{
  "type": "Domain",
  "indicator": "a.data",
  "general": {
    "sections": [
      "general",
      "geo",
      "url_list",
      "passive_dns",
      "malware",
      "whois",
      "http_scans"
    ],
    "whois": "http://whois.domaintools.com/a.data",
    "alexa": "http://www.alexa.com/siteinfo/a.data",
    "indicator": "a.data",
    "type": "domain",
    "type_title": "Domain",
    "validation": [],
    "base_indicator": {
      "id": 9504488,
      "indicator": "a.data",
      "type": "domain",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 50,
      "pulses": [
        {
          "id": "698e93e1ab02db8c49e8c3ed",
          "name": "\u201cBroken Seal\u201d DocuSign-themed Delivery with Fileless Process Hollowing (Zeppelin/Bloat-A)",
          "description": "Forensic analysis indicates a DocuSign-themed phishing campaign using a deliberately invalid X.509 PKI seal (\u201cBroken Seal\u201d) to trigger fail-open verification logic in automated handlers. The delivery mechanism bypasses Secure Email Gateway (SEG) reputation checks by using encrypted channels and human-gated infrastructure. The payload is a fileless Process Hollowing (RunPE) malware that injects into RWX memory of legitimate processes to evade disk-based EDR.",
          "modified": "2026-04-19T08:11:41.130000",
          "created": "2026-02-13T03:00:49.872000",
          "tags": [
            "Zeppelin, Bloat-A, W32.Bloat-A, Zero-Day-Delivery, Protocol-Devi",
            "9698f46495ce9401c8bcaf9a2afe1598",
            "Imphash: 9698f46495ce9401c8bcaf9a2afe1598 | Imports (additional)",
            "MD5: b47266fef17ad4b2e4ca6ee1d06c39a7 SHA-1: cb92796715c799d7e71",
            "Filename: b47266fef17ad4b2e4ca6ee1d06c39a7.virus File Type: Win3",
            "Compilation / Toolchain Compiler: Microsoft Visual C++ 2017 Link",
            "DocuSign-themed phishing lure Invalid X.509 seal (\u201cBroken Seal\u201d)"
          ],
          "references": [
            "Conversely, Port 443 remains accessible, serving a WordPress-based interface backed by a freshly issued Google Trust Services certificate (Feb 4, 2026). This asymmetric configuration ensures that the structurally invalid X.509 \"Broken Seal\" is only delivered via encrypted channels, while the gated Port 80 tier prevents the discovery of the underlying Zeppelin/Bloat-A redirection logic by non-human-interacted sessions.",
            "Imphash: 9698f46495ce9401c8bcaf9a2afe1598 | Imports (additional): GdipSetSmoothingMode, I_UuidCreate, RpcStringFreeW, UuidCreate, UuidToStringW, InternetCheckConnectionW | Resource: RT_MANIFEST (1, ENGLISH US, SHA-256 4bb79dcea0a901f7d9eac5aa05728ae92acb42e0cb22e5dd14134f4421a3d8df, XML, entropy 4.91)",
            "Observed hosting and routing telemetry indicates the delivery infrastructure is operating through AS209242 (Cloudflare London LLC), suggesting the actor is leveraging Cloudflare\u2019s transit layer for resilience and to reduce direct exposure of origin infrastructure.",
            "Research into the gogetlife.co telemetry confirms a dual-port obfuscation strategy designed to bypass multi-layer security indexing. Forensic HTTP scans identify a Port 80 \"Fail-Closed\" state, where standard web traffic is gated by a Cloudflare-managed 403 Forbidden challenge, effectively neutralizing automated crawlers. Conversely, Port 443 remains accessible, serving a WordPress-based interface backed by a freshly issued Google Trust Services certificate (Feb 4, 2026). This asymmetric configuration ensure",
            "Compilation / Toolchain Compiler: Microsoft Visual C++ 2017 Linker: Microsoft Linker 14.16.27032 IDE: Visual Studio 2017 (15.9) Classification: PEBIN TrID: Win64 EXE (32.2%) / Win32 DLL (20.1%) / Win16 NE (15.4%) PE Section Entropy (Suspicion): .data 7.36 \u2192 high (suggests packing/encryption), .reloc 6.66 \u2192 possible runtime modification, .text 6.01, .rdata 5.88, .rsrc 4.72 Imports (Capabilities): CreateRemoteThread, CreateThread, ExitProcess",
            "Broken Seal exploitation: The invalid X.509 seal appears engineered to exploit verification logic gaps, forcing fail-open behavior and allowing SEG bypass under certain configurations. Human-gated delivery posture: Cloudflare 403 challenges suggest the actor enforces human interaction before payload delivery, reducing automated discovery and sandbox analysis. Industrialized infrastructure: Correlation across thousands of domains and URLs indicates a highly automated, rotating delivery ecosystem.",
            "MITRE ATT&CK: Process Hollowing (T1055.012): Documentation on the RunPE injection method used by the payload to achieve a fileless state in RWX memory. RFC 5652 - Cryptographic Message Syntax (CMS): This standard defines the structure of the digital signatures that this campaign's \"Broken Seal\" exploit bypasses.",
            "As of Feb 13 (early AM) \u2014 Indicators of Compromise: 17K | Types: Email (30), FileHash-SHA256 (2,146), URL (8,070), Hostname (2,755), Domain (3,528), Other (1,110) | Geo: US (233), Canada (15), China (10), Japan (2), Spain (2), Other (13)",
            "Verification failure observed in automated verification handlers during sandbox replay.",
            "The payload (SHA256: dfff54...4af) achieves a fileless execution state via Process Hollowing (RunPE), injecting into RWX memory regions of legitimate system processes to evade disk-based EDR telemetry. Anti-analysis controls\u2014including Bochs artifact checks, geofencing logic, and direct CPU clock interrogation\u2014are implemented to validate a high-interaction user environment prior to execution.",
            "Multiple antivirus engines flagged the sample with generic heuristic names (e.g., Trojan:Win32/Vigorf.A, Win32:Malware-gen, Trojan.Generic), consistent with multi-engine heuristic detection on VirusTotal.",
            "Malicious sample (SHA256: fa8e2ddfe42e77a9771a7c4d6421c7a808cf4508f8cd6dc6f4cf8bd4e2ae7f8f) detected as TrojanDownloader:Win32/Tugspay.A with YARA hits for Win32_PUA_Domaiq, aPLib, PECompact_2xx and IDS alerts including TLS Handshake Failure + 403 Forbidden, contacting 36 domains (e.g., api.123mediaplayer.com, static.sslsecure1.com) and IPs such as 104.18.23.19 and 193.166.255.171.",
            "SHA256 3d10374b55a18a2dd90d35d28472600496c680a7efab4e772595f735cb062343 identified as Win.Malware.Vtflooder-9783271-0 / Trojan:Win32/Vflooder.B with UPX/Nrv2x packing YARA hits, IDS detections for Win32/Vflooder.B check-in and DOS behavior, and network C2 indicators including 172.66.0.227 and 34.54.88.138.",
            "SHA-256: fc1fedce1419d4e2009828aad8644deca78b4eeed176e5b009797e0eb0d7d3ff \u2014 Detected as Win.Malware.Vtflooder / Trojan:Win32/Vflooder; UPX-packed PE32 executable, with 812 IDS hits (including C2 checkin + HTTP EXE upload).",
            "nationalgrid.com \u2014 Whitelisted domain (US, AS13335 Cloudflare) with 500+ passive DNS entries, 692 URLs, 195 subdomains, and 2 malicious files hosted on IP 104.17.1.192, which is concerning given the infrastructure and trust level.",
            "eversource.com (IP: 159.108.5.46, ASN: AS2024) has 2 flagged malicious files within its infrastructure, despite being whitelisted. The domain hosts 95 subdomains and maintains an active SPF record, indicating potential security risks under an otherwise trusted facade.",
            "Whitelisted IP Address 204.79.197.212 Location  United States ASN AS8068 microsoft corporation Nameservers ns4-205.azure-dns.info. ,  ns1-205.azure-dns.com. More WHOIS Registrar: MarkMonitor, Inc.,   Creation Date: Mar 26, 1996 Related Pulses OTX User-Created Pulses (50) Related Tags 2025 Related Tags 4328 ,  5943 ,  80211 ,  #supportsitewebsiteabuse #rootcertificatefailure #cryptographicf ,  The dynamics of the mudoSOSIntersectalign with sophisticated adv More Indicator Facts 982 malicious files communicat",
            "",
            "The AlienVault OTX report for flypdx.com documents 11 related tags, including ids detections and av detections, across 4 active AWS IP addresses (3.175.34.30\u2013.106). These indicators confirm the airport's network has been flagged for unauthorized activity, specifically pointing to a bridge between their web infrastructure and internal passenger tracking. The display of PII on aviation hardware during my June flight matches a known data-bleeding pattern where Personally Identifiable Information (PII) leaks fr"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "China",
            "United States of America",
            "Spain",
            "Japan",
            "Canada"
          ],
          "malware_families": [],
          "attack_ids": [],
          "industries": [
            "Legal, Financial, Healthcare, Government, Municipal, Real-Estate, Enterprise-Technology, Critical-In"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 27678,
            "FileHash-SHA256": 47676,
            "FileHash-MD5": 42534,
            "FileHash-SHA1": 23213,
            "hostname": 33703,
            "URL": 75433,
            "SSLCertFingerprint": 30,
            "CVE": 7582,
            "email": 313,
            "FileHash-IMPHASH": 8,
            "CIDR": 26205,
            "JA3": 1,
            "IPv4": 80,
            "URI": 5
          },
          "indicator_count": 284461,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 68,
          "modified_text": "12 hours ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69b7ac3b32ac89ecba53f3d9",
          "name": "Malicious",
          "description": "",
          "modified": "2026-04-15T08:44:52.171000",
          "created": "2026-03-16T07:07:39.495000",
          "tags": [
            "march",
            "input http",
            "posix shell",
            "ascii text",
            "threat level",
            "summary av",
            "detection",
            "environment",
            "action"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 291,
            "URL": 272,
            "hostname": 296,
            "domain": 293,
            "FileHash-MD5": 90,
            "FileHash-SHA1": 89,
            "CIDR": 3,
            "email": 3,
            "SSLCertFingerprint": 9
          },
          "indicator_count": 1346,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 49,
          "modified_text": "4 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69b5f9d274bcc1df8e48b1f9",
          "name": "CAPE Sandbox - LEN: 7 needs further review or whatnot.",
          "description": "OB0001\nAnti-Static Analysis\nOB0002\nCredential Access\nOB0005\nDefense Evasion\nOB0006\nDiscovery\nOB0007\nImpact\nOB0008\nExecution\nOB0009\nPersistence\nOB0012\nPrivilege Escalation\nOB0013\nFile System\nOC0001\nMemory\nOC0002\nProcess\nOC0003\nData\nOC0004\nCryptography\nOC0005\nCommunication\nOC0006\nOperating System\nOC0008\nCapabilities\nLinking\nData-Manipulation\nHost-Interaction\nAnti-Analysis\nCollection\nTargeting\nExecutable\nCompiler",
          "modified": "2026-04-14T00:14:29.475000",
          "created": "2026-03-15T00:14:09.815000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 448,
            "FileHash-SHA1": 239,
            "FileHash-SHA256": 219,
            "URL": 36,
            "domain": 48,
            "hostname": 133
          },
          "indicator_count": 1123,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "5 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6992bae83a5988dff8311490",
          "name": "Distributed Credential Exhaustion & C2 Orchestration via Golang-Based StealthWorker (ELF.Agent-VW)",
          "description": "Researcher credit: msudosos, level blue platform----\nThis artifact represents a high-integrity StealthWorker (GoBrut) botnet agent, architected as a statically linked, stripped 32-bit ELF binary to ensure cross-platform environmental independence. The sample utilizes XOR 0x20-encoded JavaScript payloads and String.fromCharCode obfuscation to mask its internal logic and bypass heuristic-based memory scanners. [User Notes] Its operational core is a multi-threaded service bruter targeting SSH, MySQL, and CMS backends, leveraging a massive infrastructure of 1,834 domains and 797 unique IPv4 endpoints for decentralized Command & Control (C2). Network telemetry confirms the use of ICMP and HTTP-based beaconing, indicating a sophisticated retry logic designed to maintain persistence across diverse network topologies. With a malicious file score of 10, this binary serves as a primary vector for large-scale credential harvesting and the subsequent integration of Linux infrastructure into global botnet clusters.",
          "modified": "2026-04-13T23:46:20.071000",
          "created": "2026-02-16T06:36:24.788000",
          "tags": [
            "Obfuscation: XOR-based String Encryption (0x20)",
            "T1110.001 (Brute Force: Password Guessing)",
            "Primary Hash (SHA256): cd3989830da99a69380901769fd78902efb3cd8ba",
            "MD5 Hash: f8add7e7161460ea2b1970cf4ca535bf",
            "#PotentialUS-Origin_FalseFlag_Obfuscation"
          ],
          "references": [
            "Primary Hash (SHA256): cd3989830da99a69380901769fd78902efb3cd8ba5c9390e94bd4333b7fad186",
            "Obfuscation: XOR-based String Encryption (0x20)",
            "T1110.001 (Brute Force: Password Guessing)",
            "This ELF 32-bit LSB artifact is a sophisticated GoBrut/StealthWorker agent, compiled via Golang 1.10 and stripped to obfuscate its high-velocity service-bruting logic. VirusTotal confirms a critical threat profile with 44/65 security vendors flagging the file, which leverages a unique Go BuildID (nGYES3pajdOm...) and a Telfhash (t1f303a0...) for architectural fingerprinting. The binary orchestrates decentralized Command and Control (C2) through an expansive infrastructure of 797 unique IPs and 1,834 domains",
            "Pivot-Ready Indicators (IOCs) Go BuildID: nGYES3pajdOmKy1i6Ghh/KO9ydOtZpXtoKtB0KHE-/iisNoniHgTbj_cV6M-uk/XmMYzkBiZs8NXMRZYTiT Telfhash: t1f303a0b3055d54e8b7f08907c7af7624cef6e0f726d078f169e278d09a72c826626874 Imphash: 9698f46495ce9401c8bcaf9a2afe1598 Vhash: 1e53f1a1b59ecb93f821c74b25d81e9f",
            "Researcher msudosos posits a strategic exploitation of Root Certificate Validation Failures, where the adversary leverages an expired trust chain to bypass heuristic security filters and establish persistence.",
            "his technique allows the GoBrut/StealthWorker agent to circumvent automated revocation checks, enabling its decentralized C2 infrastructure to recruit Linux hosts via high-velocity credential exhaustion.",
            "The local environment exhibits advanced telemetry suppression within specialized skim memory regions, effectively neutralizing standard DMARC validation and Microsoft-integrated defensive protocols.",
            "By maintaining a hollowed root posture, the sample facilitates persistent, low-signal synchronization with external cloud infrastructure while bypassing traditional heuristic trust-chain verification.",
            "The domain prioritywirreles.com (registered via NAMECHEAP INC) shows a 4/93 detection ratio, confirming it is a live but \"low-noise\" C2 node used to avoid broad-spectrum blacklisting",
            "",
            "The environment leverages prioritywirreles.com as a high-fidelity DGA-derived C2 node, utilizing its historical resolution to Russian-hosted IP space (194.61.24.231) to maintain persistent Stealthworker botnet synchronization.",
            "By operating through WhoisGuard-protected infrastructure and exploiting XOR 0x20 obfuscation, the adversary effectively suppresses telemetry into skim space, successfully bypassing DMARC and Microsoft-integrated trust-chain validation.",
            "The pivot from cd398983... to this domain confirms a multi-year campaign (2019\u20132023) utilizing Namecheap-registered infrastructure to orchestrate wide-scale T1110.001 brute-force operations while bypassing standard PKI expiration checks.",
            "LBresearcher: msudosos notes: The campaign's use of T1110.001 (Password Guessing) is specifically tuned to exhaust credentials across SSH, MySQL, and CMS backends, effectively recruiting server infrastructure into a global \"zombie\" network.",
            "LBresearcher: msudosos notes: The threat actor maintains operational longevity by rotating through WhoisGuard-protected nodes like prioritywirreles.com, which historically resolved to Russian-hosted IP space (194.61.24.231) to obfuscate its origin.",
            "LBresearcher: msudosos notes: By exploiting Root Certificate Validation Failures, the StealthWorker (GoBrut) agent ensures that its 32-bit ELF binaries bypass the automated reputation checks enforced by major cloud providers.",
            "Monitor DGA Shifts: Track new domains registered through NAMECHEAP INC using the current WhoisGuard patterns to identify the next cluster before it goes active. Analyze Telfhash Clusters: Use the Telfhash (t1f303a0...) to pivot and find if the adversary has updated to 64-bit ELF or ARM architectures. Harden DMARC: Ensure your environment moves from \"p=none\" to \"p=reject\" to mitigate the internal spoofing loops exploited by this botnet's telemetry suppression.",
            "Persistent C2 Orchestration: This ELF:Agent-VW variant serves as a critical GoBrut node, utilizing XOR 0x20 obfuscation and ICMP/HTTP beaconing to maintain a persistent link across 1,834 domains and 797 unique IPs",
            "Researcher msudosos: This activity appears to facilitate a preliminary reconnaissance phase, possibly utilizing system commands to query /proc/cpuinfo and /proc/version for architectural profiling purposes.",
            "Researcher msudosos suggests the VirusTotal (Tencent HABO) behavior report may indicate a potential execution path from volatile storage at /tmp/EB93A6/996E.elf.",
            "Msudosos Regional Notes: While historical pivots show Russian-hosted nodes, the current dual-origin telemetry\u2014dominated by 181 United States-based endpoints\u2014strongly suggests a domestic-aligned adversary leveraging global 'grey space' to obfuscate its operational core. This massive US-centric footprint (exceeding all other regions combined) reinforces the theory of a false-flag orchestration designed to divert attribution toward foreign infrastructure while abusing legitimate Western-hosted trust chains.",
            "WHOIS data anchors administrative and technical operations for prioritywirreles.com in Los Angeles, CA (90064) via Namecheap infrastructure. Following its 2020 expiration, the domain has transitioned into redemptionPeriod/pendingDelete status, signaling the formal decommissioning of this C2 asset."
