6c6182f2ea14e4c92",
684
+ "category": "Payload delivery",
685
+ "uuid": "5a0ed8bc-ba8c-4160-8374-4dba02de0b81",
686
+ "timestamp": "1510922428",
687
+ "to_ids": true,
688
+ "value": "5c6b231111239c0625dc9ff4359d1b8553159ecc",
689
+ "object_relation": null,
690
+ "type": "sha1"
691
+ },
692
+ {
693
+ "comment": "Reaver.v3 - Xchecked via VT: 18ac3b14300ecfeed4b64a844c16dccb06b0e3513d0954d6c6182f2ea14e4c92",
694
+ "category": "Payload delivery",
695
+ "uuid": "5a0ed8bc-eff4-4d36-947a-424c02de0b81",
696
+ "timestamp": "1510922428",
697
+ "to_ids": true,
698
+ "value": "c629f8f3206e5a6de83b4c996a2bacfb",
699
+ "object_relation": null,
700
+ "type": "md5"
701
+ },
702
+ {
703
+ "comment": "Reaver.v3 - Xchecked via VT: 18ac3b14300ecfeed4b64a844c16dccb06b0e3513d0954d6c6182f2ea14e4c92",
704
+ "category": "External analysis",
705
+ "uuid": "5a0ed8bc-60d8-4f2e-aa79-4d6f02de0b81",
706
+ "timestamp": "1510922428",
707
+ "to_ids": false,
708
+ "value": "https://www.virustotal.com/file/18ac3b14300ecfeed4b64a844c16dccb06b0e3513d0954d6c6182f2ea14e4c92/analysis/1510610402/",
709
+ "object_relation": null,
710
+ "type": "link"
711
+ },
712
+ {
713
+ "comment": "Reaver.v2 - Xchecked via VT: 98eb5465c6330b9b49df2e7c9ad0b1164aa5b35423d9e80495a178eb510cdc1c",
714
+ "category": "Payload delivery",
715
+ "uuid": "5a0ed8bc-0124-4bd3-9049-4e6b02de0b81",
716
+ "timestamp": "1510922428",
717
+ "to_ids": true,
718
+ "value": "c05d15fc94d096a821f2c689a29dff7679ce087a",
719
+ "object_relation": null,
720
+ "type": "sha1"
721
+ },
722
+ {
723
+ "comment": "Reaver.v2 - Xchecked via VT: 98eb5465c6330b9b49df2e7c9ad0b1164aa5b35423d9e80495a178eb510cdc1c",
724
+ "category": "Payload delivery",
725
+ "uuid": "5a0ed8bc-c04c-49c4-9d39-464802de0b81",
726
+ "timestamp": "1510922428",
727
+ "to_ids": true,
728
+ "value": "dadf3d3dd411bc02d7c05ee3a18259ea",
729
+ "object_relation": null,
730
+ "type": "md5"
731
+ },
732
+ {
733
+ "comment": "Reaver.v2 - Xchecked via VT: 98eb5465c6330b9b49df2e7c9ad0b1164aa5b35423d9e80495a178eb510cdc1c",
734
+ "category": "External analysis",
735
+ "uuid": "5a0ed8bc-37cc-47c1-bdcd-454e02de0b81",
736
+ "timestamp": "1510922428",
737
+ "to_ids": false,
738
+ "value": "https://www.virustotal.com/file/98eb5465c6330b9b49df2e7c9ad0b1164aa5b35423d9e80495a178eb510cdc1c/analysis/1510823791/",
739
+ "object_relation": null,
740
+ "type": "link"
741
+ },
742
+ {
743
+ "comment": "Reaver.v1 - Xchecked via VT: d560f44188fb56d3abb11d9508e1167329470de19b811163eb1167534722e666",
744
+ "category": "Payload delivery",
745
+ "uuid": "5a0ed8bc-4014-447e-8efc-450702de0b81",
746
+ "timestamp": "1510922428",
747
+ "to_ids": true,
748
+ "value": "0cea48067ddbc9227363168013142f6f3a5dea9f",
749
+ "object_relation": null,
750
+ "type": "sha1"
751
+ },
752
+ {
753
+ "comment": "Reaver.v1 - Xchecked via VT: d560f44188fb56d3abb11d9508e1167329470de19b811163eb1167534722e666",
754
+ "category": "Payload delivery",
755
+ "uuid": "5a0ed8bc-5768-4c26-85a2-47b902de0b81",
756
+ "timestamp": "1510922428",
757
+ "to_ids": true,
758
+ "value": "9f289cce6f95949450e3f4c96a187f5d",
759
+ "object_relation": null,
760
+ "type": "md5"
761
+ },
762
+ {
763
+ "comment": "Reaver.v1 - Xchecked via VT: d560f44188fb56d3abb11d9508e1167329470de19b811163eb1167534722e666",
764
+ "category": "External analysis",
765
+ "uuid": "5a0ed8bc-a7a0-499f-bd08-48bb02de0b81",
766
+ "timestamp": "1510922428",
767
+ "to_ids": false,
768
+ "value": "https://www.virustotal.com/file/d560f44188fb56d3abb11d9508e1167329470de19b811163eb1167534722e666/analysis/1510823685/",
769
+ "object_relation": null,
770
+ "type": "link"
771
+ }
772
+ ],
773
+ "Tag": [
774
+ {
775
+ "colour": "#004646",
776
+ "exportable": true,
777
+ "name": "type:OSINT"
778
+ },
779
+ {
780
+ "colour": "#ffffff",
781
+ "exportable": true,
782
+ "name": "tlp:white"
783
+ },
784
+ {
785
+ "colour": "#3c7700",
786
+ "exportable": true,
787
+ "name": "circl:incident-classification=\"malware\""
788
+ },
789
+ {
790
+ "colour": "#00223b",
791
+ "exportable": true,
792
+ "name": "osint:source-type=\"blog-post\""
793
+ }
794
+ ],
795
+ "published": true,
796
+ "date": "2017-11-10",
797
+ "Orgc": {
798
+ "uuid": "55f6ea5e-2c60-40e5-964f-47a8950d210f",
799
+ "name": "CIRCL"
800
+ },
801
+ "threat_level_id": "3",
802
+ "uuid": "5a0a9aa9-23a4-4607-b6df-41a9950d210f"
803
+ }
804
+ }