@@ 0,0 1,1 @@
+{"type": "bundle", "id": "bundle--c2bbe291-ab8d-43db-a6ec-f8a9bfe1054e", "objects": [{"type": "indicator", "spec_version": "2.1", "id": "indicator--25e8d7e5-e379-4370-9ee1-c25b52900dc9", "created": "2023-01-05T14:35:39.414742Z", "modified": "2023-01-05T14:35:39.414742Z", "description": "It downloads the miner", "indicator_types": ["malicious-activity"], "pattern": "[url:value = 'abp.cash']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2023-01-05T14:35:39.414742Z"},{"type": "indicator", "spec_version": "2.1", "id": "indicator--1c668798-7aea-46fd-bfe1-db7dab8ec3e2", "created": "2023-01-05T14:25:35.32664Z", "modified": "2023-01-05T14:25:35.32664Z", "name": "disk1", "description": "linux dropper that uses sed command", "indicator_types": ["malicious-activity"], "pattern": "[file:hashes.'sha256' = '256ab7aa7b94c47ae6ad6ca8ebad7e2734ebaa21542934604eb7230143137342']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2023-01-05T14:25:35.32664Z"},{"type": "malware", "spec_version": "2.1", "id": "malware--ab24aa89-d80e-4293-a722-4b7b83804ee7", "created": "2023-01-05T14:25:35.32664Z", "modified": "2023-01-05T14:25:35.32664Z", "name": "XMRIG", "malware_types": ["cryptominer"], "is_family": true},{"type": "relationship", "spec_version": "2.1", "id": "relationship--2787a8a0-4e64-4998-9618-03659f14ffe8", "created": "2023-01-05T13:25:35.337583Z", "modified": "2023-01-05T13:25:35.337583Z", "relationship_type": "indicates", "source_ref": "indicator--1c668798-7aea-46fd-bfe1-db7dab8ec3e2", "target_ref": "malware--ab24aa89-d80e-4293-a722-4b7b83804ee7"}, {"type": "relationship", "spec_version": "2.1", "id": "relationship--47af5050-4c07-42a7-b64f-af131e603192", "created": "2023-01-05T13:35:39.426227Z", "modified": "2023-01-05T13:35:39.426227Z", "relationship_type": "indicates", "source_ref": "indicator--25e8d7e5-e379-4370-9ee1-c25b52900dc9", "target_ref": "malware--ab24aa89-d80e-4293-a722-4b7b83804ee7"}]}