          ],
          "public": 1,
          "adversary": "StealthWorker/GoBrut (The adversary demonstrates advanced telemetry suppression within specialized s",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Malware Family: StealthWorker / GoBrut",
              "display_name": "Malware Family: StealthWorker / GoBrut",
              "target": "/malware/Malware Family: StealthWorker / GoBrut"
            },
            {
              "id": "MD5 Hash: f8add7e7161460ea2b1970cf4ca535bf",
              "display_name": "MD5 Hash: f8add7e7161460ea2b1970cf4ca535bf",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1001",
              "name": "Data Obfuscation",
              "display_name": "T1001 - Data Obfuscation"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2166,
            "FileHash-SHA1": 2067,
            "FileHash-SHA256": 3371,
            "domain": 13295,
            "URL": 6860,
            "email": 272,
            "hostname": 4705,
            "SSLCertFingerprint": 268,
            "CVE": 107,
            "CIDR": 6
          },
          "indicator_count": 33117,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 62,
          "modified_text": "5 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69d0ac884cb646fac0b8d3d4",
          "name": "VirusTotal report\n                    for Other-20230212T074754Z-001.zip",
          "description": "<Registrant: 3432650ec337c945 \u00c2\u00a33.5m.>com - is the name of a German domain registered with the United-Domains AG.<pretext>\n\n3 hearts\npure bleeds. sigma shields. commander hunts.\nlegacy puppetmaster suppresses.\nthe octopus is forever tangled.",
          "modified": "2026-04-04T06:43:36.558000",
          "created": "2026-04-04T06:15:36.916000",
          "tags": [
            "date",
            "server",
            "registrar abuse",
            "postal code",
            "registrant name",
            "expiration date",
            "registry domain",
            "registrar iana",
            "registrar url",
            "registrant city",
            "ascii text",
            "javascript",
            "mitre attack",
            "network info",
            "dropped info",
            "file type",
            "processes extra",
            "overview zenbox",
            "linux verdict",
            "guest system",
            "ultimate file",
            "info file",
            "persistence",
            "next",
            "pe file",
            "text format",
            "ansi",
            "ms windows",
            "zip archive",
            "found",
            "crlf line",
            "windows start",
            "default",
            "delphi",
            "code",
            "malicious",
            "windows sandbox",
            "calls clear",
            "ascii",
            "java source",
            "web open",
            "font format",
            "truetype",
            "version",
            "python",
            "cape sandbox",
            "machine summary",
            "report time",
            "machine name",
            "analysis id",
            "machine label",
            "duration",
            "machine manager",
            "kvm os",
            "shutdown",
            "https",
            "shpk",
            "performs dns",
            "t1055 process",
            "layer protocol",
            "overview",
            "title",
            "phishing",
            "loader",
            "script",
            "meta",
            "albania",
            "structured data",
            "artan lenja",
            "street",
            "building",
            "tiran",
            "body",
            "icloud",
            "free",
            "apple",
            "link",
            "style",
            "doctype html",
            "timestamp",
            "sectigo",
            "official",
            "disney",
            "walt disney",
            "countryus",
            "center",
            "head",
            "forbidden",
            "creates",
            "command",
            "clear filters",
            "sigma",
            "verdict"
          ],
          "references": [
            "https://vtbehaviour.commondatastorage.googleapis.com/100a90c0ff019b19f0f2622cfa529d874f580b2ac6257d018e5eb9ab6d861f44_Zenbox%20Linux.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775281711&Signature=G81N%2BSvpl7rLMvDIGLovzSBK8YJzNBOTs7Ycfze1L%2BdFheZX%2BS6EbtlDx545BRgefMUoJSwn%2BdK4eRpYlyMGmHvkv2tw3apezXxBF5J95vedk3RlOzXgGUAvJvewt0RBBR9f9hiVn9CuYTHvY3Cf%2BVog32%2BRLrv8sMhZ%2FeqX0%2FhraP6leNtAta5iUv73pYWeMmdsQ7nX2EvTO7uUvGggX6TmnBhiHHd8E9uCsoPHCTP4i0",
            "https://vtbehaviour.commondatastorage.googleapis.com/100a90c0ff019b19f0f2622cfa529d874f580b2ac6257d018e5eb9ab6d861f44_Zenbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775281734&Signature=3FFHeC27RvCC9623M2f8xoSU4fl9LBd%2FvI%2F98rUNvmdceN4AZjjw77yTU0ApUTXU5FbdCpODVhKi0X4pqDz1pqEP%2FBRLq%2FNhgoRliai6LlD4yhdTtKNi4zrfCDG%2Bd4dRzD5y674IfEPynxGiFOWxc6wiCtl3rhwTPEqisyDqFbvnF57SxrcPoVSzVO3wEtxpCOIw8iAFXdW2zgnnYYbSrbaQBfghKLtFA6r2vP%2Bmrd33YSUiH%2Fe2EqBz",
            "https://vtbehaviour.commondatastorage.googleapis.com/100a90c0ff019b19f0f2622cfa529d874f580b2ac6257d018e5eb9ab6d861f44_VirusTotal%20Jujubox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775281812&Signature=jttp%2BTn66O5EfEB%2FASdpjDONf%2BzydGtfIUy3AtwYz0ppPzVA88%2BzZ8LtzV0TDhkMiju4oLHr%2BauJnKYexqnF0MfNTXGKPfj3ux9oZ2%2Baqve%2B3xgapdwdz0N64RgWo3SBqCKFBOQmi57mqIy%2F8qgnAfdVX99BwF2BuRSYSbIjNW5NHjir1JrAAKwOHZFyNsKj99PImyug2FPpRnss8VrJvDyYdnaGLHIAbZMRl72V",
            "https://vtbehaviour.commondatastorage.googleapis.com/100a90c0ff019b19f0f2622cfa529d874f580b2ac6257d018e5eb9ab6d861f44_Zenbox%20Linux.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775281904&Signature=B9x8BUVCeldkVImU%2Bb%2B7d97Q9Y2suAJFE1HvxBCu6MQUOt52HrgAUTBIeXPKgNP0gKiqrr%2BwDvN7q637Ht6n5C9QhuTPI%2FhWTub0F22jsp8lU2Pvp2bS%2FlaSchLRN5gDngyPABgnaqYERICP8QQkwfaB9pY%2Bii1%2FAeel%2BIDGYwxPPfIcYevejNv2O%2F0J6qYRftrtXwa95pbsecrfOzH6bpF3AzHQrTLJAuZ%2B%2BykW",
            "https://vtbehaviour.commondatastorage.googleapis.com/bc3cc97398d5f56a4731085e8a385694f6ef1ab37243c6c00deed4a1335ced55_Zenbox%20Linux.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775281954&Signature=Tythlx%2B0x7Dzf2SYvJDgwby2Ifinb7IbK5GTx%2ByqvqVc1r4cz7rhoVD3NZqUAgUpxSkIAsRAK5WV5tMXUGiiB6JWp8Y9YmaL7Zhb5NxMBcodk57r7XhYzEbDxYg%2Fh1ChwMliA5cBr%2BXbUcW4q2aA4xQeNE1XVNpalGtyHh8bsDTKgQG0Ch1gikPF%2BeKc2ANprXe6z%2FJBXtqJBxh6%2Bem6fGON6%2BpRP1%2BgmNg4%2FtFnlQ",
            "https://vtbehaviour.commondatastorage.googleapis.com/bc3cc97398d5f56a4731085e8a385694f6ef1ab37243c6c00deed4a1335ced55_CAPE%20Linux.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775281979&Signature=LrquDQAOc%2Bf90O7wkZ9lRNx5uIZopS4VL7qYn7UKkzTI19c7sNJWNdGeBPtnE%2FG4yxsv1tBxkoojr78E808e78vceGG2xskRT6tUTjtDo2c8JW%2FD9Mr5ZAVe8Cn%2BP%2BpCbBkZXbtaceCtVq0b9zVWx9YstN2ju69uofX50LbI%2FgmHh%2Bghta79DgdBrNmkcQEXDu7t%2FqSZSozfso9i%2BoSZdHXEfsU59hoc%2FhUSoPMEPGFU",
            "https://vtbehaviour.commondatastorage.googleapis.com/fa8a59149604c73572bf92b42640de49faa7e8f16cd4bc18345d3e6a16378744_Zenbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775282019&Signature=VwsuvdyY52E5jzftipHSNWVrwmO7YUwSQa9yHiMIgbsXcJDnDNcdELamMXjmvzDn%2FT6L5HguJFyj%2F4DHLmPfddzVphNAKCPvz3IRVae2piJ%2B8VWa2%2B98W3RjMft93LZhdNHwxeEYM8oJ%2FOjAjw%2FIicginJBUwlGeHX3kfTJieSEC7SYf6BkJ4UNfnF2pPQjiaAqG9mop%2FPKsB%2FF1K%2FrL7Rpsxwhl1rGglHYPM4%2BtJj6zDYx%2F",
            "https://vtbehaviour.commondatastorage.googleapis.com/fa8a59149604c73572bf92b42640de49faa7e8f16cd4bc18345d3e6a16378744_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775282044&Signature=Y%2FEJZwm3h4tUuhn9%2FgO7QDcTnUoojZIDnoL%2FuGaoe0o5h%2FPUEiZpyFQLH9JfrvNN0h58UWlcJNCMxaSZl%2BZDvBDliVat0wDr0fE35mo0jGTK3uwa7DykFrjyI0NAVFlzkVSyxC0euM4lSJaw9PqyJGgLb4FfaztkzK7ZQYTIsGMYWSsCAKzatCObwK%2B8nqV63M9VXUeJy8ZQx7IwbttNffD6FQUaPbtCwlsywb%2Bu7NVqkFSG",
            "https://www.icloud.com/attachment/?u=https%3a%2f%2f%cvws.icloud-content.com",
            "https://vtbehaviour.commondatastorage.googleapis.com/ba49f65ef5d694311c535991812ee2fa8f0c639f4e053d136c1161b8b1bfaf8f_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775282803&Signature=CE28%2B8Orp96YBz3AWi4L4LJoj5B677T4lpyJl4VIG%2BN68qLtOorzpmY%2BdQgPcKJxqxcvmf3JmeA2zAZFyVdmEzznUnaiSY6xhbkbZ8nrReWLN9MBQZJuFd6by3aYlQoYFg2Bxu5d%2FLEAxWm4ljnJApBcv1csUNbJ8KxjkdXXAyPkiWPwMc4JDmXrnH5%2FXBQ7Tf1qxmze1lX2S5QvktDVUA3Bdn67nGtMvguY5EIl7tj1AezbuTFM",
            "https://vtbehaviour.commondatastorage.googleapis.com/68e1e958d101feb1044553d3e8ba341448a17d917e4b613cb05873814159ed40_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775282913&Signature=TKCWJVTu8VHNWLhsI%2BkIN06KJgV4R1%2F2oO9G3V2x%2Bdxi14E9JDPHosmNkN%2Fk02BRc0I8Yg4HJPmcxjdAvb8mTCZjA10bizFznZC3epwH0hmoxTVgryMxpD%2B7zTQqKIRpE9UGGC1WSu0CTJ3rI9dCyopLkmeiyJPVw%2BIuERp37p2MEwzwwIPRuYpB190GfOdCkGt6TuMjDG6cVa%2BxvJlEdoEw8US6W8WPaioxSu1KVCoKjwky",
            "https://vtbehaviour.commondatastorage.googleapis.com/ffe3319990984c10c84fc18f6c1d40b2c7ad44666ebc2b54368bd96327ec6abc_Zenbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775283093&Signature=GU02WhsC3g0ztmDdXDNuqx9T9POv8DnaMp7NQX%2B70%2FybCmZtbIpyPiUCOuYG5ZD1RY8bCIR9k%2F%2BGsKSwWLVUNNih3CgvqShoWsNfLKvtS%2BDRbmV6G4ohLWIP0xPHJOCA%2FWvnSdblJ%2FdibwXFCT851RdpfK3f6ph2EPHXIq%2FBwhSc28%2BJfFSMK%2B1toESpR7COi%2FUwpnMfcoSpcIMZudaaU8JrTvEVLgtJ%2FAgHjmfoXxvJlD",
            "https://vtbehaviour.commondatastorage.googleapis.com/02b1749e96b257099d5bafaeb1fc502442b4e064cca63fbcf4fc52af34b6435d_VirusTotal%20Jujubox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775283154&Signature=m%2BGdulpws9rcUoJIzr45sR5qJdIxK89UYb6GUJL6p7n4mgYV69NJWbc3Jslcn117UKHnbSYYtRZSBRhviHhLuWsbhUG199mW8iGDiwaarp%2BbvmEIw6OXF2MgVIh%2FrJYr8slRZbUwjd9t8dMWwn%2FM5DNq6AzLyBqpznrBoVrvlibZuA9pWsHraA3P24WyEGUlbWN3NqLfmJ6gDeCKRfG7zhubGI%2Bb8Wl8GaBCodOtX2LlrA",
            "https://vtbehaviour.commondatastorage.googleapis.com/3e6e0898a7b1b297d2b9322f5f578b02e2fd5d5647dbeef6b9273cda383e1547_Zenbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775283189&Signature=PtLPpZoeHrLkYIaV2etyfYslOxR9PtxqmjNNDdMHoJjBUuweFaoOVGyfkf%2BUGEiGQCogCu7az%2B4btIJ3frL%2BEdzwNV7Ufeb24KQqbVUQrVITPGPCW42mMdsKdDoNQsqLooDqFsjxRGt2meZgP3F3roSTIWDEJPwr35bBBkdANOOdXZG1mg3O8JHm35%2BBQMkSxOiAxeftigjPK7On%2Fk%2FvMli1USxDUfi2eRlkRaL090nKenRXt3cz4FEBe8"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1064",
              "name": "Scripting",
              "display_name": "T1064 - Scripting"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1564",
              "name": "Hide Artifacts",
              "display_name": "T1564 - Hide Artifacts"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1046",
              "name": "Network Service Scanning",
              "display_name": "T1046 - Network Service Scanning"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 359,
            "email": 2,
            "hostname": 664,
            "URL": 794,
            "FileHash-SHA256": 827,
            "FileHash-MD5": 21,
            "FileHash-SHA1": 17,
            "IPv4": 187
          },
          "indicator_count": 2871,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "15 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69cf461ebc1a9bcfbffa2aad",
          "name": "VirusTotal Droidy Android Sandbox",
          "description": "Here is the full list of results from the second day of the 2016 Android World Championship, held at 22:00 BST on Tuesday, 1 July.. . and \u00c2\u00a31.\n\ni cant add this one - legacy - http://100tosdefotos.com/",
          "modified": "2026-04-03T05:08:23.191000",
          "created": "2026-04-03T04:46:22.211000",
          "tags": [
            "process",
            "current object",
            "android sandbox",
            "europemadrid",
            "windows sandbox",
            "clear filters",
            "has permission",
            "file type",
            "apks",
            "accesses",
            "sim provider",
            "name",
            "may check",
            "mitre attack",
            "network info",
            "malicious",
            "persistence",
            "cloud",
            "chrome cache",
            "png image",
            "cache entry",
            "rgba",
            "entry",
            "web open",
            "font format",
            "version",
            "truetype",
            "next",
            "detail info",
            "text",
            "classname",
            "window",
            "static",
            "behaviour",
            "filename",
            "offset",
            "class",
            "button",
            "mozilla",
            "shell",
            "nsis",
            "find",
            "back",
            "state",
            "connecting",
            "connected",
            "suspended",
            "disconnected",
            "unknown",
            "shell folders",
            "default",
            "inprocserver32",
            "new roman",
            "registry keys",
            "nothing",
            "shell dlg",
            "roman baltic186",
            "roman cyr204",
            "roman tur162",
            "xffxfea xffxfea",
            "xffu xffu",
            "xffxfcs xffxfcs",
            "x8af x8af",
            "xb6p xb6p",
            "xb6y xb6y",
            "x88g x88g",
            "xb6xf2 xb6xf2",
            "xfft",
            "xc1xe7 xc1xe7",
            "axec",
            "programfiles",
            "allusersprofile",
            "windir",
            "protocol level",
            "application",
            "previous",
            "next connection",
            "address",
            "full path",
            "behavior",
            "bits",
            "dump",
            "path",
            "calls clear",
            "eandroidruntime",
            "pufwifi",
            "flag",
            "networkinfo",
            "action",
            "extras",
            "start",
            "componentname",
            "write",
            "calls process",
            "cname",
            "file size",
            "mwdb",
            "bazaar",
            "sha3384",
            "ssdeep",
            "address virtual",
            "path c",
            "sha256",
            "accept",
            "shutdown",
            "error",
            "sandbox",
            "stack",
            "win32 exe",
            "pe32",
            "intel",
            "ms windows",
            "win16 ne",
            "os2 executable",
            "generic windos",
            "executable",
            "dos executable",
            "generic",
            "processes extra",
            "performs dns",
            "t1055 process",
            "overview",
            "overview zenbox",
            "verdict",
            "guest system",
            "ultimate file",
            "android",
            "zip archive",
            "xapk android",
            "android package",
            "java archive",
            "sweet home",
            "design",
            "html document",
            "unicode text",
            "utf8 text",
            "crlf",
            "lf line",
            "language",
            "date mon",
            "gmt contenttype",
            "connection",
            "link",
            "json",
            "xlitespeedcache",
            "reportto",
            "server",
            "contentencoding",
            "cfray",
            "king88",
            "ch cng",
            "c thit",
            "c bit",
            "iu hp",
            "trang ch",
            "king88 com",
            "ci ng",
            "cp s",
            "c vit",
            "object",
            "string",
            "number",
            "null",
            "function",
            "g5wmgjr5qk4",
            "cssselector",
            "regexp",
            "date",
            "void",
            "trident",
            "mini",
            "meta",
            "please",
            "javascript",
            "members",
            "staff",
            "inspection",
            "abip",
            "local broadcast",
            "newsletter fcc",
            "resource center",
            "marshfield high",
            "school",
            "localism join",
            "facebook",
            "contact",
            "summer",
            "grave",
            "email",
            "photo",
            "strong",
            "peter deftos",
            "sign",
            "learn",
            "memorial",
            "leave",
            "problem",
            "done",
            "already",
            "close",
            "verify",
            "twitter",
            "details",
            "full",
            "persist",
            "editorimpl"
          ],
          "references": [
            "https://vtbehaviour.commondatastorage.googleapis.com/a0fb314babd51dbc460ab126b615da4c6f9481f5d1225d0ac189da9d99923bb3_VirusTotal%20Droidy.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775189779&Signature=KfMCCyf96T3bMlo9SpmV1KGK0zKBbkhhSc6Ig5Hvwfx%2FTKTqEVBDXB28XNeWzWbCRTwCNnYlHV3Ed%2BMjcd%2B1aCTDYi5GH9Qw3msxqk5iKwRhzDIhfpM98SwOLC%2B7xZUAC60ecDmVDsjA9OOwOkJe87q3Rrx2lrU9%2BjuSJ1EdwI16qoJyd29sLcX7STTqAMHuzCjIixIOre64HAjpH4lt%2F8tSgE1A5Rs2V7PRHSX6ibKLD",
            "https://vtbehaviour.commondatastorage.googleapis.com/a0fb314babd51dbc460ab126b615da4c6f9481f5d1225d0ac189da9d99923bb3_VirusTotal%20R2DBox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775189811&Signature=O96heM5BVAaltXSZInHXgIgK35KjLrLg%2FfKtFXVS%2BoRHTlfpZtn4LpFvolATpK7dED66Ms7SXpn8nX0i7j1IpuDOXOXSm112TOKIKVVPZJH5ppCD6uFYvhkfNcQGa%2FXK%2BDixyM%2BuqwGoJSFD6QzP8J2Iz1GyU4RYYWuB2C7ZD7LOWKlvxF%2F9LTAX8jFDLgFVsE3Og3cU8y3jK%2BenDPthRM6YFu3qewxpti7KVNwKeMJ",
            "https://vtbehaviour.commondatastorage.googleapis.com/a0fb314babd51dbc460ab126b615da4c6f9481f5d1225d0ac189da9d99923bb3_Zenbox%20android.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775189872&Signature=P%2Fa2KXhuVwj4RO8cyfIpkYofLKzsLiKRPHuVAi7hjApskLh84OqCfKuK51z7bTKZd8lCCiQ7XuIaxWQDR7qzDFvuCWutobNhKDdHSDLrTMtqqX3o5RmBpSzMUw3jQJcbxsYWqaOMHy8ZeWEVRuB9orvLwMZbJMMIJM8GhUVHZ6%2BwciVIoj0lYTCb%2FEEkQWTV4g3hs9l8KRzbEfvJGja6ANuv1OtdFLk8pejrraAJMB7ThsjINOXbJb",
            "https://vtbehaviour.commondatastorage.googleapis.com/5dae281deccea2c5229861b4f2ff8c386da1726a836839961311896a6c9f5a69_Zenbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775189913&Signature=KduKv0QQf8IKhUUAV%2F0zpzpUmIU%2BEctpJKxUJlyu0Myu11iCQCXfXPprtMBAv5ifc4GLTHDiIuEAJwg%2B%2BHGWjun5ZKLKzoz8Ot2udHqFxvy6ZToPEC4Iui9vdRDHqosVaT77R1Tm1TGuyKVmwYTcow4klVAcpzEWanzWx1jHS42ARepJVrS3AFXHMaaBdTgr23jXcbmly1t3b8lwVilcsk2itdoprPpClQTzwYr1y7YV1%2FbYTDGocHnDwCYy",
            "https://vtbehaviour.commondatastorage.googleapis.com/37efacb8411234dd9882d8d3a8709f492eb2ed252132da099a11be07c0b4ccb0_Tencent%20HABO.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775189954&Signature=2gy%2BsyEM78P6orDGWKQU%2FFPSIdVK9X7o8Nkcwb%2BY4r%2FCb%2Bo9JmA9T%2Bfonw9IqbojQSIK%2BNShZUJJ9GV4wWT5l1QfkYfZP0MJ91%2BkDw39PLOc4VVgmBApIQJRTIlgSlI020YfOeIPoIYH8yuCF2dJ32zKg87g0dDFkg4zbExGDJB3%2BGDxX5MJ6hHuzVrwxm7E1L%2F%2FffKQ%2B9rXqoT0hRHEdPSaXSydmnqfMfnjCv",
            "https://vtbehaviour.commondatastorage.googleapis.com/970fdc4da66bc8fff977698c150fc6ebdf9488356ed41ded52d2659830ec5353_VirusTotal%20Droidy.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775189984&Signature=f%2FZZkKTu5zUihkCuCj%2F0pEGmBjWWBiZRDmREgGkkkKvTyR7M5iC0oLGYfaL6WibiUB6pQirxgBtEcS2JtupD291Or3j7%2BKoyngW7R9uf%2FjjWQwfC5YHKjNutT6K5TYuEmzySVs9onhIBSjj4U%2Bi2q%2FMJmQFiDtFZHfcyy00LYqbAbBwEAUnVJZUdH6FvNBu4ArU26VDLDwv1nMSgEjxUWBCwiP4HXlwL5%2BxU6y0eTc2",
            "https://vtbehaviour.commondatastorage.googleapis.com/37efacb8411234dd9882d8d3a8709f492eb2ed252132da099a11be07c0b4ccb0_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775190004&Signature=Nzt9YHY3Ji2VsLO1kvr7%2FyWWwOgo%2BCIoXyjtyshhzTGRxGzhcNdyKU9byPqyv%2F5YAzj%2BmNnDego3ImYeToBCbgyY%2BJJMmUKX6ZrUT1a2O4gv9eMyysIFgYhJ7ZpzyGIvHR5VSJlzPX0AWS81Ml7syDCjTGHikZ9G%2B%2B0cfDA0dhp%2FR7zhAp7yxB2jsDhz1kDY3nncYpjeVtj2o02Nt4JxPa5ML%2FvKBF%2FBHtOtBCqh%2",
            "https://vtbehaviour.commondatastorage.googleapis.com/1256f3aa5f091ac40a573113fcc1a4d0e320af5ee363b0eca79618602cb7dc66_Yomi%20Hunter.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775190083&Signature=a1bnyt5OUcTN8ONeNVqbY%2Fe%2FDVJ2N3olQ9r59dijMLLegF84xQDghj0r6VPdFB8fc%2B3QTcJqhpm6vag1pK9us%2F3UqDJ3Yubf%2FukjL4GMKXDdMSggljB7d%2FpkTraQysnttspVal56LzXitjgIEGYZTidKcIv5LM6YH4zCAXn%2BVueaBNIgpcDS0RuX8fVAQYOeftW9AiEz2TZzx1BT6KUgoj0Tzetn4k541357bb58K1w9n9QV1",
            "https://vtbehaviour.commondatastorage.googleapis.com/1256f3aa5f091ac40a573113fcc1a4d0e320af5ee363b0eca79618602cb7dc66_Dr.Web%20vxCube.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775190146&Signature=3XpRLUQ3g712Vw0Gv1aflVxZs7RKpzIhEK8giO9ydwOrOGjLnAK89Y%2BmEf4g2U2YbO04EE%2BcdR5xPgcch1%2B1Gf4thYCgBcbKEEIfNK5UrJwBpAkYRm3D9xsnD%2FVxZt26yLC6aQy87D%2FKNC9aLvViRHGxuFgOp4zkcU%2BRD6mmpIB8SpX5%2BDpocWc4s9R%2BywRPXZ2U2E49g81i%2B5io3Ycqe8ikdjbPlZo9R0KEFLaDQtH",
            "https://vtbehaviour.commondatastorage.googleapis.com/37efacb8411234dd9882d8d3a8709f492eb2ed252132da099a11be07c0b4ccb0_VirusTotal%20Jujubox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775190199&Signature=RiO2p%2BBvc38TqeTuiMJNxoT6Jr3JfHvTQFQIk94ZaRY%2FPP5yEPSH45GncMCh4GqP1%2F%2BNLR2IVm5Z2svEWojLwxq%2Fl0eIAWy1chUQmg2GcEg5YoaEEnXpWjb1er08EIYwV0ZC8parFwVrr194MKeUmZYo5NLYk4%2BCim9ipnxYse12eROsMSXZtyS4daGivzQzihRqTUU9iEn%2FxAKEOI%2F3V8JRrqNy3nDqmo1mdoVr",
            "https://vtbehaviour.commondatastorage.googleapis.com/bc20f137a2281fae2ee13f698e613e72c37f6b4eb6784653f284f11f4d83ba77_Tencent%20HABO.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775190236&Signature=Fg7jPZWmHQO%2BH8GRQx%2FxSMq5Na7Oo9cN0HR99DHFY8svYTkPoerGELKx7Sf906aTDq2Rer45ajXeYPzzHTiab9NKqWR1JGHbaq0WapVqsRzvXz2QLuBhHoz50tIoVKnx8ZrN9HqHBQweg8nfN%2FWEoaHVlSgav3jhoNTnZAC%2Fa%2BsTLexjXFBIP2v4jpISAl82ESU%2FGZH64BtZpgIJz7RZXdDqZ3LF7JTgwG2JX94%2BOOSn3G14",
            "https://vtbehaviour.commondatastorage.googleapis.com/5dae281deccea2c5229861b4f2ff8c386da1726a836839961311896a6c9f5a69_VirusTotal%20Jujubox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775190298&Signature=eEF6m7QHRnKk%2FYB374HxqU2TE0p8gXC9CWwIHPT7M6fEZKjeFUEmUEbqdupsD2hQQbkW%2Fmijo2rSEQ30q3EAyR9aQO3m6L91A6osc3kDipeyZqFrIqoj6wIe8MJGuRf4OC9cVAWipGYXPG5bqc3v6RUHir9MeLOggoGjalexCwBgs3SsGyhqU1uWZdJ%2Fs4nUbHyIJGc3FB9OrnhDRuGPdkfPSOA09hfujcul91zQNws4dznvmM",
            "https://vtbehaviour.commondatastorage.googleapis.com/a0fb314babd51dbc460ab126b615da4c6f9481f5d1225d0ac189da9d99923bb3_VirusTotal%20Droidy.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775190345&Signature=33%2BM36uNOvEfi8bNtJvnbxcTgcnoIlIO2vBglXpCJFNwC8HAewGOF91Q26TOAsw4sbmtTxQ2F5Q2jv2V3ULV8MAxxgYVptJ69SusRt7qZeBDUpMY%2BOdTYqjkdBuYUqYiCvM756aQheS1KvDepeD64x8e%2FivWkpm%2BZ9yDaKUc7w2143zYkc8kpyBSsO8rJI9vyoHYvbr4sfZOowoUWK7yMjQD9SN5bL%2FFABbMrPEOMyobApm",
            "https://vtbehaviour.commondatastorage.googleapis.com/06b6d62477011fa63fdb44046351fbe574391916a4f3ea0486b3e3498145a7d7_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775190407&Signature=Y3EAa%2Fwo4ligJHfBUxkzWLjU9FPLyNmsxeNdcPCIPQBYTTGUIaFddrFIYHFhawxMDvixd7uA0qGc0zVDWgbStf2qhTOU1D0aF%2F%2BSLSXEY3VB8oWRXZCEI12zrSd5P4lHInxRS3CJKbNnJP4GvYx20ctpNSo4u%2FvVMLM%2B92TiYCunAVTquDVrFNNim6LJTEz2ucjhcgF2gKn%2FF0f9ALEheC1lk4omwpcYEPQLNX0wNsxNC%2BWQ",
            "https://vtbehaviour.commondatastorage.googleapis.com/bb46c18b5b2c98937c8fdfb7acd3e0fa4d0534cfc44d4b41ccd6db9198266fbf_Zenbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775190605&Signature=Rcvj5v%2By7yAX52ap8q3zDGTMjVRQm1LkjuWyhDQUaO6QXR1Ld%2F1dD2QjluOGOuXNiW%2FMNP%2Bqj%2Bx6KtYCvttE847keFo1Em2Bm%2F8bv4vK%2FJL0nGIiz%2FatgO7O78LZZ1wkYwcfG5JZAj8VdjDlHQbuOIUz8Nahqt2JUyQ84z3OeH5d3%2BjV8NKW5SjGWQw4mcmjPQXUznoCsysLbjCd5sgZTpyLUdeFJcNKQPiNBURsJeiyCI5llz0j",
            "https://www.googletagmanager.com/gtag/js?id=GT-NNS2QH6C",
            "https://www.googletagmanager.com/ns.html?id=GTM-PHWTRTJ",
            "https://www.virustotal.com/gui/url/f6db0235760bd467ca822ad515a8410121fde4713501b3e718b8fb127dfa259c?nocache=1",
            "https://www.massbroadcasters.org/eeo-organizations/marshfield-high-school",
            "https://www.findagrave.com/memorial/139047900/peter-deftos",
            "https://vtbehaviour.commondatastorage.googleapis.com/a041cbdeb64c802bde90e06f25213524b2eac500d6000da7e4caeb96e5de1991_VirusTotal%20Droidy.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775191439&Signature=evxsL1kaOuLe5KziYCSqZ56H%2FqXRQgEN0tkJo0j5G7JQ3mmO0Kav5K9LCz%2FUEzi%2BdtB%2B3%2B7VM6r9pC%2BMh7nHxT%2Bs8UAYuVXPE%2FUbBdHWMjvZQuqrZ0hHqIR2xHVB132HiYQWLo%2FgS1QATOfAcHci3X4FqmqvUp7A%2FmNsE1aVFbLc971RHQOuTapOGhiDZlVUyA9KvpMDKw0DzdeHFSlayBSrDDsWL7xW06XOf"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1016",
              "name": "System Network Configuration Discovery",
              "display_name": "T1016 - System Network Configuration Discovery"
            },
            {
              "id": "T1406",
              "name": "Obfuscated Files or Information",
              "display_name": "T1406 - Obfuscated Files or Information"
            },
            {
              "id": "T1409",
              "name": "Access Stored Application Data",
              "display_name": "T1409 - Access Stored Application Data"
            },
            {
              "id": "T1412",
              "name": "Capture SMS Messages",
              "display_name": "T1412 - Capture SMS Messages"
            },
            {
              "id": "T1413",
              "name": "Access Sensitive Data in Device Logs",
              "display_name": "T1413 - Access Sensitive Data in Device Logs"
            },
            {
              "id": "T1414",
              "name": "Capture Clipboard Data",
              "display_name": "T1414 - Capture Clipboard Data"
            },
            {
              "id": "T1418",
              "name": "Application Discovery",
              "display_name": "T1418 - Application Discovery"
            },
            {
              "id": "T1421",
              "name": "System Network Connections Discovery",
              "display_name": "T1421 - System Network Connections Discovery"
            },
            {
              "id": "T1422",
              "name": "System Network Configuration Discovery",
              "display_name": "T1422 - System Network Configuration Discovery"
            },
            {
              "id": "T1424",
              "name": "Process Discovery",
              "display_name": "T1424 - Process Discovery"
            },
            {
              "id": "T1426",
              "name": "System Information Discovery",
              "display_name": "T1426 - System Information Discovery"
            },
            {
              "id": "T1429",
              "name": "Capture Audio",
              "display_name": "T1429 - Capture Audio"
            },
            {
              "id": "T1430",
              "name": "Location Tracking",
              "display_name": "T1430 - Location Tracking"
            },
            {
              "id": "T1432",
              "name": "Access Contact List",
              "display_name": "T1432 - Access Contact List"
            },
            {
              "id": "T1439",
              "name": "Eavesdrop on Insecure Network Communication",
              "display_name": "T1439 - Eavesdrop on Insecure Network Communication"
            },
            {
              "id": "T1447",
              "name": "Delete Device Data",
              "display_name": "T1447 - Delete Device Data"
            },
            {
              "id": "T1472",
              "name": "Generate Fraudulent Advertising Revenue",
