Raw (decrypted, decoded) text of the malware configuration.
+diff --git a/objects.html b/objects.html index ccbcfa6..e962c93 100755 --- a/objects.html +++ b/objects.html @@ -480,6 +480,7 @@ body.book #toc,body.book #preamble,body.book h1.sect0,body.book .sect1>h2{page-b
Malware configuration recovered or extracted from a malicious binary..
++ + | ++malware-config is a MISP object available in JSON format at this location The JSON format can be freely reused in your application or automatically enabled in MISP. + | +
Object attribute | +MISP attribute type | +Description | +Disable correlation | +Multiple | +
---|---|---|---|---|
config |
+text |
+
+ Raw (decrypted, decoded) text of the malware configuration. + |
+
+ + |
+
+ + |
+
format |
+text |
+
+ Original format of the malware configuration. ['JSON', 'yaml', 'INI', 'other'] + |
+
+ + |
+
+ + |
+
encrypted |
+text |
+
+ Encrypted or encoded text of the malware configuration in base64. + |
+
+ + |
+
+ + |
+
password |
+text |
+
+ Password or encryption key used to encrypt the malware configuration. + |
+
+ + |
+
+ + |
+
last-seen |
+datetime |
+
+ When the malware configuration has been seen for the last time. + |
+
+ + |
+
+ + |
+
first-seen |
+datetime |
+
+ When the malware configuration has been seen for the first time. + |
+
+ + |
+
+ + |
+
This relationship describes an object signed by another object.
['misp']
delivered-by
This relationship describes an object by another object (such as exploit kit, dropper).
['misp']
controls
This relationship describes an object which controls another object.
['misp']