              "display_name": "T1472 - Generate Fraudulent Advertising Revenue"
            },
            {
              "id": "T1507",
              "name": "Network Information Discovery",
              "display_name": "T1507 - Network Information Discovery"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1523",
              "name": "Evade Analysis Environment",
              "display_name": "T1523 - Evade Analysis Environment"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1189",
              "name": "Drive-by Compromise",
              "display_name": "T1189 - Drive-by Compromise"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 70,
            "FileHash-SHA1": 40,
            "FileHash-SHA256": 549,
            "URL": 344,
            "domain": 292,
            "hostname": 443,
            "IPv4": 127
          },
          "indicator_count": 1865,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 49,
          "modified_text": "16 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69cf461ceb2e58f5e3c0a44d",
          "name": "VirusTotal Droidy Android Sandbox",
          "description": "Here is the full list of results from the second day of the 2016 Android World Championship, held at 22:00 BST on Tuesday, 1 July.. . and \u00c2\u00a31.\n\ni cant add this one - legacy - http://100tosdefotos.com/",
          "modified": "2026-04-03T04:48:04.475000",
          "created": "2026-04-03T04:46:20.102000",
          "tags": [
            "process",
            "current object",
            "android sandbox",
            "europemadrid",
            "windows sandbox",
            "clear filters",
            "has permission",
            "file type",
            "apks",
            "accesses",
            "sim provider",
            "name",
            "may check",
            "mitre attack",
            "network info",
            "malicious",
            "persistence",
            "cloud",
            "chrome cache",
            "png image",
            "cache entry",
            "rgba",
            "entry",
            "web open",
            "font format",
            "version",
            "truetype",
            "next",
            "detail info",
            "text",
            "classname",
            "window",
            "static",
            "behaviour",
            "filename",
            "offset",
            "class",
            "button",
            "mozilla",
            "shell",
            "nsis",
            "find",
            "back",
            "state",
            "connecting",
            "connected",
            "suspended",
            "disconnected",
            "unknown",
            "shell folders",
            "default",
            "inprocserver32",
            "new roman",
            "registry keys",
            "nothing",
            "shell dlg",
            "roman baltic186",
            "roman cyr204",
            "roman tur162",
            "xffxfea xffxfea",
            "xffu xffu",
            "xffxfcs xffxfcs",
            "x8af x8af",
            "xb6p xb6p",
            "xb6y xb6y",
            "x88g x88g",
            "xb6xf2 xb6xf2",
            "xfft",
            "xc1xe7 xc1xe7",
            "axec",
            "programfiles",
            "allusersprofile",
            "windir",
            "protocol level",
            "application",
            "previous",
            "next connection",
            "address",
            "full path",
            "behavior",
            "bits",
            "dump",
            "path",
            "calls clear",
            "eandroidruntime",
            "pufwifi",
            "flag",
            "networkinfo",
            "action",
            "extras",
            "start",
            "componentname",
            "write",
            "calls process",
            "cname",
            "file size",
            "mwdb",
            "bazaar",
            "sha3384",
            "ssdeep",
            "address virtual",
            "path c",
            "sha256",
            "accept",
            "shutdown",
            "error",
            "sandbox",
            "stack",
            "win32 exe",
            "pe32",
            "intel",
            "ms windows",
            "win16 ne",
            "os2 executable",
            "generic windos",
            "executable",
            "dos executable",
            "generic",
            "processes extra",
            "performs dns",
            "t1055 process",
            "overview",
            "overview zenbox",
            "verdict",
            "guest system",
            "ultimate file",
            "android",
            "zip archive",
            "xapk android",
            "android package",
            "java archive",
            "sweet home",
            "design",
            "html document",
            "unicode text",
            "utf8 text",
            "crlf",
            "lf line",
            "language",
            "date mon",
            "gmt contenttype",
            "connection",
            "link",
            "json",
            "xlitespeedcache",
            "reportto",
            "server",
            "contentencoding",
            "cfray",
            "king88",
            "ch cng",
            "c thit",
            "c bit",
            "iu hp",
            "trang ch",
            "king88 com",
            "ci ng",
            "cp s",
            "c vit",
            "object",
            "string",
            "number",
            "null",
            "function",
            "g5wmgjr5qk4",
            "cssselector",
            "regexp",
            "date",
            "void",
            "trident",
            "mini",
            "meta",
            "please",
            "javascript",
            "members",
            "staff",
            "inspection",
            "abip",
            "local broadcast",
            "newsletter fcc",
            "resource center",
            "marshfield high",
            "school",
            "localism join",
            "facebook",
            "contact",
            "summer",
            "grave",
            "email",
            "photo",
            "strong",
            "peter deftos",
            "sign",
            "learn",
            "memorial",
            "leave",
            "problem",
            "done",
            "already",
            "close",
            "verify",
            "twitter",
            "details",
            "full",
            "persist",
            "editorimpl"
          ],
          "references": [
            "https://vtbehaviour.commondatastorage.googleapis.com/a0fb314babd51dbc460ab126b615da4c6f9481f5d1225d0ac189da9d99923bb3_VirusTotal%20Droidy.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775189779&Signature=KfMCCyf96T3bMlo9SpmV1KGK0zKBbkhhSc6Ig5Hvwfx%2FTKTqEVBDXB28XNeWzWbCRTwCNnYlHV3Ed%2BMjcd%2B1aCTDYi5GH9Qw3msxqk5iKwRhzDIhfpM98SwOLC%2B7xZUAC60ecDmVDsjA9OOwOkJe87q3Rrx2lrU9%2BjuSJ1EdwI16qoJyd29sLcX7STTqAMHuzCjIixIOre64HAjpH4lt%2F8tSgE1A5Rs2V7PRHSX6ibKLD",
            "https://vtbehaviour.commondatastorage.googleapis.com/a0fb314babd51dbc460ab126b615da4c6f9481f5d1225d0ac189da9d99923bb3_VirusTotal%20R2DBox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775189811&Signature=O96heM5BVAaltXSZInHXgIgK35KjLrLg%2FfKtFXVS%2BoRHTlfpZtn4LpFvolATpK7dED66Ms7SXpn8nX0i7j1IpuDOXOXSm112TOKIKVVPZJH5ppCD6uFYvhkfNcQGa%2FXK%2BDixyM%2BuqwGoJSFD6QzP8J2Iz1GyU4RYYWuB2C7ZD7LOWKlvxF%2F9LTAX8jFDLgFVsE3Og3cU8y3jK%2BenDPthRM6YFu3qewxpti7KVNwKeMJ",
            "https://vtbehaviour.commondatastorage.googleapis.com/a0fb314babd51dbc460ab126b615da4c6f9481f5d1225d0ac189da9d99923bb3_Zenbox%20android.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775189872&Signature=P%2Fa2KXhuVwj4RO8cyfIpkYofLKzsLiKRPHuVAi7hjApskLh84OqCfKuK51z7bTKZd8lCCiQ7XuIaxWQDR7qzDFvuCWutobNhKDdHSDLrTMtqqX3o5RmBpSzMUw3jQJcbxsYWqaOMHy8ZeWEVRuB9orvLwMZbJMMIJM8GhUVHZ6%2BwciVIoj0lYTCb%2FEEkQWTV4g3hs9l8KRzbEfvJGja6ANuv1OtdFLk8pejrraAJMB7ThsjINOXbJb",
            "https://vtbehaviour.commondatastorage.googleapis.com/5dae281deccea2c5229861b4f2ff8c386da1726a836839961311896a6c9f5a69_Zenbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775189913&Signature=KduKv0QQf8IKhUUAV%2F0zpzpUmIU%2BEctpJKxUJlyu0Myu11iCQCXfXPprtMBAv5ifc4GLTHDiIuEAJwg%2B%2BHGWjun5ZKLKzoz8Ot2udHqFxvy6ZToPEC4Iui9vdRDHqosVaT77R1Tm1TGuyKVmwYTcow4klVAcpzEWanzWx1jHS42ARepJVrS3AFXHMaaBdTgr23jXcbmly1t3b8lwVilcsk2itdoprPpClQTzwYr1y7YV1%2FbYTDGocHnDwCYy",
            "https://vtbehaviour.commondatastorage.googleapis.com/37efacb8411234dd9882d8d3a8709f492eb2ed252132da099a11be07c0b4ccb0_Tencent%20HABO.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775189954&Signature=2gy%2BsyEM78P6orDGWKQU%2FFPSIdVK9X7o8Nkcwb%2BY4r%2FCb%2Bo9JmA9T%2Bfonw9IqbojQSIK%2BNShZUJJ9GV4wWT5l1QfkYfZP0MJ91%2BkDw39PLOc4VVgmBApIQJRTIlgSlI020YfOeIPoIYH8yuCF2dJ32zKg87g0dDFkg4zbExGDJB3%2BGDxX5MJ6hHuzVrwxm7E1L%2F%2FffKQ%2B9rXqoT0hRHEdPSaXSydmnqfMfnjCv",
            "https://vtbehaviour.commondatastorage.googleapis.com/970fdc4da66bc8fff977698c150fc6ebdf9488356ed41ded52d2659830ec5353_VirusTotal%20Droidy.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775189984&Signature=f%2FZZkKTu5zUihkCuCj%2F0pEGmBjWWBiZRDmREgGkkkKvTyR7M5iC0oLGYfaL6WibiUB6pQirxgBtEcS2JtupD291Or3j7%2BKoyngW7R9uf%2FjjWQwfC5YHKjNutT6K5TYuEmzySVs9onhIBSjj4U%2Bi2q%2FMJmQFiDtFZHfcyy00LYqbAbBwEAUnVJZUdH6FvNBu4ArU26VDLDwv1nMSgEjxUWBCwiP4HXlwL5%2BxU6y0eTc2",
            "https://vtbehaviour.commondatastorage.googleapis.com/37efacb8411234dd9882d8d3a8709f492eb2ed252132da099a11be07c0b4ccb0_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775190004&Signature=Nzt9YHY3Ji2VsLO1kvr7%2FyWWwOgo%2BCIoXyjtyshhzTGRxGzhcNdyKU9byPqyv%2F5YAzj%2BmNnDego3ImYeToBCbgyY%2BJJMmUKX6ZrUT1a2O4gv9eMyysIFgYhJ7ZpzyGIvHR5VSJlzPX0AWS81Ml7syDCjTGHikZ9G%2B%2B0cfDA0dhp%2FR7zhAp7yxB2jsDhz1kDY3nncYpjeVtj2o02Nt4JxPa5ML%2FvKBF%2FBHtOtBCqh%2",
            "https://vtbehaviour.commondatastorage.googleapis.com/1256f3aa5f091ac40a573113fcc1a4d0e320af5ee363b0eca79618602cb7dc66_Yomi%20Hunter.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775190083&Signature=a1bnyt5OUcTN8ONeNVqbY%2Fe%2FDVJ2N3olQ9r59dijMLLegF84xQDghj0r6VPdFB8fc%2B3QTcJqhpm6vag1pK9us%2F3UqDJ3Yubf%2FukjL4GMKXDdMSggljB7d%2FpkTraQysnttspVal56LzXitjgIEGYZTidKcIv5LM6YH4zCAXn%2BVueaBNIgpcDS0RuX8fVAQYOeftW9AiEz2TZzx1BT6KUgoj0Tzetn4k541357bb58K1w9n9QV1",
            "https://vtbehaviour.commondatastorage.googleapis.com/1256f3aa5f091ac40a573113fcc1a4d0e320af5ee363b0eca79618602cb7dc66_Dr.Web%20vxCube.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775190146&Signature=3XpRLUQ3g712Vw0Gv1aflVxZs7RKpzIhEK8giO9ydwOrOGjLnAK89Y%2BmEf4g2U2YbO04EE%2BcdR5xPgcch1%2B1Gf4thYCgBcbKEEIfNK5UrJwBpAkYRm3D9xsnD%2FVxZt26yLC6aQy87D%2FKNC9aLvViRHGxuFgOp4zkcU%2BRD6mmpIB8SpX5%2BDpocWc4s9R%2BywRPXZ2U2E49g81i%2B5io3Ycqe8ikdjbPlZo9R0KEFLaDQtH",
            "https://vtbehaviour.commondatastorage.googleapis.com/37efacb8411234dd9882d8d3a8709f492eb2ed252132da099a11be07c0b4ccb0_VirusTotal%20Jujubox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775190199&Signature=RiO2p%2BBvc38TqeTuiMJNxoT6Jr3JfHvTQFQIk94ZaRY%2FPP5yEPSH45GncMCh4GqP1%2F%2BNLR2IVm5Z2svEWojLwxq%2Fl0eIAWy1chUQmg2GcEg5YoaEEnXpWjb1er08EIYwV0ZC8parFwVrr194MKeUmZYo5NLYk4%2BCim9ipnxYse12eROsMSXZtyS4daGivzQzihRqTUU9iEn%2FxAKEOI%2F3V8JRrqNy3nDqmo1mdoVr",
            "https://vtbehaviour.commondatastorage.googleapis.com/bc20f137a2281fae2ee13f698e613e72c37f6b4eb6784653f284f11f4d83ba77_Tencent%20HABO.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775190236&Signature=Fg7jPZWmHQO%2BH8GRQx%2FxSMq5Na7Oo9cN0HR99DHFY8svYTkPoerGELKx7Sf906aTDq2Rer45ajXeYPzzHTiab9NKqWR1JGHbaq0WapVqsRzvXz2QLuBhHoz50tIoVKnx8ZrN9HqHBQweg8nfN%2FWEoaHVlSgav3jhoNTnZAC%2Fa%2BsTLexjXFBIP2v4jpISAl82ESU%2FGZH64BtZpgIJz7RZXdDqZ3LF7JTgwG2JX94%2BOOSn3G14",
            "https://vtbehaviour.commondatastorage.googleapis.com/5dae281deccea2c5229861b4f2ff8c386da1726a836839961311896a6c9f5a69_VirusTotal%20Jujubox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775190298&Signature=eEF6m7QHRnKk%2FYB374HxqU2TE0p8gXC9CWwIHPT7M6fEZKjeFUEmUEbqdupsD2hQQbkW%2Fmijo2rSEQ30q3EAyR9aQO3m6L91A6osc3kDipeyZqFrIqoj6wIe8MJGuRf4OC9cVAWipGYXPG5bqc3v6RUHir9MeLOggoGjalexCwBgs3SsGyhqU1uWZdJ%2Fs4nUbHyIJGc3FB9OrnhDRuGPdkfPSOA09hfujcul91zQNws4dznvmM",
            "https://vtbehaviour.commondatastorage.googleapis.com/a0fb314babd51dbc460ab126b615da4c6f9481f5d1225d0ac189da9d99923bb3_VirusTotal%20Droidy.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775190345&Signature=33%2BM36uNOvEfi8bNtJvnbxcTgcnoIlIO2vBglXpCJFNwC8HAewGOF91Q26TOAsw4sbmtTxQ2F5Q2jv2V3ULV8MAxxgYVptJ69SusRt7qZeBDUpMY%2BOdTYqjkdBuYUqYiCvM756aQheS1KvDepeD64x8e%2FivWkpm%2BZ9yDaKUc7w2143zYkc8kpyBSsO8rJI9vyoHYvbr4sfZOowoUWK7yMjQD9SN5bL%2FFABbMrPEOMyobApm",
            "https://vtbehaviour.commondatastorage.googleapis.com/06b6d62477011fa63fdb44046351fbe574391916a4f3ea0486b3e3498145a7d7_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775190407&Signature=Y3EAa%2Fwo4ligJHfBUxkzWLjU9FPLyNmsxeNdcPCIPQBYTTGUIaFddrFIYHFhawxMDvixd7uA0qGc0zVDWgbStf2qhTOU1D0aF%2F%2BSLSXEY3VB8oWRXZCEI12zrSd5P4lHInxRS3CJKbNnJP4GvYx20ctpNSo4u%2FvVMLM%2B92TiYCunAVTquDVrFNNim6LJTEz2ucjhcgF2gKn%2FF0f9ALEheC1lk4omwpcYEPQLNX0wNsxNC%2BWQ",
            "https://vtbehaviour.commondatastorage.googleapis.com/bb46c18b5b2c98937c8fdfb7acd3e0fa4d0534cfc44d4b41ccd6db9198266fbf_Zenbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775190605&Signature=Rcvj5v%2By7yAX52ap8q3zDGTMjVRQm1LkjuWyhDQUaO6QXR1Ld%2F1dD2QjluOGOuXNiW%2FMNP%2Bqj%2Bx6KtYCvttE847keFo1Em2Bm%2F8bv4vK%2FJL0nGIiz%2FatgO7O78LZZ1wkYwcfG5JZAj8VdjDlHQbuOIUz8Nahqt2JUyQ84z3OeH5d3%2BjV8NKW5SjGWQw4mcmjPQXUznoCsysLbjCd5sgZTpyLUdeFJcNKQPiNBURsJeiyCI5llz0j",
            "https://www.googletagmanager.com/gtag/js?id=GT-NNS2QH6C",
            "https://www.googletagmanager.com/ns.html?id=GTM-PHWTRTJ",
            "https://www.virustotal.com/gui/url/f6db0235760bd467ca822ad515a8410121fde4713501b3e718b8fb127dfa259c?nocache=1",
            "https://www.massbroadcasters.org/eeo-organizations/marshfield-high-school",
            "https://www.findagrave.com/memorial/139047900/peter-deftos",
            "https://vtbehaviour.commondatastorage.googleapis.com/a041cbdeb64c802bde90e06f25213524b2eac500d6000da7e4caeb96e5de1991_VirusTotal%20Droidy.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775191439&Signature=evxsL1kaOuLe5KziYCSqZ56H%2FqXRQgEN0tkJo0j5G7JQ3mmO0Kav5K9LCz%2FUEzi%2BdtB%2B3%2B7VM6r9pC%2BMh7nHxT%2Bs8UAYuVXPE%2FUbBdHWMjvZQuqrZ0hHqIR2xHVB132HiYQWLo%2FgS1QATOfAcHci3X4FqmqvUp7A%2FmNsE1aVFbLc971RHQOuTapOGhiDZlVUyA9KvpMDKw0DzdeHFSlayBSrDDsWL7xW06XOf"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1016",
              "name": "System Network Configuration Discovery",
              "display_name": "T1016 - System Network Configuration Discovery"
            },
            {
              "id": "T1406",
              "name": "Obfuscated Files or Information",
              "display_name": "T1406 - Obfuscated Files or Information"
            },
            {
              "id": "T1409",
              "name": "Access Stored Application Data",
              "display_name": "T1409 - Access Stored Application Data"
            },
            {
              "id": "T1412",
              "name": "Capture SMS Messages",
              "display_name": "T1412 - Capture SMS Messages"
            },
            {
              "id": "T1413",
              "name": "Access Sensitive Data in Device Logs",
              "display_name": "T1413 - Access Sensitive Data in Device Logs"
            },
            {
              "id": "T1414",
              "name": "Capture Clipboard Data",
              "display_name": "T1414 - Capture Clipboard Data"
            },
            {
              "id": "T1418",
              "name": "Application Discovery",
              "display_name": "T1418 - Application Discovery"
            },
            {
              "id": "T1421",
              "name": "System Network Connections Discovery",
              "display_name": "T1421 - System Network Connections Discovery"
            },
            {
              "id": "T1422",
              "name": "System Network Configuration Discovery",
              "display_name": "T1422 - System Network Configuration Discovery"
            },
            {
              "id": "T1424",
              "name": "Process Discovery",
              "display_name": "T1424 - Process Discovery"
            },
            {
              "id": "T1426",
              "name": "System Information Discovery",
              "display_name": "T1426 - System Information Discovery"
            },
            {
              "id": "T1429",
              "name": "Capture Audio",
              "display_name": "T1429 - Capture Audio"
            },
            {
              "id": "T1430",
              "name": "Location Tracking",
              "display_name": "T1430 - Location Tracking"
            },
            {
              "id": "T1432",
              "name": "Access Contact List",
              "display_name": "T1432 - Access Contact List"
            },
            {
              "id": "T1439",
              "name": "Eavesdrop on Insecure Network Communication",
              "display_name": "T1439 - Eavesdrop on Insecure Network Communication"
            },
            {
              "id": "T1447",
              "name": "Delete Device Data",
              "display_name": "T1447 - Delete Device Data"
            },
            {
              "id": "T1472",
              "name": "Generate Fraudulent Advertising Revenue",
              "display_name": "T1472 - Generate Fraudulent Advertising Revenue"
            },
            {
              "id": "T1507",
              "name": "Network Information Discovery",
              "display_name": "T1507 - Network Information Discovery"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1523",
              "name": "Evade Analysis Environment",
              "display_name": "T1523 - Evade Analysis Environment"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1189",
              "name": "Drive-by Compromise",
              "display_name": "T1189 - Drive-by Compromise"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 70,
            "FileHash-SHA1": 40,
            "FileHash-SHA256": 549,
            "URL": 344,
            "domain": 293,
            "hostname": 443,
            "IPv4": 127
          },
          "indicator_count": 1866,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 49,
          "modified_text": "16 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6996eacbe2d99caae4a5b2d7",
          "name": "172.69.58.33",
          "description": "potential rogue exploit kit",
          "modified": "2026-04-01T00:44:45.494000",
          "created": "2026-02-19T10:49:47.043000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 18,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 29,
            "FileHash-SHA256": 171,
            "URL": 432,
            "domain": 629,
            "hostname": 461,
            "CIDR": 6,
            "email": 23
          },
          "indicator_count": 1800,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "18 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69a2127d12dce12538b57d72",
          "name": "FBI Files | Tor device connection | Unique attack against (non -criminal) monitored targets  ~ Apple Jacked Targets",
          "description": "Remote Attack - FBI Files | Tor device connection | Unique attack against (non -criminal) monitored targets.\n\nChecked search history on a targeted device and found an FBI link apparently delivered via unknown AI technology.\n|| yara detections\nzur foerderung\nA\n+ Add Tag\n\u8840\nCount: 1\nGRO Probability: 1\nText: Suricata Alerts Event\nCategory Description CID\nIND131.188.40.12g otx.alienvault.com\nlocal:49181 (TCP) Misc\nAttack ET TOR Known Tor\nRelay/Router (Not Exit)\n\"A\" | [[Next pulse will list on malware, rats , bats, Trojans used]",
          "modified": "2026-03-29T20:03:36.333000",
          "created": "2026-02-27T21:54:05.261000",
          "tags": [
            "pattern match",
            "heuristic match",
            "all url",
            "files domain",
            "pulses otx",
            "germany unknown",
            "aaaa",
            "ip address",
            "emails",
            "gmt server",
            "vary",
            "modified",
            "accept",
            "title",
            "present feb",
            "present jan",
            "united",
            "part",
            "moved",
            "passive dns",
            "cname",
            "final",
            "bill",
            "antivm",
            "xlsx",
            "xlsm",
            "urls",
            "otx logo",
            "all hostname",
            "server",
            "organization",
            "city",
            "stateprovince",
            "postal code",
            "phone",
            "registrar abuse",
            "privacy admin",
            "paris admin",
            "april",
            "direct",
            "february",
            "http",
            "dfn verein",
            "zur foerderung",
            "domain",
            "page url",
            "tags",
            "de summary",
            "erlangen",
            "germany",
            "securitytrails",
            "de seen",
            "general info",
            "geo erlangen",
            "as as680",
            "de note",
            "route",
            "data upload",
            "extraction",
            "failed",
            "extra data",
            "referen",
            "include review",
            "exclude data",
            "summary",
            "url age",
            "as680",
            "se source",
            "learn",
            "command",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "spawns",
            "defense evasion",
            "t1480 execution",
            "over",
            "ascii text",
            "mitre att",
            "size",
            "null",
            "refresh",
            "span",
            "hybrid",
            "general",
            "local",
            "path",
            "click",
            "strings",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "node traffic",
            "tlsv1",
            "search",
            "rgba",
            "medium",
            "read c",
            "module load",
            "t1129",
            "execution",
            "next",
            "dock",
            "write",
            "persistence",
            "calls",
            "apis",
            "reads",
            "model",
            "value",
            "getprocaddress",
            "show technique",
            "ck matrix",
            "access type",
            "windir",
            "regexp",
            "open",
            "date",
            "format",
            "virtual disk drive",
            "sha256",
            "sha1",
            "body",
            "filehashsha1",
            "found",
            "unknown",
            "stop",
            "root",
            "form",
            "9999",
            "sandbox",
            "malware",
            "analysis",
            "online",
            "submit",
            "vxstream",
            "sample",
            "download",
            "trojan",
            "apt",
            "hybrid analysis",
            "api key",
            "vetting process",
            "please note",
            "please",
            "bad traffic",
            "et info",
            "tls handshake",
            "failure",
            "flag",
            "analysis tip",
            "openurl c",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "show",
            "pulse pulses",
            "av detections",
            "ids detections",
            "yara detections",
            "alerts",
            "analysis date",
            "file score",
            "malicious yara",
            "detections none",
            "less ip",
            "dynamicloader",
            "get na",
            "c3bhaw",
            "high",
            "copy",
            "guard",
            "push",
            "Palantir",
            "Foundry",
            "Whitehouse",
            "X.Com",
            "Justice.gov",
            "Apple",
            "AI",
            "node traffic"
          ],
          "references": [
            "tor.sebastianhahn.net \u2022 dap.digitalgov.gov \u2022 fbi.gov \u2022  x.com \u2022 sebastianhahn.net",
            "https://tor.sebastianhahn.net \u2022 faui2k9.de\t \u2022 gitbot.faui2k9.de \u2022 tor-dirauth.sebastianhahn.net \u2022",
            "http://truefoundry.prodigaltech.com/",
            "git.spywarewatchdog.org",
            "marriott-control-prd.accenture.cn",
            "marriott-datacenter-prd.accenture.cn",
            "accenture.cn",
            "c.j.location.host \u2022 videodata.video \u2022 referrer.search",
            "target.id  \u2022 tostring.call  \u2022 title.search",
            "https://hybrid-analysis.com/sample/2f05feed2065b7385b156ebf3a7c6c19def3d412227cee0d46e8a53fb3e9ac41/697bc423b6e7a4dc46010737",
            "https://hybrid-analysis.com/sample/430c376c1754f1f160e3d68bafc970eba37811bdb08d73a86bf6f4be1e7267b3/69a1ea603a3303fa120dad19",
            "https://hybrid-analysis.com/sample/c8e97fd85003de128ef716093cc1ec68f676c737b614f4a55c75c5c0f837de70/69a19551cb5537805706bca9",
            "https://hybrid-analysis.com/sample/c8e97fd85003de128ef716093cc1ec68f676c737b614f4a55c75c5c0f837de70",
            "https://hybrid-analysis.com/sample/c8e97fd85003de128ef716093cc1ec68f676c737b614f4a55c75c5c0f837de70",
            "calathea-containers.palantirfedstart.com \u2018 BYE ALREADY\u2019",
            "http://truefoundry.prodigaltech.com/",
            "Attacker being used by several legal entities attacking a target\u2019s family",
            "Clyde &Co | Chris Ahmann | Brian Sabey /Hall & Evans & Hall Render",
            "Luxury Apartments and Townhome communities do use Foundry Palantir",
            "Some Colorado communities have been taken over by the State Government",
            "Quasi Government: Specifically Pinnacol and Commerce & Industry ( AIG)",
            "Denver Justice System. Palantir allegedly moved  potato Headquarters to Miami",
            "Foundry Foot Soldiers are still in Colorado targeting innocents",
            "Foundry Palantir still has a presence in Colorado",
            "I need some help.",
            "Accurately tipped about air travel safety. In past. Proven true.",
            "Tipped of new looming airline threats",
            "Tipped on hits and other savage plans  to be executed against targets. Targets can be any (1) person.",
            "Sound crazy. We know Palantir commits ALL manner of crime. They are money motivated.",
            "FBI files opened up on a targeted phone, Iunseel, only in search history.",
            "Air Safety: it\u2019s important to have  passengers or hackers unable  to communicate via airline networks /",
            "No phones or circuit board tech. Smart watches.You can\u2019t bring large bottles of hygiene products. Deal with a new reality!",
            "Hours after files were deemed malicious. We powered on targeted Smart TV",
            "You have to go through a series of steps to change themes and wallpapers , including powering off TV",
            "Significant? The screen once had a floral theme. Now a black background with a single fish as Wallpaper .",
            "A man claiming to have the name Sebastian is communicating with targets love one",
            "Uses code, no phone calls. Connected via instagram.",
            "I\u2019m not sure what brings man to from NY to Denver today. I consider him malicious",
            "By remote view of NEW targeys view, all key calls are routed through him.",
            "Targets associated warned. Not very open to advice.",
            "I would post his public information. It may be unwise.",
            "Connects to all NEW targets key contacts main targets contacts.",
            "We have foot soldiers. Be aware",
            "https://www.justice.gov/opa/pr/departmen.t",
            "https://api.manus.im/api/oauth2_callback/apple",
            "https://apple.btprmjo.cc/",
            "https://creative.miqdigital.com/.well-known/apple-app-site-association",
            "internationalfrontier.com",
            "http://www.internationalfrontier.com/i/pdf/2017-04-03-IFR-2017.pdf",
            "http://www.internationalfrontier.com",
            "http://www.internationalfrontier.com/i/pdf/Montana-Presentation-2011.pdf",
            "https://tylerjoycedenver.followupboss.com/unsubscribe/T6pEHkEaLZAN5Jxflvspix0zKbJZwfY9pjBpUTk7q06azxItZ7aiRb7brQhy1NNFqrcrUe4cKmI455MBqcwK9_it6dqx6QWdANshp0om1Bv-5ezKkyVJDphCHvPQNvMupI1owe03rtqYAyu8Cj3cWw~~",
            "Related to: https://otx.alienvault.com/pulse/69a1a73eb0578b92962dae97"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Node Traffic",
              "display_name": "Node Traffic",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1048",
              "name": "Exfiltration Over Alternative Protocol",
              "display_name": "T1048 - Exfiltration Over Alternative Protocol"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            },
            {
              "id": "T1048.003",
              "name": "Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol",
              "display_name": "T1048.003 - Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol"
            },
            {
              "id": "T1090",
              "name": "Proxy",
              "display_name": "T1090 - Proxy"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1007",
              "name": "System Service Discovery",
              "display_name": "T1007 - System Service Discovery"
            },
            {
              "id": "T1010",
              "name": "Application Window Discovery",
              "display_name": "T1010 - Application Window Discovery"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1555",
              "name": "Credentials from Password Stores",
              "display_name": "T1555 - Credentials from Password Stores"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1564",
              "name": "Hide Artifacts",
              "display_name": "T1564 - Hide Artifacts"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1614",
              "name": "System Location Discovery",
              "display_name": "T1614 - System Location Discovery"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1583.001",
              "name": "Domains",
              "display_name": "T1583.001 - Domains"
            },
            {
              "id": "T1553.002",
              "name": "Code Signing",
              "display_name": "T1553.002 - Code Signing"
            },
            {
              "id": "T1055.011",
              "name": "Extra Window Memory Injection",
              "display_name": "T1055.011 - Extra Window Memory Injection"
            },
            {
              "id": "T1055.001",
              "name": "Dynamic-link Library Injection",
              "display_name": "T1055.001 - Dynamic-link Library Injection"
            },
            {
              "id": "T1055.004",
              "name": "Asynchronous Procedure Call",
              "display_name": "T1055.004 - Asynchronous Procedure Call"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1055.014",
              "name": "VDSO Hijacking",
              "display_name": "T1055.014 - VDSO Hijacking"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 5643,
            "domain": 700,
            "hostname": 1918,
            "FileHash-SHA256": 1161,
            "FileHash-MD5": 235,
            "email": 4,
            "FileHash-SHA1": 200,
            "CVE": 1,
            "CIDR": 2,
            "SSLCertFingerprint": 9
          },
          "indicator_count": 9873,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "21 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69aa019f4509897e354fe029",
          "name": "credit Q Vashti Cloned Pulse ",
          "description": "",
          "modified": "2026-03-29T20:03:36.333000",
          "created": "2026-03-05T22:20:15.324000",
          "tags": [
            "pattern match",
            "heuristic match",
            "all url",
            "files domain",
            "pulses otx",
            "germany unknown",
            "aaaa",
            "ip address",
            "emails",
            "gmt server",
            "vary",
            "modified",
            "accept",
            "title",
            "present feb",
            "present jan",
            "united",
            "part",
            "moved",
            "passive dns",
            "cname",
            "final",
            "bill",
            "antivm",
            "xlsx",
            "xlsm",
            "urls",
            "otx logo",
            "all hostname",
            "server",
            "organization",
            "city",
            "stateprovince",
            "postal code",
            "phone",
            "registrar abuse",
            "privacy admin",
            "paris admin",
            "april",
            "direct",
            "february",
            "http",
            "dfn verein",
            "zur foerderung",
            "domain",
            "page url",
            "tags",
            "de summary",
            "erlangen",
            "germany",
            "securitytrails",
            "de seen",
            "general info",
            "geo erlangen",
            "as as680",
            "de note",
            "route",
            "data upload",
            "extraction",
            "failed",
            "extra data",
            "referen",
            "include review",
            "exclude data",
            "summary",
            "url age",
            "as680",
            "se source",
            "learn",
            "command",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "spawns",
            "defense evasion",
            "t1480 execution",
            "over",
            "ascii text",
            "mitre att",
            "size",
            "null",
            "refresh",
            "span",
            "hybrid",
            "general",
            "local",
            "path",
            "click",
            "strings",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "node traffic",
            "tlsv1",
            "search",
            "rgba",
            "medium",
            "read c",
            "module load",
            "t1129",
            "execution",
            "next",
            "dock",
            "write",
            "persistence",
            "calls",
            "apis",
            "reads",
            "model",
            "value",
            "getprocaddress",
            "show technique",
            "ck matrix",
            "access type",
            "windir",
            "regexp",
            "open",
            "date",
            "format",
            "virtual disk drive",
            "sha256",
            "sha1",
            "body",
            "filehashsha1",
            "found",
            "unknown",
            "stop",
            "root",
            "form",
            "9999",
            "sandbox",
            "malware",
            "analysis",
            "online",
            "submit",
            "vxstream",
            "sample",
            "download",
            "trojan",
            "apt",
            "hybrid analysis",
            "api key",
            "vetting process",
            "please note",
            "please",
            "bad traffic",
            "et info",
            "tls handshake",
            "failure",
            "flag",
            "analysis tip",
            "openurl c",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "show",
            "pulse pulses",
            "av detections",
            "ids detections",
            "yara detections",
            "alerts",
            "analysis date",
            "file score",
            "malicious yara",
            "detections none",
            "less ip",
            "dynamicloader",
            "get na",
            "c3bhaw",
            "high",
            "copy",
            "guard",
            "push",
            "Palantir",
            "Foundry",
            "Whitehouse",
            "X.Com",
            "Justice.gov",
            "Apple",
            "AI",
            "node traffic"
          ],
          "references": [
            "tor.sebastianhahn.net \u2022 dap.digitalgov.gov \u2022 fbi.gov \u2022  x.com \u2022 sebastianhahn.net",
            "https://tor.sebastianhahn.net \u2022 faui2k9.de\t \u2022 gitbot.faui2k9.de \u2022 tor-dirauth.sebastianhahn.net \u2022",
            "http://truefoundry.prodigaltech.com/",
            "git.spywarewatchdog.org",
            "marriott-control-prd.accenture.cn",
            "marriott-datacenter-prd.accenture.cn",
            "accenture.cn",
            "c.j.location.host \u2022 videodata.video \u2022 referrer.search",
            "target.id  \u2022 tostring.call  \u2022 title.search",
            "https://hybrid-analysis.com/sample/2f05feed2065b7385b156ebf3a7c6c19def3d412227cee0d46e8a53fb3e9ac41/697bc423b6e7a4dc46010737",
            "https://hybrid-analysis.com/sample/430c376c1754f1f160e3d68bafc970eba37811bdb08d73a86bf6f4be1e7267b3/69a1ea603a3303fa120dad19",
            "https://hybrid-analysis.com/sample/c8e97fd85003de128ef716093cc1ec68f676c737b614f4a55c75c5c0f837de70/69a19551cb5537805706bca9",
            "https://hybrid-analysis.com/sample/c8e97fd85003de128ef716093cc1ec68f676c737b614f4a55c75c5c0f837de70",
            "https://hybrid-analysis.com/sample/c8e97fd85003de128ef716093cc1ec68f676c737b614f4a55c75c5c0f837de70",
            "calathea-containers.palantirfedstart.com \u2018 BYE ALREADY\u2019",
            "http://truefoundry.prodigaltech.com/",
            "Attacker being used by several legal entities attacking a target\u2019s family",
            "Clyde &Co | Chris Ahmann | Brian Sabey /Hall & Evans & Hall Render",
            "Luxury Apartments and Townhome communities do use Foundry Palantir",
            "Some Colorado communities have been taken over by the State Government",
            "Quasi Government: Specifically Pinnacol and Commerce & Industry ( AIG)",
            "Denver Justice System. Palantir allegedly moved  potato Headquarters to Miami",
            "Foundry Foot Soldiers are still in Colorado targeting innocents",
            "Foundry Palantir still has a presence in Colorado",
            "I need some help.",
            "Accurately tipped about air travel safety. In past. Proven true.",
            "Tipped of new looming airline threats",
            "Tipped on hits and other savage plans  to be executed against targets. Targets can be any (1) person.",
            "Sound crazy. We know Palantir commits ALL manner of crime. They are money motivated.",
            "FBI files opened up on a targeted phone, Iunseel, only in search history.",
            "Air Safety: it\u2019s important to have  passengers or hackers unable  to communicate via airline networks /",
            "No phones or circuit board tech. Smart watches.You can\u2019t bring large bottles of hygiene products. Deal with a new reality!",
            "Hours after files were deemed malicious. We powered on targeted Smart TV",
            "You have to go through a series of steps to change themes and wallpapers , including powering off TV",
            "Significant? The screen once had a floral theme. Now a black background with a single fish as Wallpaper .",
            "A man claiming to have the name Sebastian is communicating with targets love one",
            "Uses code, no phone calls. Connected via instagram.",
            "I\u2019m not sure what brings man to from NY to Denver today. I consider him malicious",
            "By remote view of NEW targeys view, all key calls are routed through him.",
            "Targets associated warned. Not very open to advice.",
            "I would post his public information. It may be unwise.",
            "Connects to all NEW targets key contacts main targets contacts.",
            "We have foot soldiers. Be aware",
            "https://www.justice.gov/opa/pr/departmen.t",
            "https://api.manus.im/api/oauth2_callback/apple",
            "https://apple.btprmjo.cc/",
            "https://creative.miqdigital.com/.well-known/apple-app-site-association",
            "internationalfrontier.com",
            "http://www.internationalfrontier.com/i/pdf/2017-04-03-IFR-2017.pdf",
            "http://www.internationalfrontier.com",
            "http://www.internationalfrontier.com/i/pdf/Montana-Presentation-2011.pdf",
            "https://tylerjoycedenver.followupboss.com/unsubscribe/T6pEHkEaLZAN5Jxflvspix0zKbJZwfY9pjBpUTk7q06azxItZ7aiRb7brQhy1NNFqrcrUe4cKmI455MBqcwK9_it6dqx6QWdANshp0om1Bv-5ezKkyVJDphCHvPQNvMupI1owe03rtqYAyu8Cj3cWw~~",
            "Related to: https://otx.alienvault.com/pulse/69a1a73eb0578b92962dae97"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Node Traffic",
              "display_name": "Node Traffic",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1048",
              "name": "Exfiltration Over Alternative Protocol",
              "display_name": "T1048 - Exfiltration Over Alternative Protocol"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            },
            {
              "id": "T1048.003",
              "name": "Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol",
              "display_name": "T1048.003 - Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol"
            },
            {
              "id": "T1090",
              "name": "Proxy",
              "display_name": "T1090 - Proxy"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1007",
              "name": "System Service Discovery",
              "display_name": "T1007 - System Service Discovery"
            },
            {
              "id": "T1010",
              "name": "Application Window Discovery",
              "display_name": "T1010 - Application Window Discovery"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1555",
              "name": "Credentials from Password Stores",
              "display_name": "T1555 - Credentials from Password Stores"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1564",
              "name": "Hide Artifacts",
              "display_name": "T1564 - Hide Artifacts"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1614",
              "name": "System Location Discovery",
              "display_name": "T1614 - System Location Discovery"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1583.001",
              "name": "Domains",
              "display_name": "T1583.001 - Domains"
            },
            {
              "id": "T1553.002",
              "name": "Code Signing",
              "display_name": "T1553.002 - Code Signing"
            },
            {
              "id": "T1055.011",
              "name": "Extra Window Memory Injection",
              "display_name": "T1055.011 - Extra Window Memory Injection"
            },
            {
              "id": "T1055.001",
              "name": "Dynamic-link Library Injection",
              "display_name": "T1055.001 - Dynamic-link Library Injection"
            },
            {
              "id": "T1055.004",
              "name": "Asynchronous Procedure Call",
              "display_name": "T1055.004 - Asynchronous Procedure Call"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1055.014",
              "name": "VDSO Hijacking",
              "display_name": "T1055.014 - VDSO Hijacking"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "69a2127d12dce12538b57d72",
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 5644,
            "domain": 701,
            "hostname": 1920,
            "FileHash-SHA256": 1161,
            "FileHash-MD5": 235,
            "email": 4,
            "FileHash-SHA1": 200,
            "CVE": 1,
            "CIDR": 2,
            "SSLCertFingerprint": 9
          },
          "indicator_count": 9877,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 49,
          "modified_text": "21 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "698904c316bc7710b967d01d",
          "name": "Rare Tier 1 Persistence - Critical \"Patched\", Non Patched Vulnerabilities Remain bypassing Lockdown Mode",
          "description": "Researcher Note (Feb 08, 2026):\nThis artifact represents a sophisticated Cross-Protocol Mesh. Observations confirm that the Cymt/Nemucod wrapper is being utilized as a delivery vehicle for a Firmware-resident ELF binary (Mirai variant).\nThe persistence is notable for its ability to survive Full DFU Restores and Faraday-isolated states, likely due to JTAG-level interaction with the Power Management IC (Chip 4799). This is not a standard opportunistic infection; it is a targeted provisioning event leveraging IDMSA (Identity Management) bridges and Verizon/Akamai Edge infrastructure.\nThe integration with CalendarKit and Maps for geofenced execution suggests a highly coordinated surveillance objective. Forensic analysts should pay specific attention to the sizeofrawdata_antidbg anomalies, which indicate a focus on bypassing Apple Lockdown Mode and Secure Enclave. \nresearcher credit: msudoSOS",
          "modified": "2026-03-27T09:05:26.285000",
          "created": "2026-02-08T21:48:49.147000",
          "tags": [
            "#supportsitewebsiteabuse #rootcertificatefailure #cryptographicf"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 909,
            "URL": 1779,
            "CVE": 126,
            "domain": 659,
            "email": 23,
            "JA3": 1,
            "FileHash-MD5": 230,
            "FileHash-SHA1": 227,
            "FileHash-SHA256": 934,
            "CIDR": 13
          },
          "indicator_count": 4901,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 54,
          "modified_text": "23 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69bf64e1d5e06aa6207f78de",
          "name": "Spam \u201cBroken Seal\u201d DocuSign-themed Delivery w/Fileless Process Hollowing (Zeppelin/Bloat-A) by msudosos",
          "description": "",
          "modified": "2026-03-27T00:30:39.055000",
          "created": "2026-03-22T03:41:21.863000",
          "tags": [
            "Zeppelin, Bloat-A, W32.Bloat-A, Zero-Day-Delivery, Protocol-Devi",
            "9698f46495ce9401c8bcaf9a2afe1598",
            "Imphash: 9698f46495ce9401c8bcaf9a2afe1598 | Imports (additional)",
            "MD5: b47266fef17ad4b2e4ca6ee1d06c39a7 SHA-1: cb92796715c799d7e71",
            "Filename: b47266fef17ad4b2e4ca6ee1d06c39a7.virus File Type: Win3",
            "Compilation / Toolchain Compiler: Microsoft Visual C++ 2017 Link",
            "DocuSign-themed phishing lure Invalid X.509 seal (\u201cBroken Seal\u201d)"
          ],
          "references": [
            "Conversely, Port 443 remains accessible, serving a WordPress-based interface backed by a freshly issued Google Trust Services certificate (Feb 4, 2026). This asymmetric configuration ensures that the structurally invalid X.509 \"Broken Seal\" is only delivered via encrypted channels, while the gated Port 80 tier prevents the discovery of the underlying Zeppelin/Bloat-A redirection logic by non-human-interacted sessions.",
            "Imphash: 9698f46495ce9401c8bcaf9a2afe1598 | Imports (additional): GdipSetSmoothingMode, I_UuidCreate, RpcStringFreeW, UuidCreate, UuidToStringW, InternetCheckConnectionW | Resource: RT_MANIFEST (1, ENGLISH US, SHA-256 4bb79dcea0a901f7d9eac5aa05728ae92acb42e0cb22e5dd14134f4421a3d8df, XML, entropy 4.91)",
            "Observed hosting and routing telemetry indicates the delivery infrastructure is operating through AS209242 (Cloudflare London LLC), suggesting the actor is leveraging Cloudflare\u2019s transit layer for resilience and to reduce direct exposure of origin infrastructure.",
            "Research into the gogetlife.co telemetry confirms a dual-port obfuscation strategy designed to bypass multi-layer security indexing. Forensic HTTP scans identify a Port 80 \"Fail-Closed\" state, where standard web traffic is gated by a Cloudflare-managed 403 Forbidden challenge, effectively neutralizing automated crawlers. Conversely, Port 443 remains accessible, serving a WordPress-based interface backed by a freshly issued Google Trust Services certificate (Feb 4, 2026). This asymmetric configuration ensure",
            "Compilation / Toolchain Compiler: Microsoft Visual C++ 2017 Linker: Microsoft Linker 14.16.27032 IDE: Visual Studio 2017 (15.9) Classification: PEBIN TrID: Win64 EXE (32.2%) / Win32 DLL (20.1%) / Win16 NE (15.4%) PE Section Entropy (Suspicion): .data 7.36 \u2192 high (suggests packing/encryption), .reloc 6.66 \u2192 possible runtime modification, .text 6.01, .rdata 5.88, .rsrc 4.72 Imports (Capabilities): CreateRemoteThread, CreateThread, ExitProcess",
            "Broken Seal exploitation: The invalid X.509 seal appears engineered to exploit verification logic gaps, forcing fail-open behavior and allowing SEG bypass under certain configurations. Human-gated delivery posture: Cloudflare 403 challenges suggest the actor enforces human interaction before payload delivery, reducing automated discovery and sandbox analysis. Industrialized infrastructure: Correlation across thousands of domains and URLs indicates a highly automated, rotating delivery ecosystem.",
            "MITRE ATT&CK: Process Hollowing (T1055.012): Documentation on the RunPE injection method used by the payload to achieve a fileless state in RWX memory. RFC 5652 - Cryptographic Message Syntax (CMS): This standard defines the structure of the digital signatures that this campaign's \"Broken Seal\" exploit bypasses.",
            "As of Feb 13 (early AM) \u2014 Indicators of Compromise: 17K | Types: Email (30), FileHash-SHA256 (2,146), URL (8,070), Hostname (2,755), Domain (3,528), Other (1,110) | Geo: US (233), Canada (15), China (10), Japan (2), Spain (2), Other (13)",
            "Verification failure observed in automated verification handlers during sandbox replay.",
            "The payload (SHA256: dfff54...4af) achieves a fileless execution state via Process Hollowing (RunPE), injecting into RWX memory regions of legitimate system processes to evade disk-based EDR telemetry. Anti-analysis controls\u2014including Bochs artifact checks, geofencing logic, and direct CPU clock interrogation\u2014are implemented to validate a high-interaction user environment prior to execution.",
            "Multiple antivirus engines flagged the sample with generic heuristic names (e.g., Trojan:Win32/Vigorf.A, Win32:Malware-gen, Trojan.Generic), consistent with multi-engine heuristic detection on VirusTotal.",
            "Malicious sample (SHA256: fa8e2ddfe42e77a9771a7c4d6421c7a808cf4508f8cd6dc6f4cf8bd4e2ae7f8f) detected as TrojanDownloader:Win32/Tugspay.A with YARA hits for Win32_PUA_Domaiq, aPLib, PECompact_2xx and IDS alerts including TLS Handshake Failure + 403 Forbidden, contacting 36 domains (e.g., api.123mediaplayer.com, static.sslsecure1.com) and IPs such as 104.18.23.19 and 193.166.255.171.",
            "SHA256 3d10374b55a18a2dd90d35d28472600496c680a7efab4e772595f735cb062343 identified as Win.Malware.Vtflooder-9783271-0 / Trojan:Win32/Vflooder.B with UPX/Nrv2x packing YARA hits, IDS detections for Win32/Vflooder.B check-in and DOS behavior, and network C2 indicators including 172.66.0.227 and 34.54.88.138.",
            "SHA-256: fc1fedce1419d4e2009828aad8644deca78b4eeed176e5b009797e0eb0d7d3ff \u2014 Detected as Win.Malware.Vtflooder / Trojan:Win32/Vflooder; UPX-packed PE32 executable, with 812 IDS hits (including C2 checkin + HTTP EXE upload).",
            "nationalgrid.com \u2014 Whitelisted domain (US, AS13335 Cloudflare) with 500+ passive DNS entries, 692 URLs, 195 subdomains, and 2 malicious files hosted on IP 104.17.1.192, which is concerning given the infrastructure and trust level.",
            "eversource.com (IP: 159.108.5.46, ASN: AS2024) has 2 flagged malicious files within its infrastructure, despite being whitelisted. The domain hosts 95 subdomains and maintains an active SPF record, indicating potential security risks under an otherwise trusted facade.",
            "Whitelisted IP Address 204.79.197.212 Location  United States ASN AS8068 microsoft corporation Nameservers ns4-205.azure-dns.info. ,  ns1-205.azure-dns.com. More WHOIS Registrar: MarkMonitor, Inc.,   Creation Date: Mar 26, 1996 Related Pulses OTX User-Created Pulses (50) Related Tags 2025 Related Tags 4328 ,  5943 ,  80211 ,  #supportsitewebsiteabuse #rootcertificatefailure #cryptographicf ,  The dynamics of the mudoSOSIntersectalign with sophisticated adv More Indicator Facts 982 malicious files communicat",
            "",
            "The AlienVault OTX report for flypdx.com documents 11 related tags, including ids detections and av detections, across 4 active AWS IP addresses (3.175.34.30\u2013.106). These indicators confirm the airport's network has been flagged for unauthorized activity, specifically pointing to a bridge between their web infrastructure and internal passenger tracking. The display of PII on aviation hardware during my June flight matches a known data-bleeding pattern where Personally Identifiable Information (PII) leaks fr"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "China",
            "United States of America",
            "Spain",
            "Japan",
            "Canada"
          ],
          "malware_families": [],
          "attack_ids": [],
          "industries": [
            "Legal, Financial, Healthcare, Government, Municipal, Real-Estate, Enterprise-Technology, Critical-In"
          ],
          "TLP": "green",
          "cloned_from": "698e93e1ab02db8c49e8c3ed",
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 27572,
            "FileHash-SHA256": 46076,
            "FileHash-MD5": 42177,
            "FileHash-SHA1": 22874,
            "hostname": 33438,
            "URL": 74810,
            "SSLCertFingerprint": 21,
            "CVE": 7579,
            "email": 297,
            "FileHash-IMPHASH": 8,
            "CIDR": 26203,
            "JA3": 1
          },
          "indicator_count": 281056,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 143,
          "modified_text": "23 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69bf64eccb5d39a90a3c391e",
          "name": "Spam \u201cBroken Seal\u201d DocuSign-themed Delivery w/Fileless Process Hollowing (Zeppelin/Bloat-A) by msudosos",
          "description": "",
          "modified": "2026-03-27T00:30:39.055000",
          "created": "2026-03-22T03:41:32.565000",
          "tags": [
            "Zeppelin, Bloat-A, W32.Bloat-A, Zero-Day-Delivery, Protocol-Devi",
            "9698f46495ce9401c8bcaf9a2afe1598",
            "Imphash: 9698f46495ce9401c8bcaf9a2afe1598 | Imports (additional)",
            "MD5: b47266fef17ad4b2e4ca6ee1d06c39a7 SHA-1: cb92796715c799d7e71",
            "Filename: b47266fef17ad4b2e4ca6ee1d06c39a7.virus File Type: Win3",
            "Compilation / Toolchain Compiler: Microsoft Visual C++ 2017 Link",
            "DocuSign-themed phishing lure Invalid X.509 seal (\u201cBroken Seal\u201d)"
          ],
          "references": [
            "Conversely, Port 443 remains accessible, serving a WordPress-based interface backed by a freshly issued Google Trust Services certificate (Feb 4, 2026). This asymmetric configuration ensures that the structurally invalid X.509 \"Broken Seal\" is only delivered via encrypted channels, while the gated Port 80 tier prevents the discovery of the underlying Zeppelin/Bloat-A redirection logic by non-human-interacted sessions.",
            "Imphash: 9698f46495ce9401c8bcaf9a2afe1598 | Imports (additional): GdipSetSmoothingMode, I_UuidCreate, RpcStringFreeW, UuidCreate, UuidToStringW, InternetCheckConnectionW | Resource: RT_MANIFEST (1, ENGLISH US, SHA-256 4bb79dcea0a901f7d9eac5aa05728ae92acb42e0cb22e5dd14134f4421a3d8df, XML, entropy 4.91)",
            "Observed hosting and routing telemetry indicates the delivery infrastructure is operating through AS209242 (Cloudflare London LLC), suggesting the actor is leveraging Cloudflare\u2019s transit layer for resilience and to reduce direct exposure of origin infrastructure.",
            "Research into the gogetlife.co telemetry confirms a dual-port obfuscation strategy designed to bypass multi-layer security indexing. Forensic HTTP scans identify a Port 80 \"Fail-Closed\" state, where standard web traffic is gated by a Cloudflare-managed 403 Forbidden challenge, effectively neutralizing automated crawlers. Conversely, Port 443 remains accessible, serving a WordPress-based interface backed by a freshly issued Google Trust Services certificate (Feb 4, 2026). This asymmetric configuration ensure",
            "Compilation / Toolchain Compiler: Microsoft Visual C++ 2017 Linker: Microsoft Linker 14.16.27032 IDE: Visual Studio 2017 (15.9) Classification: PEBIN TrID: Win64 EXE (32.2%) / Win32 DLL (20.1%) / Win16 NE (15.4%) PE Section Entropy (Suspicion): .data 7.36 \u2192 high (suggests packing/encryption), .reloc 6.66 \u2192 possible runtime modification, .text 6.01, .rdata 5.88, .rsrc 4.72 Imports (Capabilities): CreateRemoteThread, CreateThread, ExitProcess",
            "Broken Seal exploitation: The invalid X.509 seal appears engineered to exploit verification logic gaps, forcing fail-open behavior and allowing SEG bypass under certain configurations. Human-gated delivery posture: Cloudflare 403 challenges suggest the actor enforces human interaction before payload delivery, reducing automated discovery and sandbox analysis. Industrialized infrastructure: Correlation across thousands of domains and URLs indicates a highly automated, rotating delivery ecosystem.",
            "MITRE ATT&CK: Process Hollowing (T1055.012): Documentation on the RunPE injection method used by the payload to achieve a fileless state in RWX memory. RFC 5652 - Cryptographic Message Syntax (CMS): This standard defines the structure of the digital signatures that this campaign's \"Broken Seal\" exploit bypasses.",
            "As of Feb 13 (early AM) \u2014 Indicators of Compromise: 17K | Types: Email (30), FileHash-SHA256 (2,146), URL (8,070), Hostname (2,755), Domain (3,528), Other (1,110) | Geo: US (233), Canada (15), China (10), Japan (2), Spain (2), Other (13)",
            "Verification failure observed in automated verification handlers during sandbox replay.",
            "The payload (SHA256: dfff54...4af) achieves a fileless execution state via Process Hollowing (RunPE), injecting into RWX memory regions of legitimate system processes to evade disk-based EDR telemetry. Anti-analysis controls\u2014including Bochs artifact checks, geofencing logic, and direct CPU clock interrogation\u2014are implemented to validate a high-interaction user environment prior to execution.",
            "Multiple antivirus engines flagged the sample with generic heuristic names (e.g., Trojan:Win32/Vigorf.A, Win32:Malware-gen, Trojan.Generic), consistent with multi-engine heuristic detection on VirusTotal.",
            "Malicious sample (SHA256: fa8e2ddfe42e77a9771a7c4d6421c7a808cf4508f8cd6dc6f4cf8bd4e2ae7f8f) detected as TrojanDownloader:Win32/Tugspay.A with YARA hits for Win32_PUA_Domaiq, aPLib, PECompact_2xx and IDS alerts including TLS Handshake Failure + 403 Forbidden, contacting 36 domains (e.g., api.123mediaplayer.com, static.sslsecure1.com) and IPs such as 104.18.23.19 and 193.166.255.171.",
            "SHA256 3d10374b55a18a2dd90d35d28472600496c680a7efab4e772595f735cb062343 identified as Win.Malware.Vtflooder-9783271-0 / Trojan:Win32/Vflooder.B with UPX/Nrv2x packing YARA hits, IDS detections for Win32/Vflooder.B check-in and DOS behavior, and network C2 indicators including 172.66.0.227 and 34.54.88.138.",
            "SHA-256: fc1fedce1419d4e2009828aad8644deca78b4eeed176e5b009797e0eb0d7d3ff \u2014 Detected as Win.Malware.Vtflooder / Trojan:Win32/Vflooder; UPX-packed PE32 executable, with 812 IDS hits (including C2 checkin + HTTP EXE upload).",
            "nationalgrid.com \u2014 Whitelisted domain (US, AS13335 Cloudflare) with 500+ passive DNS entries, 692 URLs, 195 subdomains, and 2 malicious files hosted on IP 104.17.1.192, which is concerning given the infrastructure and trust level.",
            "eversource.com (IP: 159.108.5.46, ASN: AS2024) has 2 flagged malicious files within its infrastructure, despite being whitelisted. The domain hosts 95 subdomains and maintains an active SPF record, indicating potential security risks under an otherwise trusted facade.",
            "Whitelisted IP Address 204.79.197.212 Location  United States ASN AS8068 microsoft corporation Nameservers ns4-205.azure-dns.info. ,  ns1-205.azure-dns.com. More WHOIS Registrar: MarkMonitor, Inc.,   Creation Date: Mar 26, 1996 Related Pulses OTX User-Created Pulses (50) Related Tags 2025 Related Tags 4328 ,  5943 ,  80211 ,  #supportsitewebsiteabuse #rootcertificatefailure #cryptographicf ,  The dynamics of the mudoSOSIntersectalign with sophisticated adv More Indicator Facts 982 malicious files communicat",
            "",
            "The AlienVault OTX report for flypdx.com documents 11 related tags, including ids detections and av detections, across 4 active AWS IP addresses (3.175.34.30\u2013.106). These indicators confirm the airport's network has been flagged for unauthorized activity, specifically pointing to a bridge between their web infrastructure and internal passenger tracking. The display of PII on aviation hardware during my June flight matches a known data-bleeding pattern where Personally Identifiable Information (PII) leaks fr"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "China",
            "United States of America",
            "Spain",
            "Japan",
            "Canada"
          ],
          "malware_families": [],
          "attack_ids": [],
          "industries": [
            "Legal, Financial, Healthcare, Government, Municipal, Real-Estate, Enterprise-Technology, Critical-In"
          ],
          "TLP": "green",
          "cloned_from": "698e93e1ab02db8c49e8c3ed",
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 27572,
            "FileHash-SHA256": 46076,
            "FileHash-MD5": 42177,
            "FileHash-SHA1": 22874,
            "hostname": 33438,
            "URL": 74810,
            "SSLCertFingerprint": 21,
            "CVE": 7579,
            "email": 297,
            "FileHash-IMPHASH": 8,
            "CIDR": 26203,
            "JA3": 1
          },
          "indicator_count": 281056,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 145,
          "modified_text": "23 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69c1bd40f81db45dc044697c",
          "name": "Masterkey Clone By CallmeDoris",
          "description": "",
          "modified": "2026-03-23T22:22:56.940000",
          "created": "2026-03-23T22:22:56.940000",
          "tags": [
            "dropped file",
            "chromeua",
            "runtime data",
            "drmedgeua",
            "edgeua",
            "generator",
            "win64",
            "null",
            "template",
            "unknown",
            "critical",
            "addressbar",
            "desktop",
            "dark",
            "light",
            "iframe",
            "cookie",
            "meta",
            "body",
            "legend",
            "dwis",
            "core",
            "tear",
            "malicious",
            "mozilla",
            "strings",
            "qakbot",
            "://masterkey.com.ua/download/MKClientSetup.exe"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/41859e0b198fbe88772ef12c577023c0481ec19867e410bab335e67fea87c1bb/642ca80cde2048242a0e097d"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "642db7b656049e54b2f71c20",
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 949,
            "URL": 5642,
            "CVE": 2,
            "domain": 509,
            "FileHash-SHA256": 293,
            "FileHash-MD5": 550,
            "FileHash-SHA1": 60,
            "email": 5
          },
          "indicator_count": 8010,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 47,
          "modified_text": "26 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69b23473c8e69c7f51c63ce9",
          "name": "#fp539598-VBS/LoveLetter.BT via (Drive by Compromise",
          "description": "Malware found in pulses listed below. It appears threat actors , likely a legal team is abusing Palantir tools against targeted individuals , devices and or networks. \nMalware identified found in a malicious link when user apparently suffered a drive by compromised when utilizing built in AI feature on an iOS device.\n#loveLetter #mass-mailing-worms",
          "modified": "2026-03-12T03:35:15.757000",
          "created": "2026-03-12T03:35:15.757000",
          "tags": [
            "#fp539598-VBS/LoveLetter.BT",
            "palantir",
            "prometheus intelligence technology",
            "dll read",
            "function read",
            "total",
            "read",
            "write",
            "delete",
            "file behavior",
            "apple",
            "ios",
            "quantum fiber",
            "lumen technologies",
            "malware",
            "drive by compromise",
            "vbs",
            "ai",
            "browser",
            "regexp",
            "function",
            "width",
            "error",
            "pseudo",
            "child",
            "with",
            "array",
            "tbody",
            "sufeffxa0",
            "class",
            "null",
            "date",
            "void",
            "accept",
            "js_eval",
            "recon_fingerprint",
            "mass-mailing worms"
          ],
          "references": [
            "https://otx.alienvault.com/pulse/69b1f368db0d00947ef729c2",
            "https://otx.alienvault.com/pulse/69af3fd8db2ede31abda6c14"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "#fp539598-VBS/LoveLetter.BT",
              "display_name": "#fp539598-VBS/LoveLetter.BT",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1189",
              "name": "Drive-by Compromise",
              "display_name": "T1189 - Drive-by Compromise"
            },
            {
              "id": "T1185",
              "name": "Man in the Browser",
              "display_name": "T1185 - Man in the Browser"
            },
            {
              "id": "T1557",
              "name": "Man-in-the-Middle",
              "display_name": "T1557 - Man-in-the-Middle"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1587.001",
              "name": "Malware",
              "display_name": "T1587.001 - Malware"
            },
            {
              "id": "T1608.001",
              "name": "Upload Malware",
              "display_name": "T1608.001 - Upload Malware"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2,
            "FileHash-SHA1": 2,
            "FileHash-SHA256": 3,
            "hostname": 23,
            "domain": 55,
            "URL": 1
          },
          "indicator_count": 86,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "38 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65eea19a23474b8c7dca351f",
          "name": "All Items - find from the UA archive disk",
          "description": "Again have zero idea 'what these are' - just uploading from the 'archives' as I sort through things",
          "modified": "2025-12-24T08:28:47.628000",
          "created": "2024-03-11T06:15:54.351000",
          "tags": [],
          "references": [
            "https://www.virustotal.com/gui/collection/09af9ef0b7b23d2dc73d83858106ae4fc97a352dbb521ac04493a0e79095ac69/iocs",
            "https://www.virustotal.com/gui/collection/79c25168b2f93d9730a56b8d2b834cbfb2752b63b21b9dd51109416fbaa676d8/iocs",
            "https://www.virustotal.com/graph/embed/g8726609a12794ebeb59edd531961a233068149bcdf994b428f20141be6111551?theme=dark",
            "https://www.virustotal.com/graph/embed/g365a82115f934e31a69118715695c91c231f66cda9084c9389e56afb985a243e?theme=dark",
            "",
            "https://www.virustotal.com/gui/collection/6a8d582df4fe5a29885dad4074236bc9e4ed445aaf0cc00702d45963fb0459bb/iocs"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 19,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Disable_Duck",
            "id": "244325",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1165,
            "hostname": 866,
            "URL": 657,
            "FileHash-SHA256": 26,
            "email": 337,
            "FileHash-MD5": 12,
            "FileHash-SHA1": 8,
            "CIDR": 1
          },
          "indicator_count": 3072,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 128,
          "modified_text": "116 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "68abf75bf3b03b94a6762409",
          "name": "(Repost) How to connect listeners to e.intercom | serverhub.com eonix.net",
          "description": "",
          "modified": "2025-08-25T05:40:43.552000",
          "created": "2025-08-25T05:40:43.552000",
          "tags": [
            "context",
            "error",
            "ajaxupdate",
            "request",
            "requestdata",
            "name",
            "xoctoberassets",
            "datarequest",
            "typesubmit",
            "typetext",
            "click",
            "function",
            "typeof c",
            "bootstrap",
            "javascript",
            "azaz",
            "popover",
            "typeof f",
            "typeof g",
            "typeof h",
            "vui",
            "anda",
            "tente",
            "outubro",
            "trackingclient",
            "srpanj",
            "rabu",
            "vasaris",
            "image",
            "typeof atrkopts",
            "800px",
            "40px",
            "i18n",
            "blockedemail",
            "typeof i18n",
            "hubspot",
            "captcha",
            "date",
            "please",
            "april",
            "august",
            "close",
            "february",
            "june",
            "form",
            "klik",
            "download",
            "window",
            "this",
            "next",
            "null",
            "blank",
            "este",
            "anna",
            "rserver",
            "mais",
            "void",
            "object",
            "typeerror",
            "array",
            "symbol",
            "bound",
            "typeof window",
            "typeof t",
            "invalid path",
            "unknown method",
            "phonenumber",
            "ninja",
            "typeof e",
            "edge",
            "dataname",
            "intercom",
            "typeof symbol",
            "apple",
            "webkiti",
            "criosi",
            "trident"
          ],
          "references": [
            "xfe-URL-Eonix.net-stix2-2.1-export.json",
            "xfe-URL-Serverhub.com-stix2-2.1-export.json",
            "xfe-URL-Enom.com-stix2-2.1-export 2.json",
            "https://widget.intercom.io/widget/rbc8ok9w",
            "https://js.hscollectedforms.net/collectedforms.js",
            "https://js.hsleadflows.net/leadflows.js",
            "https://d31qbv1cthcecs.cloudfront.net/atrk.js",
            "https://serverhub.com/combine/a059fe7a562c0b582328162f0ee69fda-1426025688",
            "https://serverhub.com/modules/system/assets/js/framework.js",
            "https://js.hs-scripts.com/3844463.js",
            "xfe-URL-Cloudfront.net-stix2-2.1-export.json",
            "xfe-URL-Intercom.io-stix2-2.1-export.json"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Vui",
              "display_name": "Vui",
              "target": null
            },
            {
              "id": "Outubro",
              "display_name": "Outubro",
              "target": null
            },
            {
              "id": "Tente",
              "display_name": "Tente",
              "target": null
            },
            {
              "id": "Anda",
              "display_name": "Anda",
              "target": null
            },
            {
              "id": "Vasaris",
              "display_name": "Vasaris",
              "target": null
            },
            {
              "id": "Rabu",
              "display_name": "Rabu",
              "target": null
            },
            {
              "id": "Srpanj",
              "display_name": "Srpanj",
              "target": null
            },
            {
              "id": "TrackingClient",
              "display_name": "TrackingClient",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "62719a4dec6d0aa4631b9b2f",
          "export_count": 14,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 5708,
            "hostname": 1541,
            "FileHash-SHA256": 876,
            "domain": 915,
            "CVE": 1,
            "FileHash-MD5": 1
          },
          "indicator_count": 9042,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "237 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6840dced3080556150634fa5",
          "name": "VGT INTERNET - pozycjonowanie, serwery, domeny, strony www, poligrafia",
          "description": "https://www.virustotal.com/gui/file-analysis/YjljOTQzMGFmMjYyNjBjNWQ5YmYwOGM5MmM2NTRhNzI6MTc0OTA4MTI5NQ==",
          "modified": "2025-07-05T08:00:58.306000",
          "created": "2025-06-04T23:55:25.528000",
          "tags": [
            "ssdeep",
            "file type",
            "ms windows",
            "pe32",
            "intel",
            "utf16",
            "crlf",
            "unicode",
            "tekst unicode",
            "wersja pliku",
            "dane obrazu",
            "rgba",
            "profesjonalne",
            "projektowanie",
            "tworzenie",
            "stron",
            "internetowych",
            "strony",
            "internetowe",
            "pozycjonowanie",
            "poligrafia",
            "web design",
            "hosting",
            "internet",
            "cms",
            "reklama",
            "vgt internet",
            "skuteczna",
            "przegldaj",
            "skontaktuj",
            "z nami",
            "info",
            "ssl domeny",
            "copyright",
            "string",
            "bareword",
            "might",
            "unknown regexp",
            "os x",
            "sandbox",
            "snort",
            "memory pattern",
            "number",
            "wping",
            "shell"
          ],
          "references": [
            "(stream_tcp) data sent on stream after TCP reset sent (1).txt",
            "http://vgt.pl/static/js/bootstrap-typeahead.js"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Arek-BTC",
            "id": "212764",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 75,
            "FileHash-SHA1": 20,
            "FileHash-SHA256": 76,
            "URL": 273,
            "hostname": 78,
            "domain": 73
          },
          "indicator_count": 595,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 123,
          "modified_text": "288 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "684c65464466dd19b089f325",
          "name": "Zesp\u00f3\u0142 Profilaktyki i Rehabilitacji w Janowicach Wielkich - YouTube",
          "description": "If d=void 0===c,w(\"trustedResourceUrl\",d: \"Trusted resourceUrl,\" thend=c.src,d, c.js, then d:",
          "modified": "2025-06-13T17:56:28.689000",
          "created": "2025-06-13T17:52:06.399000",
          "tags": [
            "rehabilitacji w",
            "youtube tv",
            "dami jelenia",
            "tv dami",
            "jelenia gra",
            "zakupy wycz",
            "jeli",
            "nie korzystasz",
            "filmy",
            "aby tego",
            "copyright",
            "closure library",
            "argument",
            "ifunction",
            "error",
            "null",
            "type",
            "cast",
            "webchannel",
            "su2028u2029",
            "chrome",
            "xmlhttp",
            "kkvoid",
            "remotecontrol",
            "android",
            "unknown",
            "screen",
            "desktop",
            "function",
            "string",
            "array",
            "number",
            "vfunction",
            "f8192",
            "n432",
            "true",
            "j2048",
            "this",
            "window",
            "void",
            "date",
            "pokau017c",
            "pytfunction",
            "fe8function",
            "qgzfunction",
            "afunction",
            "hb28",
            "r150",
            "promise",
            "bigint",
            "post",
            "edge",
            "swhealthlog",
            "symbol",
            "trident",
            "infinity",
            "embed",
            "webkitkeyframes",
            "zoomin",
            "zoominx",
            "zoomoutx",
            "zoominy",
            "zoomouty",
            "2000px",
            "90deg",
            "20px",
            "30deg",
            "30px",
            "10px",
            "10deg",
            "3deg",
            "5deg",
            "djmegamenu",
            "use license",
            "tabindex",
            "menu",
            "close",
            "msie",
            "beforechange",
            "imagehassize",
            "buildcontrols",
            "magnific popup",
            "dmitry semenov",
            "http",
            "beforeclose",
            "afterclose",
            "open",
            "next",
            "open source",
            "bsd license",
            "george mcginley",
            "smith",
            "djimageslider",
            "subpackage",
            "webkit",
            "khtml",
            "icab",
            "countto",
            "callback",
            "handler",
            "object",
            "typeof",
            "method",
            "gnugplv2",
            "website",
            "set module",
            "height script",
            "regexp",
            "screenheight",
            "highcontrast2",
            "highcontrast3",
            "highcontrast",
            "wide",
            "night",
            "body",
            "normalbutton",
            "cookie plugin",
            "https",
            "klaus hartl",
            "mit license",
            "register",
            "nodecommonjs",
            "factory",
            "jquery",
            "write",
            "sticky bar",
            "stickybar",
            "count",
            "offcanvas",
            "html",
            "noscroll",
            "offcanvas var",
            "toggle nav",
            "click jquery",
            "ajax",
            "autocomplete",
            "tomas kirda",
            "typeof define",
            "esc27",
            "tab9",
            "return13",
            "left37",
            "up38",
            "twitter",
            "custom version",
            "joomla",
            "rolemenu",
            "boolean",
            "get adobe",
            "flash player",
            "title",
            "text",
            "typeof data",
            "typeof s",
            "accept",
            "width",
            "foundation",
            "backspace8",
            "comma188",
            "delete46",
            "down40",
            "end35",
            "enter13",
            "escape27",
            "value",
            "migrate",
            "backcompat",
            "quirks mode",
            "typeof f",
            "xtablet768",
            "document",
            "ui sortable",
            "leftright",
            "gnu general",
            "public license",
            "dddddd",
            "ffffcc",
            "eeeeee",
            "verdana",
            "geneva",
            "arial",
            "helvetica",
            "f0f0f0",
            "sans",
            "charset",
            "utf8",
            "fontawesome",
            "typeof b",
            "pseudo",
            "child",
            "sufeffxa0",
            "class",
            "attr",
            "general slider",
            "slide",
            "rgba",
            "navigation",
            "15deg",
            "300px",
            "20deg",
            "transition",
            "scale",
            "baskerville",
            "main image",
            "bdbdbd",
            "f3f3f3",
            "remove",
            "fontface",
            "woff2",
            "u0131",
            "u01520153",
            "u02bb02bc",
            "u02c6",
            "u02da",
            "u02dc",
            "u0304",
            "dirrtl",
            "msviewport",
            "href",
            "span",
            "legend",
            "halflings",
            "fieldset",
            "typeimage",
            "f2f2f2",
            "d9edf7",
            "dff0d8",
            "f2dede",
            "thead",
            "tbody",
            "tahoma",
            "00a0",
            "video",
            "script",
            "2500",
            "xnew ita",
            "dnew jta",
            "dataset",
            "orfunction",
            "prfunction",
            "nsafunction",
            "xsafunction",
            "vrfunction",
            "cakes",
            "ovbfunction",
            "pvbfunction",
            "rvbfunction",
            "qvbfunction",
            "tvbfunction",
            "uvbfunction",
            "vvbclass",
            "xvbclass",
            "yvbclass",
            "svbclass",
            "lvafunction",
            "ggfunction",
            "mvafunction",
            "ovafunction",
            "pvafunction",
            "uvafunction",
            "tvafunction",
            "qvafunction",
            "vvafunction",
            "nvaclass",
            "dark",
            "vector",
            "yy49",
            "raster",
            "roboto",
            "new tk",
            "qael",
            "przechyl",
            "mars",
            "mercury",
            "venus",
            "pluto",
            "titan",
            "weakset",
            "wfclass",
            "googlelayer",
            "uint8array",
            "weakmap",
            "5001",
            "mouseevent",
            "webassembly",
            "180180",
            "9090",
            "google maps",
            "javascript api",
            "internal",
            "small",
            "lightrail",
            "false",
            "february",
            "light",
            "hybrid",
            "bounce",
            "drop",
            "inside",
            "outside",
            "marker",
            "gc"
          ],
          "references": [
            "embed.html",
            "ad_status.js.pobrane",
            "f5Y41t9wqY4.html",
            "cast_sender.js.pobrane",
            "remote.js.pobrane",
            "sw3VTUzeRvWIVwvWSyk6S5gHWPxOOwU1OxerozmN4Hw.js.pobrane",
            "embed.js.pobrane",
            "www-embed-player.js.pobrane",
            "animate.ext.css",
            "animate.min.css",
            "jquery.djmegamenu.js.pobrane",
            "jquery.djmobilemenu.js.pobrane",
            "magnific.js.pobrane",
            "jquery.easing.min.js.pobrane",
            "slider.js.pobrane",
            "jquery.countTo.js.pobrane",
            "scripts.js.pobrane",
            "magnific-init.js.pobrane",
            "pagesettings.js.pobrane",
            "jquery.cookie.js.pobrane",
            "stickybar.js.pobrane",
            "fontswitcher.js.pobrane",
            "offcanvas.js.pobrane",
            "jquery.autocomplete.min.js.pobrane",
            "bootstrap.min.js.pobrane",
            "jcemediabox.js.pobrane",
            "jquery.ui.core.min.js.pobrane",
            "jquery-migrate.min.js.pobrane",
            "layout.min.js.pobrane",
            "jquery.ui.sortable.min.js.pobrane",
            "caption.js.pobrane",
            "finder.css",
            "jquery-noconflict.js.pobrane",
            "djmegamenu.26.css",
            "animations.css",
            "djmobilemenu.css",
            "jquery.min.js.pobrane",
            "djimageslider.css",
            "offcanvas.css",
            "magnific.css",
            "font_switcher.26.css",
            "css",
            "template_responsive.26.css",
            "offcanvas.26.css",
            "bootstrap_responsive.26.css",
            "extended_layouts.26.css",
            "style.css",
            "content.css",
            "template.26.css",
            "bootstrap.26.css",
            "jcemediabox.css",
            "js",
            "onion.js.pobrane",
            "search_impl.js.pobrane",
            "overlay.js.pobrane",
            "map.js.pobrane",
            "util.js.pobrane",
            "search.js.pobrane",
            "common.js.pobrane",
            "geometry.js.pobrane",
            "main.js.pobrane"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Gc",
              "display_name": "Gc",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 26,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Arek-BTC",
            "id": "212764",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 2779,
            "hostname": 661,
            "domain": 684,
            "email": 4,
            "FileHash-MD5": 1,
            "FileHash-SHA256": 689
          },
          "indicator_count": 4818,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 122,
          "modified_text": "310 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "67883dacc017d495135696fd",
          "name": "Pay.gov - Home   is an official website of the United States government",
          "description": "Pay.gov is an official website of the United States government and is a secure, secure way to pay debts, fees and other items, but can you access these via the web or mobile phone?",
          "modified": "2025-05-14T21:17:13.858000",
          "created": "2025-01-15T22:58:51.984000",
          "tags": [
            "system",
            "to privacy",
            "in this",
            "this system",
            "by any",
            "user",
            "authorized or",
            "unauthorized",
            "consent to",
            "this monitoring",
            "interception",
            "d5d5d5",
            "c3d9ff",
            "2px 2px",
            "e8e8e8",
            "e4effb",
            "e7e7e7",
            "fff url",
            "textarea",
            "google sans",
            "arial",
            "invalid file",
            "post",
            "select",
            "typeof c",
            "invalidfilesize",
            "typeof",
            "error",
            "typeof symbol",
            "button",
            "array",
            "date",
            "typeof t",
            "span",
            "arrowdown",
            "navigate",
            "element",
            "click",
            "null",
            "backspace",
            "accept",
            "insert",
            "meta",
            "february",
            "april",
            "june",
            "august",
            "this",
            "value",
            "regexp",
            "azaz",
            "100b",
            "object",
            "cell",
            "azaz09",
            "404not",
            "09az",
            "mouse click",
            "opacity",
            "helvetica",
            "foundation",
            "alpha",
            "georgia",
            "cambria",
            "times new",
            "roman",
            "times",
            "helvetica neue",
            "roboto",
            "90deg",
            "esc"
          ],
          "references": [
            "https://www.pay.gov/public/home",
            "24px.svg",
            "saved_resource.html",
            "search--white.svg",
            "close.svg",
            "icon-dot-gov.svg",
            "icon-https.svg",
            "m=el_main_css",
            "paygov-final.min.js",
            "uswds.min.js.pobrane",
            "Universal-Federated-Analytics-Min.js",
            "jquery-ui.min.css",
            "paygov.min.css",
            "uswds-init.min.js"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Esc",
              "display_name": "Esc",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1531",
              "name": "Account Access Removal",
              "display_name": "T1531 - Account Access Removal"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 12,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Arek-BTC",
            "id": "212764",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 49,
            "hostname": 109,
            "URL": 475,
            "FileHash-SHA256": 140
          },
          "indicator_count": 773,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 122,
          "modified_text": "339 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "67f33233092ab19b74879403",
          "name": "MacOS M2 Chip Infiltration: Game Center & XBOX Pod Game & Chat Server",
          "description": "pulse explores a variety of files, objects, and functions that could be associated with different system components, libraries, and protocols. It highlights a wide range of potential vulnerabilities that may exist in software related to system functions, APIs, data handling, and device interactions, including issues in devices like game controllers, HID devices, and platform-specific services (such as Apple and Android). The pulse references several components across different platforms (macOS, iOS, ARM architectures, and others), with a focus on low-level code, encryption libraries, system utilities, and network protocols like TCP, IP, and Bluetooth. The identified vulnerabilities could involve buffer overflows, deprecated functions, improper memory handling, and potential exploit vectors related to system security, performance, and integrity.",
          "modified": "2025-05-07T02:03:20.735000",
          "created": "2025-04-07T02:02:27.322000",
          "tags": [
            "helper macro",
            "param",
            "param inccache",
            "kerberos",
            "ccache",
            "api function",
            "ccapi",
            "api version",
            "param ioccache",
            "ccacheserver",
            "win32",
            "null",
            "code",
            "win64",
            "error",
            "union",
            "ccapideprecated",
            "ccacheapi",
            "ccapiv2h",
            "apple",
            "export",
            "united",
            "ccache api",
            "cplusplus",
            "x8664",
            "typedef",
            "patheq",
            "none",
            "popen",
            "terminate",
            "false",
            "winenv",
            "winexe",
            "frozen",
            "winservice",
            "python",
            "posixthreads",
            "pyhavecondvar",
            "ntthreads",
            "vista",
            "pyemulatedwincv",
            "ntddivista",
            "semaphore",
            "pycondt",
            "win7",
            "pybuildcore",
            "fall",
            "copyright",
            "technology",
            "all rights",
            "reserved",
            "america",
            "government",
            "within that",
            "klprincipal",
            "klloginoptions",
            "inpassword",
            "klboolean",
            "klindex inindex",
            "login",
            "klstatus",
            "kerberos login",
            "inst",
            "regexp",
            "typeof e",
            "function",
            "typeof t",
            "typeof o",
            "width",
            "typeof",
            "pseudo",
            "body",
            "sticky",
            "date",
            "class",
            "this",
            "void",
            "accept",
            "span",
            "krb5callconv",
            "apoptsreserved",
            "tktflgreserved",
            "kdcoptreserved",
            "krb5data",
            "eblock",
            "krb5address",
            "krb5keyblock",
            "service",
            "realm",
            "format",
            "general",
            "internal",
            "entropy",
            "mask",
            "mcpeerid",
            "mcsession",
            "property",
            "protocol",
            "create",
            "nsuinteger",
            "notifies",
            "mcsession api",
            "interface",
            "bonjour",
            "ascii lowercase",
            "abc company",
            "section",
            "bonjour txt",
            "mcextern",
            "attribute",
            "mcextern extern",
            "mcexternweak",
            "nsenum",
            "nsinteger",
            "mcerrorcode",
            "mcerrorunknown",
            "mcerrortimedout",
            "bonjour apis",
            "stop",
            "peer",
            "example",
            "tags",
            "session",
            "nsprogress",
            "nserror",
            "nsstring",
            "nsurl",
            "nsarray",
            "note",
            "ui element",
            "utf8 encoding",
            "nscopying",
            "nsdictionary",
            "webpackrequire",
            "webpackexports",
            "object",
            "adobe systems",
            "adobe",
            "incorporated",
            "dissemination",
            "touchmove",
            "window",
            "launch",
            "close",
            "core",
            "webview",
            "nwebpackrequire",
            "arraybuffer",
            "name",
            "typedarray",
            "prototype",
            "string",
            "number",
            "nvar",
            "meta",
            "infinity",
            "generator",
            "zero",
            "epsilon",
            "observer",
            "android",
            "freeze",
            "trim",
            "canvas",
            "simple",
            "bind",
            "fast",
            "next",
            "patch",
            "rest",
            "middle",
            "find",
            "enumerate",
            "facebook",
            "executor",
            "apiunavailable",
            "gamecontroller",
            "gcbuttoninput",
            "gcswitchinput",
            "nsobject",
            "apiavailable",
            "hid device",
            "cfstr",
            "iohiddeviceref",
            "boolean value",
            "c iohidmanager",
            "iohidmanager",
            "c iohiddevice",
            "issequential",
            "bool sequential",
            "bool canwrap",
            "nsset",
            "nsunavailable",
            "gcswitchelement",
            "bool",
            "share button",
            "xbox controller",
            "xbox elite",
            "xbox series",
            "gcxboxgamepad",
            "gcpoint2",
            "gcpoint2make",
            "gcpoint2 p",
            "cfinline bool",
            "gcpoint2equal",
            "gcpoint2 point1",
            "gcpoint2 point2",
            "gcrelativeinput",
            "isanalog",
            "bool analog",
            "hasinclude",
            "gcaxis2dinput",
            "gcpoint2 value",
            "gcaxiselement",
            "certain",
            "gcaxisinput",
            "gcbuttonelement",
            "gccontroller",
            "nsnotification",
            "chhapticengine",
            "gcmicrogamepad",
            "input",
            "menu button",
            "gcdevicelight",
            "gccolor",
            "x axis",
            "xvalue",
            "developers",
            "functionality",
            "options button",
            "sf symbols",
            "elements",
            "gcdevice",
            "gctouchstate",
            "gctouchstateup",
            "apideprecated",
            "gckeyboard",
            "gcmouse",
            "nsswiftname",
            "gcdevicebattery",
            "battery level",
            "direction pad",
            "directionapad",
            "thumbstick",
            "gcdevicecursor",
            "a controller",
            "gccolor color",
            "gcinputbuttona",
            "gcinputbuttonb",
            "button b",
            "check",
            "a element",
            "c nil",
            "nsenumerator",
            "siri remote",
            "equivalent",
            "down",
            "left",
            "right",
            "kindof",
            "handle button",
            "c device",
            "immediate input",
            "dualsense",
            "positional",
            "sony dualsense",
            "gcmotion",
            "dualshock",
            "uievent",
            "controllers",
            "uikit user",
            "uiview",
            "method",
            "nsdata",
            "axes",
            "nsdata source",
            "return",
            "nullable",
            "nsdata object",
            "button",
            "shoulder",
            "extended",
            "gamepad profile",
            "nsdata api",
            "gcgamepad",
            "sizeof",
            "standard",
            "gckeyboardinput",
            "keyboard",
            "nsstring const",
            "controller",
            "back buttons",
            "game controller",
            "back",
            "keypad",
            "delete",
            "insert",
            "home",
            "right arrow",
            "left arrow",
            "down arrow",
            "up arrow",
            "korean",
            "backspace",
            "alongside",
            "gckeyuparrow",
            "gckeycode const",
            "lang1",
            "gclinearinput",
            "gcquaternion",
            "gcacceleration",
            "y axis",
            "z axis",
            "gcmouse mouse",
            "gcmouse class",
            "mice",
            "gcmouseinput",
            "mouse profile",
            "scroll",
            "nsdata instance",
            "a alias",
            "press",
            "micro profile",
            "siri remotes",
            "b button",
            "a gcinput",
            "button a",
            "nsoptions",
            "examining",
            "c sfsymbolsname",
            "apple tv",
            "remote",
            "control center",
            "a set",
            "game",
            "gcracingwheel",
            "gcbundlewithpid",
            "gcinputbuttonx",
            "gcinputbuttony",
            "gcinputshifter",
            "gckeya",
            "gckeyb",
            "gckeybackslash",
            "rawvalue",
            "apple swift",
            "o librarylevel",
            "swift import",
            "element",
            "indices",
            "iterator",
            "subsequence",
            "kerberoscomerr",
            "const",
            "permission",
            "mit software",
            "suitability",
            "athena",
            "openvision",
            "gssdllimp",
            "gssapigenerich",
            "this software",
            "purpose",
            "disclaims all",
            "warranties with",
            "regard to",
            "constraint",
            "kerberosprofile",
            "krb5profileh",
            "const names",
            "newvalue",
            "1429577728l",
            "gnuc",
            "mach",
            "omuint32",
            "gssapikrb5h",
            "form",
            "uid form",
            "client function",
            "asrep",
            "including",
            "preauth",
            "db entry",
            "free",
            "pointer",
            "rock",
            "neither",
            "direct",
            "damage",
            "minorstatus",
            "gssbuffert",
            "gssctxidt",
            "gssoid",
            "gssnamet",
            "gsscredidt",
            "gssoidset",
            "gssapi",
            "first",
            "alcapi",
            "alcapientry",
            "alcboolean",
            "targetosmac",
            "alcdevice",
            "alcenum param",
            "alalch",
            "alcchar",
            "alcsizei",
            "capture",
            "but not",
            "limited",
            "openal cross",
            "apple computer",
            "redistribution",
            "is provided",
            "type",
            "alvoid",
            "alint",
            "openal",
            "aluint sid",
            "alenum",
            "alint value",
            "aluint property",
            "alvoid nonnull",
            "alfloat",
            "write",
            "openalopenalh",
            "umbrella header",
            "alenum param",
            "alapi",
            "aluint bid",
            "alsizei",
            "alfloat value",
            "alapientry",
            "aluint",
            "verify",
            "play",
            "speed",
            "bits",
            "albuffer3i",
            "albufferdata",
            "albufferf",
            "albufferfv",
            "albufferi",
            "albufferiv",
            "aldistancemodel",
            "aldopplerfactor",
            "algetbooleanv",
            "algetbuffer3f",
            "iousbhostdevice",
            "iousbhostobject",
            "iousbhostpipe",
            "iousbhoststream",
            "iousbhost",
            "brief",
            "usb host",
            "bool yes",
            "bool no",
            "advance",
            "iousbhostfamily",
            "kernel",
            "ioreturn status",
            "nsnumber",
            "ioreturn error",
            "usb device",
            "select",
            "commands",
            "enqueue",
            "nsmutabledata",
            "field",
            "enum",
            "options",
            "retrieve",
            "iosource",
            "current address",
            "bos descriptor",
            "extract",
            "a descriptor",
            "license",
            "io request",
            "abort",
            "discussion",
            "stream",
            "please",
            "swift api",
            "iousbbitrange",
            "iousbbitrange64",
            "iousbbit",
            "client",
            "usb controller",
            "usb descriptor",
            "unknown",
            "critical",
            "refer",
            "link",
            "send",
            "same",
            "common ui",
            "bluetooth",
            "service browser",
            "option",
            "1001",
            "cfstringref",
            "deprecated",
            "macos",
            "returns",
            "abstract",
            "nswindow",
            "creates",
            "mac os",
            "uuids",
            "uuid",
            "sdp service",
            "nsimage",
            "nsview",
            "mpasskeystring",
            "nsmutablearray",
            "uuid array",
            "ioreturn",
            "runmodal",
            "group",
            "command",
            "byte",
            "masks",
            "pduid",
            "l2cap",
            "range",
            "opcode",
            "packet",
            "major",
            "local",
            "profiles",
            "iobluetooth",
            "framework",
            "support",
            "host controller",
            "rfcomm",
            "minor class",
            "pseudoclass",
            "specific device",
            "headset",
            "peripheral",
            "desktop",
            "glasses",
            "device reset",
            "no hci",
            "hci controller",
            "returns number",
            "variable number",
            "packdata",
            "cstring",
            "pass",
            "path",
            "deprecated in",
            "obex session",
            "obexsessionref",
            "rfcomm channel",
            "obex",
            "does not",
            "l2cap channel",
            "inrefcon",
            "device",
            "length",
            "obex spec",
            "error code",
            "make",
            "headerid",
            "april",
            "alarm",
            "avrcplog",
            "audiolog",
            "bccmd16touint16",
            "bccmd16touint8",
            "bccmd32touint32",
            "hfplog",
            "obexcreatevcard",
            "obexsessionget",
            "uint16tobccmd16",
            "intents",
            "created",
            "andrea gottardo",
            "inimage",
            "intentsui",
            "project version",
            "inshortcut",
            "ibdesignable",
            "invoiceshortcut",
            "nsbundle",
            "siri",
            "beralloct",
            "berbvarrayadd",
            "berbvarrayfree",
            "berbvdup",
            "berbvecadd",
            "berbvecfree",
            "berbvfree",
            "berdump",
            "berdup",
            "berdupbv",
            "ldap",
            "vdspinput1",
            "vectorsize",
            "iirchannel",
            "osvkerndsplib",
            "pragmaonce",
            "paul chang",
            "fri mar",
            "original code",
            "apple operating",
            "modifications",
            "apple public",
            "source license",
            "version",
            "lframesize",
            "i386",
            "picify",
            "callmcount",
            "nonlazystub",
            "align",
            "roundtostack",
            "leaf",
            "import",
            "carnegie mellon",
            "carnegie",
            "inline void",
            "software",
            "school",
            "august",
            "xnuarchi386selh",
            "next computer",
            "mike demoney",
            "bruce martin",
            "state segment",
            "nxswappedfloat",
            "osswapint32",
            "inline float",
            "inline double",
            "osswapint64",
            "armlimitsh",
            "arm64",
            "useclangtypes",
            "bsdarmtypesh",
            "int8t",
            "gnuc typedef",
            "uint8t",
            "ansi c",
            "ansi",
            "use wchart",
            "armmcontexth",
            "mcontextt",
            "armparamh",
            "round",
            "darwinsizet",
            "darwinalign",
            "uint32t",
            "darwinalign32",
            "warranties",
            "a particular",
            "university",
            "armarch6zk",
            "armarch6k",
            "armarch4t",
            "armarch4",
            "http",
            "capbitnb",
            "legacy",
            "armfeatureflag",
            "california",
            "notice",
            "berkeley",
            "limited to",
            "define",
            "useclanglimits",
            "lp64",
            "ansisource",
            "darwincsource",
            "longmin",
            "ulongmax",
            "parameter",
            "vmmemcoherent",
            "vmmemearlyack",
            "vmmeminner",
            "vmmemrt",
            "vmmemguarded",
            "armmemorytypesh",
            "armpalroutinesh",
            "read",
            "struct",
            "booleant",
            "cluster",
            "devbsize",
            "mclbytes",
            "unix system",
            "laboratories",
            "devbshift",
            "thumb",
            "armv5",
            "armv7",
            "cache",
            "neon",
            "swift",
            "bsdarmprofileh",
            "xxx todo",
            "block",
            "mcount",
            "mcountinit",
            "mcountenter",
            "splhigh",
            "armthreadh",
            "armtraph",
            "dflssiz",
            "targetososx",
            "maxssiz",
            "rliminfinity",
            "maxcsiz",
            "bsdarmvmparamh",
            "dfldsiz",
            "maxdsiz",
            "xxx stack",
            "armsignal",
            "int64t",
            "armmachtypesh",
            "int32t",
            "methods",
            "thread",
            "hasapplepac",
            "atmatmtypesh",
            "libkernlocksh",
            "fortifysource",
            "libkerncopyioh",
            "sizedby",
            "darwinosinline",
            "stdcversion",
            "osswapint16",
            "libkerncrch",
            "blockexport",
            "vaargs",
            "blockrelease",
            "blockh",
            "collection",
            "blockcopy",
            "ososbaseh",
            "base",
            "byteoffset",
            "host endianess",
            "generic host",
            "generic",
            "osmalloc",
            "osmalloctag tag",
            "osmalloctag",
            "pci device",
            "uint32",
            "uint32 mask",
            "safecastptr",
            "sint32",
            "osaddatomic64",
            "uint8",
            "libkern c",
            "internal error",
            "core osreturn",
            "libkern",
            "values",
            "pragmamark",
            "kexts",
            "kext",
            "c string",
            "grab",
            "osostypesh",
            "boolean",
            "unsignedwide",
            "uint32 hi",
            "buildtime value",
            "libkernversionh",
            "versionmajor",
            "versionminor",
            "versionvariant",
            "versionrevision",
            "ostype",
            "osrelease",
            "libkernsysctlh",
            "instructions",
            "data cache",
            "future",
            "rbleft",
            "rbright",
            "rbgetparent",
            "splayright",
            "splayleft",
            "rbsetcolor",
            "rbblack",
            "rbgetcolor",
            "comp",
            "main",
            "stdc",
            "msdos",
            "windows",
            "sys16bit",
            "zlibdll",
            "zextern",
            "zconfh",
            "model",
            "zextern int",
            "zstreamerror",
            "znull",
            "zbuferror",
            "zmemerror",
            "zstreamend",
            "zdataerror",
            "zfinish",
            "enough",
            "possible",
            "trailer",
            "compiler",
            "countedby",
            "sparta",
            "osatomic",
            "ipcipctypesh",
            "ipcobjectnull",
            "ipcobjectdead",
            "osreturn",
            "nfskrpch",
            "xdrbuf",
            "xdrbuf xbp",
            "xbptr",
            "xbleft",
            "tlen",
            "lval",
            "xbcleanup",
            "xbtype",
            "xbflags",
            "nfsargsversion",
            "file",
            "packed",
            "nfshz",
            "mount",
            "term",
            "restrict",
            "stats",
            "nfsbitmapset",
            "nfsver3",
            "nfsxunsigned",
            "attr",
            "nfsprogram",
            "nfssmallfh",
            "which",
            "from",
            "mark",
            "obsolete",
            "ip address",
            "iaddrt",
            "netinetbootph",
            "nvmaxtext",
            "magic",
            "etheraddrlen",
            "target",
            "byteorder",
            "bigendian",
            "littleendian",
            "dest",
            "igmp",
            "ushort",
            "inpcbptr",
            "inpcblistentry",
            "ipsec",
            "pcbs",
            "cookie",
            "netinetinstath",
            "minimal",
            "result",
            "arp packet",
            "icmpparamprob",
            "icmpredirect",
            "address",
            "ditto",
            "ip filter",
            "ipv4",
            "ip packet",
            "inject",
            "wifi",
            "server",
            "tcpmaxnotifyack",
            "wired",
            "ecn setup",
            "notify",
            "slow",
            "definitions",
            "tcptmax",
            "retransmit",
            "mptcp",
            "tcpsclosewait",
            "tcpsestablished",
            "tcpstimewait",
            "tcpseq",
            "timer drift",
            "sack",
            "char",
            "icmp",
            "synack",
            "tcpoptnop",
            "syndata",
            "ver",
            "internet",
            "iopcidevice",
            "constant",
            "perst",
            "localonly",
            "iooptionbits",
            "optional access",
            "ioservice",
            "open",
            "pcidriverkith",
            "osmetaclassbase",
            "iorpc rpc",
            "auditpipeiobase",
            "auditsdeviobase",
            "ioctls",
            "data",
            "the software",
            "stdargh",
            "hasincludenext",
            "eli friedman",
            "as is",
            "hack",
            "atomic",
            "atomicseqcst",
            "clangstdatomich",
            "stdchosted",
            "stdboolh",
            "needwintt",
            "stddefh",
            "hasbuiltin",
            "const src",
            "xnumembersize",
            "const dst",
            "wcharmax",
            "wcharmin",
            "limits",
            "kernelstdinth",
            "lp64 typedef",
            "intmaxc",
            "uintmaxc",
            "ptrauth",
            "olddata",
            "value",
            "declkey",
            "abi pointer",
            "c function",
            "float16",
            "fltevalmethod",
            "legacy bsd",
            "c standard",
            "sincospi",
            "cosp",
            "x8664monotonich",
            "staticifentry",
            "hasmte",
            "vmmemorytypesh",
            "vmwimgdefault",
            "wimg",
            "extvectortype",
            "utilfunction",
            "aligned",
            "srcptr",
            "vmpmaph",
            "vmdyldpagerh",
            "vmvmfaulth",
            "vmvmmaph",
            "development",
            "debug",
            "vmvmoptionsh",
            "vmvmpageouth",
            "kasantbi",
            "machvmmemtagh",
            "given",
            "vmmemtagptrsize",
            "vmmemtagtagsize",
            "copy",
            "vmsharedregionh",
            "vfsvfssupporth",
            "veclib",
            "master",
            "world wide",
            "various",
            "veclibtypes",
            "carbonlib",
            "availability",
            "carbon",
            "noncarbon cfm",
            "vbasicops",
            "shift",
            "vforceh",
            "vdsplength n",
            "realp",
            "nonnull",
            "vector",
            "dspsplitcomplex",
            "ieee",
            "dspcomplex",
            "uuiduuidh",
            "uuiddefine",
            "public",
            "uuid library",
            "kernelserver",
            "simpleroutine",
            "undkey",
            "execution",
            "strings array",
            "user",
            "title string",
            "info",
            "1024",
            "xmldatat",
            "undreplyref",
            "kernsuccess",
            "osaction",
            "targetosiphone",
            "istargetvendor",
            "targetcpux8664",
            "targetosunix",
            "targetcpuppc",
            "targetcpuppc64",
            "targetcpux86",
            "targetrtmaccfm",
            "bridge",
            "svflags",
            "svpavreal",
            "svpavreify",
            "xpvav",
            "svany",
            "avfillp",
            "for apidoc",
            "mutableav",
            "avrealoff",
            "pltopenv",
            "stmtstart",
            "stmtend",
            "copfile",
            "plcurstackinfo",
            "copfilegv",
            "cophinthashget",
            "loop",
            "stack",
            "beware",
            "orig",
            "loops",
            "this file",
            "the build",
            "plbitcount",
            "u8 value",
            "cvflags",
            "xpvcv",
            "mutableptr",
            "perlcore",
            "cvgv",
            "cvfile",
            "cvfmethod",
            "cvflvalue",
            "cvfconst",
            "anon",
            "doinit extconst",
            "ebcdic",
            "extconst u8",
            "index",
            "ascii platform",
            "confusingly",
            "u8 pla2e",
            "pla2e",
            "u8 ple2a",
            "guard",
            "declspec",
            "extconst",
            "ext externc",
            "init",
            "larry wall",
            "gnu general",
            "readme file",
            "multiplicity",
            "plsawampersand",
            "do not",
            "perliogetc",
            "perlioputc",
            "perliostdoutf",
            "perlio",
            "perlfeatureh",
            "featuresubbit",
            "featuremyrefbit",
            "featurefcbit",
            "featureisabit",
            "featuresaybit",
            "featurestatebit",
            "featuretrybit",
            "hintfeaturemask",
            "ffspace",
            "process",
            "ffdecimal",
            "ffend",
            "gvgp",
            "gvflags",
            "gvnamehek",
            "svtype",
            "gvegv",
            "gvstash",
            "gvxpvgv",
            "svtpvgv",
            "svtpvlv",
            "super",
            "edit directly",
            "djgpp",
            "bitbucket",
            "perlsysinitbody",
            "perlioinit",
            "perlsystermbody",
            "w macros",
            "wexitstatus",
            "shpath",
            "mkdir",
            "rotl64",
            "rotl32",
            "rotate x",
            "rotr32",
            "can64bithash",
            "rotr64",
            "ivsize",
            "u8to16le",
            "rotluv",
            "rotruv",
            "sbox32maxlen",
            "plhashstate",
            "perlhash",
            "perl",
            "usehashseed",
            "perlseenhvfunch",
            "perlhashseed",
            "siphash24",
            "siphash13",
            "seed",
            "c program",
            "c type",
            "c compiler",
            "gcc attribute",
            "longsize",
            "c preprocessor",
            "install",
            "kill",
            "cont",
            "thus",
            "ext declspec",
            "dext",
            "for apidocitem",
            "utf8",
            "ascii",
            "fitsin8bits",
            "nativetolatin1",
            "strwithlen",
            "u8 end",
            "test",
            "poison",
            "february",
            "cray",
            "prior",
            "behaviour",
            "except",
            "alpha",
            "perlvar",
            "perlvari",
            "perlvara",
            "padoffset",
            "true",
            "pmop",
            "hooks",
            "hook",
            "sv invlist",
            "perlinregcompc",
            "svcur",
            "perlinopc",
            "tointernalsize",
            "svtinvlist",
            "invlistlen",
            "strlen",
            "hvaux",
            "heklen",
            "svook",
            "hekutf8",
            "hekkey",
            "hekflags",
            "mutablehv",
            "hvnameheknn",
            "gosh",
            "leave",
            "iperlsock",
            "plsock",
            "iperlstdio",
            "plstdio",
            "iperlproc",
            "plproc",
            "iperllio",
            "pllio",
            "perlimplicitsys",
            "plink",
            "keypackage",
            "keyend",
            "keysub",
            "keydump",
            "keylog",
            "keysend",
            "keystate",
            "perlioclose",
            "perlmemcollxfrm",
            "nativetoneed",
            "plclocaleobj",
            "plno",
            "plwarnall",
            "plwarnnone",
            "plyes",
            "plzero",
            "plc9utf8dfatab",
            "nomathoms",
            "perlintokec",
            "perlinutf8c",
            "perlinsvc",
            "perlinregexecc",
            "debugging",
            "perlinlocalec",
            "pfinet",
            "snoop",
            "ccprint",
            "ccgraph",
            "cccharnamecont",
            "ccascii",
            "ccwordchar",
            "ccalphanumeric",
            "ccidfirst",
            "ccquotemeta",
            "ccalpha",
            "cccased",
            "ordinal",
            "magicvtablemax",
            "extra",
            "regex match",
            "env hash",
            "isa array",
            "debugger",
            "sig hash",
            "available",
            "shadow",
            "array length",
            "magic mg",
            "sv sv",
            "mgftainteddir",
            "hefsvkey",
            "mutablesv",
            "ssizet",
            "mgvtbl entry",
            "mgfbytes",
            "perlmagicsv 0",
            "special",
            "perlmagicarylen",
            "perlmagicrhash",
            "extra data",
            "perlmagicpos",
            "perlmagicsymtab",
            "provides",
            "dtrace probes",
            "stdioh",
            "stdioincluded",
            "sfioversion",
            "rxfpmfcharset",
            "rxfpmfmultiline",
            "rxfpmffold",
            "rxfpmfextended",
            "rxfpmfnocapture",
            "rxfpmfkeepcopy",
            "flags",
            "rxfpmfstrict",
            "ocshift",
            "plop",
            "perlbitfield16",
            "baseop op",
            "useithreads",
            "pmfonce",
            "padop",
            "perlcknull",
            "perlckfun",
            "opparg1mask",
            "opparg4mask",
            "opparg2mask",
            "perlckftst",
            "perlppftrowned",
            "perlckbitop",
            "perlckcmp",
            "perlcklfun",
            "dump",
            "chroot",
            "syscall",
            "flip",
            "undef",
            "crypt",
            "push",
            "stub",
            "trans",
            "predec",
            "flop",
            "prtf",
            "shutdown",
            "perlcontext cx",
            "perlmemlog",
            "c pointer",
            "cxtype",
            "logic",
            "toavamg",
            "tohvamg",
            "opftrread",
            "oplt",
            "opincmp",
            "opbitand",
            "opsbitor",
            "opsend",
            "opgetpeername",
            "opfteexec",
            "opftbinary",
            "opclose",
            "plparser",
            "yylex",
            "lexshared",
            "position",
            "repl",
            "memsize",
            "malloct",
            "perlmallocctlh",
            "uv nfree",
            "uv ntotal",
            "iv topbucket",
            "iv totalsbrk",
            "iv minbucket",
            "level",
            "plcomppad",
            "plcurpad",
            "uvxf",
            "ptr2uv",
            "avarray",
            "padnameflags",
            "plcopseqmax",
            "padlistarray",
            "c array",
            "padnametype",
            "incpushperl5lib",
            "appllibexp",
            "privlibexp",
            "defineincmacros",
            "perlfsversion",
            "perl5lib",
            "sitearchexp",
            "perllanginfoh",
            "hasnllanginfo",
            "ilanginfo",
            "codeset",
            "codeset 1",
            "dtfmt",
            "dtfmt 2",
            "dfmt",
            "dfmt 3",
            "sipround",
            "u8to64le",
            "fallthrough",
            "uint64c",
            "perlsiphashfnc",
            "siprounds",
            "strlen inlen",
            "sipfinalrounds",
            "could",
            "configure",
            "plout",
            "mine001",
            "argv",
            "plin",
            "localpatchcount",
            "perlapih",
            "xs code",
            "portingglossary",
            "first version",
            "brand",
            "symbols",
            "haswcrtomb",
            "perlionotstdio",
            "perlcallconv",
            "perlio f",
            "perlioh",
            "usestdio",
            "case",
            "bufsiz",
            "sizet",
            "perlstability",
            "perltypedefs",
            "perldtracehin",
            "perlloadedfile",
            "perlloadingfile",
            "perlopentry",
            "perlphasechange",
            "perlsubentry",
            "perlsubreturn",
            "generated",
            "perlcallconv iv",
            "sizet count",
            "sv arg",
            "mode",
            "perliofuncs tab",
            "stdchar",
            "perliolistt",
            "sv args",
            "mutex",
            "perlinterpreter",
            "sigsize",
            "perlioisstdio",
            "perlcallconv op",
            "perldokv",
            "perlppaassign",
            "perlppabs",
            "perlppaccept",
            "perlppadd",
            "perlppaeach",
            "perlppaelem",
            "public license",
            "free software",
            "foundation",
            "yydebug",
            "bison",
            "bareword",
            "funcmeth",
            "arrow",
            "targ",
            "pushs",
            "tops",
            "does",
            "xsub",
            "pops",
            "xpushs",
            "erange",
            "perlreentrapi",
            "perlreentrapi0",
            "hostentsize",
            "getgrentrproto",
            "getpwentrproto",
            "getnetentrproto",
            "grentbuffer",
            "grentsize",
            "hostenterrno",
            "redebugflag",
            "debugvtest",
            "debugr",
            "u16 nextoff",
            "argset",
            "u8 type",
            "nextoff",
            "strings",
            "problem",
            "june",
            "invert",
            "perlfpclass",
            "longdoublekind",
            "plstatusvalue",
            "pldebug",
            "numclasses",
            "locale",
            "grok",
            "pragma",
            "dword",
            "attack",
            "little",
            "lynx",
            "done",
            "reany",
            "rxpextflags",
            "rxextflags",
            "checkpoint cp",
            "rxftaintedseen",
            "rxfcopydone",
            "plsavestackix",
            "plsavestack",
            "plsavestackmax",
            "ssmaxpush",
            "enter",
            "debugscope",
            "state",
            "u32 state",
            "debugsbox32hash",
            "sbox32warn5",
            "line",
            "mutexunlock",
            "mutexinit",
            "noop",
            "mutexlock",
            "condinit",
            "detach",
            "panic",
            "usetm64",
            "should",
            "bsd extension",
            "configuration",
            "time64debug",
            "int64t nv",
            "gnu extension",
            "perltime64h",
            "time64t",
            "int64t int64",
            "int64 time64t",
            "i32 year",
            "tm64",
            "hastmtmgmtoff",
            "decide",
            "svpvx",
            "svgmagic",
            "bonk",
            "anything",
            "turn",
            "crash",
            "fstat",
            "perlmicro",
            "hasioctl",
            "hasutime",
            "hasgroup",
            "haspasswd",
            "usemybinmode",
            "idirent",
            "likely",
            "generated code",
            "utfebcdic",
            "unicode",
            "step",
            "ufeff",
            "u00a0",
            "u00df",
            "u00b5",
            "ufffd",
            "u017f",
            "u0300",
            "unlikely",
            "nativeutf8toi8",
            "utf8skip",
            "nativetouni",
            "lazy",
            "extrasize",
            "regnodemax",
            "exact",
            "match",
            "whilem",
            "anyof",
            "curly",
            "trie",
            "curlym",
            "eval",
            "star",
            "perlutilh",
            "hsmapiverlen",
            "hsxsverlenmax",
            "hskeyp",
            "tools",
            "sv vs",
            "perlversionlt",
            "svpvxnolenconst",
            "perlckwarner",
            "u32 err",
            "scroakxsusage",
            "pluumap",
            "warnings",
            "categories",
            "plcurcop",
            "perlckwarn",
            "perlckwarnd",
            "perlwarnisset",
            "perlwarnoff",
            "perlwarnbit",
            "xsversion",
            "xsreturn",
            "perlxshandshake",
            "plstackbase",
            "hskey",
            "zaphod32mix",
            "u8to32le",
            "zaphod32warn4",
            "zaphod32warn3",
            "zaphod32warn6",
            "perlform",
            "i8tonativeutf8",
            "warnutf8",
            "myshift",
            "c extension",
            "libs",
            "cflags",
            "afkuserlog",
            "kafkeventcancel",
            "kafkeventerror",
            "adamsbagmanager",
            "adjinglerequest",
            "isinternalbuild",
            "kickmcxdforuid",
            "loadappkit",
            "ardconfig",
            "authenticator",
            "dsauthenticator",
            "dsnode",
            "dsrecord",
            "hostconfig",
            "addtofront",
            "calcslope",
            "copyarray",
            "createcachenode",
            "defaultebecurve",
            "deletecache",
            "disablehcucache",
            "dumpcache",
            "dumpoutputhcu",
            "enablet1sim",
            "ascagent",
            "ascagentproxy",
            "asdevice",
            "ddrangecompare",
            "wdosloglauncher",
            "wdoslogprotocol",
            "findchar",
            "ddasllogger",
            "ddfilelogger",
            "ddlog",
            "ddlogfileinfo",
            "ddlogmessage",
            "ddloggernode",
            "mkurlparser",
            "mkerrordomain",
            "mkintegerhash",
            "mklonghash",
            "mkmaprectinset",
            "mkmaprectnull",
            "mkmaprectoffset",
            "mkmaprectworld",
            "mkmapsizeworld",
            "kextensionnonui",
            "wkarraycreate",
            "wkbooleancreate",
            "wkcontextcreate",
            "wkdatacreate",
            "wkdatagettypeid",
            "wkdoublecreate",
            "wkframecopyurl",
            "wkgettypeid",
            "wkimagecreate",
            "wkpagecandelete",
            "webkit",
            "methodkind",
            "wkerrordomain",
            "by apple",
            "document",
            "a block",
            "wkcontentworld",
            "wkwebview",
            "javascript",
            "wkerrorcode",
            "wkerrorunknown",
            "nsswiftasync",
            "wkswiftasync",
            "wkcookiepolicy",
            "nshttpcookie",
            "whether",
            "wknavigation",
            "wkdownload",
            "decides",
            "mime type",
            "wkscriptmessage",
            "wkframeinfo",
            "information",
            "url scheme",
            "wkcontentmode",
            "wkuserscript",
            "wkextern",
            "media",
            "promise",
            "fulfill",
            "cgfloat",
            "targetoswatch",
            "sign",
            "password",
            "provider",
            "uicontrol",
            "nscontrol",
            "opaque user",
            "apple id",
            "nsstring user",
            "asuseragerange",
            "initiate",
            "asauthorization",
            "confirms",
            "apple upgrade",
            "nserrorenum",
            "operation",
            "relying party",
            "targetosvision",
            "a byte",
            "nsdata userid",
            "relying",
            "a string",
            "asapiavailable",
            "http response",
            "authorization",
            "oauth",
            "saml",
            "nsdata readdata",
            "bool didwrite",
            "a cose",
            "nsstring name",
            "bool appid",
            "targetosxr",
            "a state",
            "a json",
            "web token",
            "private seckeys",
            "nsstring appid",
            "mdm profile",
            "nsurl url",
            "returns yes",
            "lacontext",
            "asswiftsendable",
            "keychain",
            "cose algorithm",
            "ecdsa",
            "sha256",
            "cose curve",
            "p256",
            "nsinteger rank",
            "enables",
            "bool success",
            "remove",
            "call",
            "complete",
            "prepare",
            "attempt",
            "list",
            "nsextension",
            "settings",
            "initializes",
            "a key",
            "extensions",
            "hash",
            "json",
            "initialize",
            "nsstring origin",
            "settings app",
            "urls",
            "https urls",
            "safari",
            "cancel",
            "nsuuid uuid",
            "asextern extern",
            "asextern",
            "nsswiftsendable",
            "uiwindow",
            "propertykind",
            "gkplayer",
            "n tags",
            "gkerrordomain",
            "gamecenter",
            "targetosios",
            "targetostv",
            "nsavailable",
            "gkachievement",
            "local player",
            "view",
            "present",
            "optional",
            "gkbaseplayer",
            "game center",
            "uiimage",
            "app store",
            "gkchallenge",
            "gklocalplayer",
            "nsdeprecated",
            "a singleton",
            "gkcloudplayer",
            "returns nil",
            "nsdeprecatedmac",
            "internal2",
            "internal3",
            "internal4",
            "gkscore",
            "gkextern",
            "gkextern extern",
            "gkexternweak",
            "gkerrorcode",
            "gkerrorunknown",
            "gkerrorunderage",
            "friendplayer",
            "standard view",
            "nsresponder",
            "parentwindow",
            "ibaction",
            "gkgamesession",
            "apis",
            "gkplayer player",
            "nsinteger score",
            "nsdate date",
            "gkleaderboard",
            "connect",
            "nsinteger value",
            "load",
            "gktransporttype",
            "nsstring title",
            "loads array",
            "localized",
            "gkmatch",
            "gkmatchrequest",
            "gkinvite",
            "gksession",
            "gksession api",
            "gamekit",
            "asynchronously",
            "welcome",
            "nstimeinterval",
            "delegate",
            "delivery",
            "gksenddatamode",
            "gksessionmode",
            "gkphotosize",
            "callbacks",
            "gkmatchdelegate",
            "gksavedgame",
            "default value",
            "gksessionerror",
            "gkvoicechat",
            "participant",
            "voice chat",
            "clienta"
          ],
          "references": [
            "CredentialsCache.h",
            "CredentialsCache2.h",
            "config.xml",
            "popen_spawn_win32.py",
            "pycore_condvar.h",
            "Kerberos.h",
            "KerberosLogin.h",
            "plugin.js",
            "krb5.h",
            "MultipeerConnectivity.tbd",
            "MCBrowserViewController.h",
            "MCNearbyServiceAdvertiser.h",
            "MCError.h",
            "MCAdvertiserAssistant.h",
            "MCNearbyServiceBrowser.h",
            "MultipeerConnectivity.apinotes",
            "MultipeerConnectivity.h",
            "MCSession.h",
            "MCPeerID.h",
            "canvas.html",
            "capture_0.bundle.js",
            "capture_resize.js",
            "GCRacingWheelInput.h",
            "GCSyntheticDeviceKeys.h",
            "GCSwitchPositionInput.h",
            "GCSteeringWheelElement.h",
            "GCSwitchElement.h",
            "GCTouchedStateInput.h",
            "GCXboxGamepad.h",
            "GCTypes.h",
            "GCRelativeInput.h",
            "GameController.h",
            "GCAxis2DInput.h",
            "GCAxisElement.h",
            "GCAxisInput.h",
            "GCButtonElement.h",
            "GCController.h",
            "GCColor.h",
            "GCControllerAxisInput.h",
            "GCControllerDirectionPad.h",
            "GCControllerInput.h",
            "GCControllerElement.h",
            "GCControllerTouchpad.h",
            "GCDevice.h",
            "GCDeviceBattery.h",
            "GCDeviceCursor.h",
            "GCDeviceHaptics.h",
            "GCDeviceLight.h",
            "GCDevicePhysicalInputState.h",
            "GCDevicePhysicalInputStateDiff.h",
            "GCDirectionalGamepad.h",
            "GCDirectionPadElement.h",
            "GCDevicePhysicalInput.h",
            "GCDualSenseAdaptiveTrigger.h",
            "GCDualSenseGamepad.h",
            "GCDualShockGamepad.h",
            "GCEventViewController.h",
            "GCExtendedGamepadSnapshot.h",
            "GCExtern.h",
            "GCExtendedGamepad.h",
            "GCGamepadSnapshot.h",
            "GCGearShifterElement.h",
            "GCGamepad.h",
            "GCKeyboard.h",
            "GCInputNames.h",
            "GCControllerButtonInput.h",
            "GCKeyNames.h",
            "GCKeyboardInput.h",
            "GCKeyCodes.h",
            "GCLinearInput.h",
            "GCMotion.h",
            "GCMouse.h",
            "GCMouseInput.h",
            "GCMicroGamepadSnapshot.h",
            "GCPhysicalInputElement.h",
            "GCMicroGamepad.h",
            "GCPhysicalInputProfile.h",
            "GCPhysicalInputSource.h",
            "GCPressedStateInput.h",
            "GCProductCategories.h",
            "GCRacingWheel.h",
            "GameController.tbd",
            "arm64e-apple-macos.swiftinterface",
            "x86_64-apple-macos.swiftinterface",
            "module.modulemap",
            "com_err.h",
            "gssapi_generic.h",
            "locate_plugin.h",
            "profile.h",
            "gssapi_krb5.h",
            "preauth_plugin.h",
            "gssapi.h",
            "alc.h",
            "oalStaticBufferExtension.h",
            "oalMacOSX_OALExtensions.h",
            "OpenAL.h",
            "al.h",
            "OpenAL.tbd",
            "IOUSBHost.tbd",
            "IOUSBHostCIEndpointStateMachine.h",
            "IOUSBHostCIControllerStateMachine.h",
            "IOUSBHost.h",
            "IOUSBHostCIPortStateMachine.h",
            "IOUSBHostCIDeviceStateMachine.h",
            "IOUSBHostControllerInterfaceHelpers.h",
            "IOUSBHostDevice.h",
            "IOUSBHostControllerInterface.h",
            "IOUSBHostDefinitions.h",
            "IOUSBHostInterface.h",
            "IOUSBHostIOSource.h",
            "AppleUSBDescriptorParsing.h",
            "IOUSBHostStream.h",
            "IOUSBHostObject.h",
            "IOUSBHostControllerInterfaceDefinitions.h",
            "IOUSBHostPipe.h",
            "IOBluetoothUIUserLib.h",
            "IOBluetoothUI.h",
            "IOBluetoothObjectPushUIController.h",
            "IOBluetoothDeviceSelectorController.h",
            "IOBluetoothPasskeyDisplay.h",
            "IOBluetoothPairingController.h",
            "IOBluetoothServiceBrowserController.h",
            "IOBluetoothUI.tbd",
            "Bluetooth.h",
            "IOBluetooth.h",
            "BluetoothAssignedNumbers.h",
            "IOBluetoothTypes.h",
            "IOBluetoothUtilities.h",
            "OBEXBluetooth.h",
            "IOBluetoothUserLib.h",
            "OBEX.h",
            "IOBluetooth.tbd",
            "INImage+IntentsUI.h",
            "IntentsUI.h",
            "INUIAddVoiceShortcutButton.h",
            "IntentsUI.apinotes",
            "INUIEditVoiceShortcutViewController.h",
            "INUIAddVoiceShortcutViewController.h",
            "LDAP.tbd",
            "OSvKernDSPLib.h",
            "cpu.h",
            "asm_help.h",
            "desc.h",
            "pio.h",
            "io.h",
            "sel.h",
            "reg_help.h",
            "tss.h",
            "table.h",
            "byte_order.h",
            "_limits.h",
            "_types.h",
            "_mcontext.h",
            "_param.h",
            "_endian.h",
            "arch.h",
            "cpuid_internal.h",
            "cpu_capabilities_public.h",
            "arm_features.inc",
            "endian.h",
            "locks.h",
            "limits.h",
            "atomic.h",
            "machine_cpuid.h",
            "memory_types.h",
            "pal_routines.h",
            "machine_routines.h",
            "param.h",
            "cpuid.h",
            "thread.h",
            "trap.h",
            "vmparam.h",
            "signal.h",
            "types.h",
            "AFKMemoryDescriptorOptions.h",
            "machine_machdep.h",
            "atm_types.h",
            "copyio.h",
            "_OSByteOrder.h",
            "crc.h",
            "Block.h",
            "OSBase.h",
            "OSByteOrder.h",
            "OSDebug.h",
            "OSMalloc.h",
            "OSAtomic.h",
            "OSReturn.h",
            "OSKextLib.h",
            "OSTypes.h",
            "version.h",
            "sysctl.h",
            "tree.h",
            "zconf.h",
            "zlib.h",
            "libkern.h",
            "kdp_callout.h",
            "kdp_en_debugger.h",
            "ipc_types.h",
            "krpc.h",
            "rpcv2.h",
            "xdr_subs.h",
            "nfs.h",
            "nfsproto.h",
            "bootp.h",
            "if_ether.h",
            "icmp6.h",
            "icmp_var.h",
            "igmp_var.h",
            "igmp.h",
            "in_pcb.h",
            "in_stat.h",
            "in_private.h",
            "in_arp.h",
            "in_var.h",
            "in_systm.h",
            "ip_var.h",
            "ip_icmp.h",
            "kpi_ipfilter.h",
            "ip6.h",
            "tcp_private.h",
            "ip.h",
            "tcp_timer.h",
            "tcp_fsm.h",
            "udp_var.h",
            "tcp_seq.h",
            "tcpip.h",
            "udp.h",
            "tcp_var.h",
            "tcp.h",
            "IOPCIFamilyDefinitions.h",
            "IOPCIDevice.iig",
            "PCIDriverKit.h",
            "IOPCIDevice.h",
            "audit_ioctl.h",
            "stdarg.h",
            "stdatomic.h",
            "stdbool.h",
            "stddef.h",
            "string.h",
            "stdint.h",
            "ptrauth.h",
            "math.h",
            "monotonic.h",
            "static_if.h",
            "machine_kpc.h",
            "machine_remote_time.h",
            "ipc_pthread_priority_types.h",
            "lz4_assembly_select.h",
            "vm_compressor_algorithms.h",
            "lz4.h",
            "pmap.h",
            "vm_dyld_pager.h",
            "vm_far.h",
            "vm_fault.h",
            "vm_map.h",
            "lz4_constants.h",
            "vm_options.h",
            "vm_pageout.h",
            "vm_memtag.h",
            "vm_shared_region.h",
            "vm_kern.h",
            "vfs_support.h",
            "vecLib.h",
            "vecLibTypes.h",
            "vBasicOps.h",
            "vForce.h",
            "vDSP.h",
            "uuid.h",
            "UNDReply.defs",
            "UNDRequest.defs",
            "KUNCUserNotifications.h",
            "UNDTypes.defs",
            "UNDTypes.h",
            "TargetConditionals.h",
            "apfs_boot_mount.tbd",
            "av.h",
            "cop.h",
            "bitcount.h",
            "cv.h",
            "ebcdic_tables.h",
            "EXTERN.h",
            "embedvar.h",
            "fakesdio.h",
            "feature.h",
            "form.h",
            "gv.h",
            "git_version.h",
            "dosish.h",
            "hv_macro.h",
            "hv_func.h",
            "config.h",
            "INTERN.h",
            "handy.h",
            "intrpvar.h",
            "invlist_inline.h",
            "hv.h",
            "iperlsys.h",
            "keywords.h",
            "libperl.tbd",
            "embed.h",
            "l1_char_class_tab.h",
            "mg_data.h",
            "mg_raw.h",
            "mg.h",
            "mg_vtable.h",
            "mydtrace.h",
            "nostdio.h",
            "op_reg_common.h",
            "op.h",
            "opcode.h",
            "inline.h",
            "overload.h",
            "opnames.h",
            "parser.h",
            "malloc_ctl.h",
            "pad.h",
            "perl_inc_macro.h",
            "perl_langinfo.h",
            "perl_siphash.h",
            "patchlevel.h",
            "perlapi.h",
            "metaconfig.h",
            "perlio.h",
            "perldtrace.h",
            "perliol.h",
            "perlvars.h",
            "perlsdio.h",
            "pp_proto.h",
            "perly.h",
            "pp.h",
            "reentr.h",
            "regcomp.h",
            "perl.h",
            "regexp.h",
            "scope.h",
            "sbox32_hash.h",
            "time64_config.h",
            "time64.h",
            "sv.h",
            "unixish.h",
            "uconfig.h",
            "utfebcdic.h",
            "unicode_constants.h",
            "utf8.h",
            "regnodes.h",
            "util.h",
            "vutil.h",
            "uudmap.h",
            "warnings.h",
            "XSUB.h",
            "zaphod32_hash.h",
            "encode.h",
            "python-3.9.pc",
            "python-3.9-embed.pc",
            "python3-embed.pc",
            "python3.pc",
            "AFKUser.tbd",
            "AdID.tbd",
            "Admin.tbd",
            "AirPlayReceiver.tbd",
            "AppSandbox.tbd",
            "ASEProcessing.tbd",
            "AuthenticationServicesCore.tbd",
            "WebGPU.tbd",
            "WebDriver.tbd",
            "MapKit.tbd",
            "SwiftUI.swiftoverlay",
            "WebKit.tbd",
            "WebKit.apinotes",
            "WKBackForwardList.h",
            "NSAttributedString.h",
            "WebKit.h",
            "WKBackForwardListItem.h",
            "WKContentRuleList.h",
            "WKContentRuleListStore.h",
            "WKContextMenuElementInfo.h",
            "WKDataDetectorTypes.h",
            "WKContentWorld.h",
            "WKError.h",
            "WKFoundation.h",
            "WKFindResult.h",
            "WKHTTPCookieStore.h",
            "WKFrameInfo.h",
            "WKNavigation.h",
            "WKFindConfiguration.h",
            "WKNavigationDelegate.h",
            "WKNavigationResponse.h",
            "WKOpenPanelParameters.h",
            "WebKitLegacy.h",
            "WKPreviewActionItem.h",
            "WKNavigationAction.h",
            "WKPreferences.h",
            "WKPreviewActionItemIdentifiers.h",
            "WKPreviewElementInfo.h",
            "WKProcessPool.h",
            "WKDownload.h",
            "WKPDFConfiguration.h",
            "WKScriptMessage.h",
            "WKSecurityOrigin.h",
            "WKScriptMessageHandler.h",
            "WKSnapshotConfiguration.h",
            "WKUIDelegate.h",
            "WKURLSchemeTask.h",
            "WKWebpagePreferences.h",
            "WKUserContentController.h",
            "WKWebsiteDataStore.h",
            "WKWebsiteDataRecord.h",
            "WKUserScript.h",
            "WKURLSchemeHandler.h",
            "WKWebViewConfiguration.h",
            "WKWebView.h",
            "WKScriptMessageHandlerWithReply.h",
            "WKWindowFeatures.h",
            "WKDownloadDelegate.h",
            "ASAccountAuthenticationModificationController.h",
            "ASAccountAuthenticationModificationViewController.h",
            "ASAuthorization.h",
            "ASAuthorizationAppleIDButton.h",
            "ASAccountAuthenticationModificationRequest.h",
            "ASAuthorizationAppleIDProvider.h",
            "ASAuthorizationAppleIDRequest.h",
            "ASAuthorizationAppleIDCredential.h",
            "ASAuthorizationController.h",
            "ASAuthorizationCredential.h",
            "ASAccountAuthenticationModificationExtensionContext.h",
            "ASAuthorizationError.h",
            "ASAuthorizationCustomMethod.h",
            "ASAuthorizationPasswordRequest.h",
            "ASAuthorizationOpenIDRequest.h",
            "ASAuthorizationPlatformPublicKeyCredentialDescriptor.h",
            "ASAuthorizationPlatformPublicKeyCredentialProvider.h",
            "ASAccountAuthenticationModificationReplacePasswordWithSignInWithAppleRequest.h",
            "ASAccountAuthenticationModificationUpgradePasswordToStrongPasswordRequest.h",
            "ASAuthorizationPlatformPublicKeyCredentialRegistrationRequest.h",
            "ASAuthorizationPlatformPublicKeyCredentialRegistration.h",
            "ASAuthorizationProvider.h",
            "ASAuthorizationPlatformPublicKeyCredentialAssertion.h",
            "ASAuthorizationPublicKeyCredentialAssertion.h",
            "ASAuthorizationPublicKeyCredentialAssertionRequest.h",
            "ASAuthorizationPublicKeyCredentialConstants.h",
            "ASAuthorizationProviderExtensionAuthorizationResult.h",
            "ASAuthorizationPublicKeyCredentialDescriptor.h",
            "ASAuthorizationPublicKeyCredentialLargeBlobAssertionOutput.h",
            "ASAuthorizationPasswordProvider.h",
            "ASAuthorizationPublicKeyCredentialLargeBlobRegistrationInput.h",
            "ASAuthorizationPublicKeyCredentialParameters.h",
            "ASAuthorizationPublicKeyCredentialLargeBlobRegistrationOutput.h",
            "ASAuthorizationPublicKeyCredentialRegistration.h",
            "ASAuthorizationPublicKeyCredentialRegistrationRequest.h",
            "ASAuthorizationPublicKeyCredentialLargeBlobAssertionInput.h",
            "ASAuthorizationSecurityKeyPublicKeyCredentialAssertion.h",
            "ASAuthorizationRequest.h",
            "ASAuthorizationPlatformPublicKeyCredentialAssertionRequest.h",
            "ASAuthorizationSecurityKeyPublicKeyCredentialProvider.h",
            "ASAuthorizationSingleSignOnCredential.h",
            "ASAuthorizationSecurityKeyPublicKeyCredentialDescriptor.h",
            "ASAuthorizationSecurityKeyPublicKeyCredentialAssertionRequest.h",
            "ASAuthorizationSecurityKeyPublicKeyCredentialRegistration.h",
            "ASAuthorizationSingleSignOnProvider.h",
            "ASAuthorizationWebBrowserExternallyAuthenticatableRequest.h",
            "ASAuthorizationWebBrowserPlatformPublicKeyCredentialAssertionRequest.h",
            "ASAuthorizationWebBrowserPlatformPublicKeyCredentialRegistrationRequest.h",
            "ASAuthorizationWebBrowserPublicKeyCredentialManager.h",
            "ASAuthorizationWebBrowserPlatformPublicKeyCredential.h",
            "ASAuthorizationWebBrowserSecurityKeyPublicKeyCredentialAssertionRequest.h",
            "ASAuthorizationWebBrowserSecurityKeyPublicKeyCredentialRegistrationRequest.h",
            "ASCOSEConstants.h",
            "ASCredentialIdentity.h",
            "ASAuthorizationSingleSignOnRequest.h",
            "ASCredentialIdentityStore.h",
            "ASAuthorizationWebBrowserSecurityKeyPublicKeyCredentialProvider.h",
            "ASCredentialProviderExtensionContext.h",
            "ASCredentialProviderViewController.h",
            "ASAuthorizationSecurityKeyPublicKeyCredentialRegistrationRequest.h",
            "ASCredentialServiceIdentifier.h",
            "ASExtensionErrors.h",
            "ASAuthorizationProviderExtensionAuthorizationRequest.h",
            "ASCredentialRequest.h",
            "ASAuthorizationWebBrowserPlatformPublicKeyCredentialProvider.h",
            "ASPasskeyAssertionCredential.h",
            "ASPasskeyCredentialRequest.h",
            "ASPasskeyCredentialRequestParameters.h",
            "ASCredentialIdentityStoreState.h",
            "ASPasskeyRegistrationCredential.h",
            "ASPasswordCredential.h",
            "ASPublicKeyCredential.h",
            "ASPasskeyCredentialIdentity.h",
            "ASPublicKeyCredentialClientData.h",
            "ASSettingsHelper.h",
            "ASWebAuthenticationSessionCallback.h",
            "ASWebAuthenticationSession.h",
            "ASWebAuthenticationSessionRequest.h",
            "ASWebAuthenticationSessionWebBrowserSessionManager.h",
            "AuthenticationServices.h",
            "ASFoundation.h",
            "AuthenticationServices.apinotes",
            "ASWebAuthenticationSessionWebBrowserSessionHandling.h",
            "ASPasswordCredentialIdentity.h",
            "ASPasswordCredentialRequest.h",
            "GameKit.apinotes",
            "GKAccessPoint.h",
            "GameKit.h",
            "GKAchievement.h",
            "GKAchievementViewController.h",
            "GKBasePlayer.h",
            "GKAchievementDescription.h",
            "GKChallengeEventHandler.h",
            "GKCloudPlayer.h",
            "GKChallengesViewController.h",
            "GKChallenge.h",
            "GKDefines.h",
            "GKError.h",
            "GKEventListener.h",
            "GKFriendRequestComposeViewController.h",
            "GKDialogController.h",
            "GKGameSessionEventListener.h",
            "GKGameSessionError.h",
            "GKGameCenterViewController.h",
            "GKGameSessionSharingViewController.h",
            "GKLeaderboardEntry.h",
            "GKLeaderboard.h",
            "GKLeaderboardScore.h",
            "GKGameSession.h",
            "GKLeaderboardSet.h",
            "GKLocalPlayer.h",
            "GKLeaderboardViewController.h",
            "GKMatch.h",
            "GKMatchmaker.h",
            "GKMatchmakerViewController.h",
            "GKPeerPickerController.h",
            "GKNotificationBanner.h",
            "GKPublicConstants.h",
            "GKPlayer.h",
            "GKPublicProtocols.h",
            "GKSavedGameListener.h",
            "GKScore.h",
            "GKSessionError.h",
            "GKVoiceChat.h",
            "GKTurnBasedMatchmakerViewController.h",
            "GKSession.h",
            "GKTurnBasedMatch.h",
            "GKSavedGame.h",
            "GKVoiceChatService.h"
          ],
          "public": 1,
          "adversary": "Turla Group, FIN7, APT34, APT28, DragonForce Malaysia Hacker Group, Indonesia Islamic Warriors Counc",
          "targeted_countries": [
            "United States of America",
            "India",
            "Australia"
          ],
          "malware_families": [
            {
              "id": "OSAtomic",
              "display_name": "OSAtomic",
              "target": null
            },
            {
              "id": "OSReturn",
              "display_name": "OSReturn",
              "target": null
            },
            {
              "id": "Ver",
              "display_name": "Ver",
              "target": null
            },
            {
              "id": "Internet",
              "display_name": "Internet",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1123",
              "name": "Audio Capture",
              "display_name": "T1123 - Audio Capture"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1016",
              "name": "System Network Configuration Discovery",
              "display_name": "T1016 - System Network Configuration Discovery"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1049",
              "name": "System Network Connections Discovery",
              "display_name": "T1049 - System Network Connections Discovery"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1010",
              "name": "Application Window Discovery",
              "display_name": "T1010 - Application Window Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 39,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "ilyailya",
            "id": "298851",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1968,
            "domain": 526,
            "FileHash-SHA256": 207,
            "hostname": 972,
            "email": 55,
            "FileHash-SHA1": 9,
            "FileHash-MD5": 4,
            "CVE": 2,
            "CIDR": 10
          },
          "indicator_count": 3753,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 34,
          "modified_text": "347 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "664bd9b732ecaf1b3c3beddf",
          "name": "Found some problems - Files from the UAlberta Google Drive Archive",
          "description": "Been looking for these...Gifts from the University of Alberta to the World apparently\n*Please note: I emptied out the Drive, however, there was a significant amount of abuse re: Google and Microsoft Accounts at the University of Alberta (reported).\n*On the Google side I utilized: Drive (a little), Docs/Slides/Sheets (when groupwork was required)\n*On the Microsoft side I utilized: OneDrive, Office 365 (Word, PPT, Excel, and OneNote). I used to also have a personal microsoft account (OneNote, OneDrive, Skype).\nThese were the applications I lived on for my studies. I could access the Gmail/Microsoft accounts for the University (however - 'bad things' usually happen because of this). I have no access to my personal Microsoft Account (i.e. myself and other affected student(s) do not have access to our personal stuff.",
          "modified": "2024-09-03T00:02:13.980000",
          "created": "2024-05-20T23:16:07.255000",
          "tags": [
            "contact",
            "quick",
            "destination",
            "entry",
            "safety",
            "local",
            "health",
            "travel",
            "notification",
            "considerations",
            "service",
            "criminal",
            "showit",
            "click",
            "outcome",
            "step",
            "please",
            "class",
            "questions set",
            "question set",
            "unlock",
            "continue",
            "jointfilingyes",
            "jointfilingno",
            "minimum req",
            "domicileresusno",
            "joint sponsor",
            "sponsorjoint",
            "path",
            "href",
            "span",
            "activetab",
            "starton",
            "newpage",
            "searchq",
            "datasia",
            "datacon",
            "segfilter",
            "subsite",
            "issuance agency",
            "visas",
            "null",
            "state",
            "dialog field",
            "tabpanel",
            "recaptcha",
            "nameinputvisa",
            "fullnameinput1",
            "license headers",
            "tools",
            "templates",
            "sia contact",
            "visa",
            "website",
            "phoneregexp",
            "emailregexp",
            "azaz",
            "urlpattern",
            "example starter",
            "javascript",
            "fetch",
            "comptwo",
            "compone",
            "dateofbirth",
            "function",
            "date",
            "passport",
            "nameinput",
            "fullnameinput",
            "adult passport",
            "child passport",
            "new child",
            "new adult",
            "new passport",
            "datepicker",
            "ds5504",
            "hideit",
            "infinity",
            "false",
            "jquery",
            "error",
            "body",
            "trident",
            "simple",
            "turn",
            "back",
            "calendar",
            "format",
            "february",
            "april",
            "june",
            "august",
            "show",
            "page has",
            "bcdate",
            "col1child",
            "col2child",
            "coldatechild",
            "rowdisplay",
            "val1",
            "val2",
            "repaginate",
            "grab",
            "jandec",
            "86400000",
            "current",
            "namerbcontactme",
            "agency",
            "compliment",
            "complaint",
            "passportfees",
            "customerservice",
            "bymail",
            "namerbcategory",
            "brokenlink",
            "search",
            "departuredate",
            "calendar date",
            "picker",
            "change",
            "month",
            "vital",
            "records form",
            "component js",
            "select",
            "please enter",
            "azaz09",
            "dddddd",
            "woff2",
            "woff",
            "truetype",
            "css document",
            "efefef",
            "ffffff",
            "gradienttype0",
            "galaxy",
            "nexus",
            "iphone5",
            "abtn",
            "bbtn",
            "cbtn",
            "dbtn",
            "ebtn",
            "fbtn",
            "gbtn",
            "hbtn",
            "ibtn",
            "media query",
            "from",
            "fce68e",
            "font family",
            "bold",
            "document",
            "cc3333",
            "b7b7b7",
            "e2edff",
            "ced9ea",
            "pm author",
            "ipca csi",
            "helvetica",
            "arial",
            "cq aem",
            "feed classes",
            "f2cd54",
            "f4d97e",
            "portrait",
            "landscape",
            "ipad",
            "declare",
            "immigrant",
            "visa navigation",
            "navigation css",
            "georgia",
            "times new",
            "roman",
            "times",
            "verdana",
            "photomodal",
            "styles media",
            "ff0000",
            "queries",
            "form component",
            "typetext",
            "queries media",
            "phone media",
            "tablet styles",
            "media queries",
            "jumbo sized",
            "copyright",
            "gpl version",
            "http",
            "alpha",
            "button",
            "out width",
            "ui css",
            "framework",
            "icons",
            "misc",
            "mini",
            "input",
            "label",
            "textarea",
            "overlays",
            "csi page",
            "embassy info",
            "embassy data",
            "embassy names",
            "end adjust",
            "embassy nameso",
            "pages",
            "e1a04d",
            "c0c0c0",
            "ffffff url",
            "us survey",
            "component css",
            "country list",
            "e7eceb",
            "important",
            "additional css",
            "wizard",
            "corner radius",
            "f97800",
            "c61700",
            "largestbox",
            "thisbox",
            "csi navigation",
            "ui autocomplete",
            "ui menu",
            "noticeid",
            "countnote",
            "largestnote",
            "thisnote",
            "desktops",
            "43px",
            "42px",
            "large",
            "aem interface",
            "styles",
            "web email",
            "ytconfig",
            "typeerror",
            "facebook pixel",
            "pixel code",
            "symbol",
            "fblog",
            "typeof",
            "iterator",
            "pageview",
            "pixel",
            "facebook",
            "config",
            "meta",
            "propname",
            "dpjquerydpuuid",
            "this",
            "next",
            "atom",
            "cookie",
            "iframe",
            "close",
            "string",
            "number",
            "edge",
            "regexp",
            "silk",
            "sxa0",
            "object",
            "opera",
            "android",
            "void",
            "form",
            "UAlberta",
            "Android",
            "Mac",
            "iPhone",
            "Gov Alberta",
            "AWS",
            "AZURE",
            "ENTRA",
            "iCloud",
            "Telus",
            "Bitdefender",
            "Norton"
          ],
          "references": [
            "Copy of clientlib.js(1).download",
            "Copy of clientlib.js(2).download",
            "Copy of clientlib.js(5).download",
            "Copy of clientlib.js(7).download",
            "Copy of clientlib.js(4).download",
            "Copy of clientlib.js(10).download",
            "Copy of clientlib.js(8).download",
            "Copy of clientlib.js(11).download",
            "Copy of clientlib.js(12).download",
            "Copy of clientlib.js(13).download",
            "Copy of clientlib.js(14).download",
            "Copy of clientlib.js(9).download",
            "Copy of clientlib.js(16).download",
            "Copy of clientlib.js(17).download",
            "Copy of clientlib.js(18).download",
            "Copy of clientlib.js(3).download",
            "Copy of clientlib.js(19).download",
            "Copy of clientlib.js(15).download",
            "Copy of clientlib.js(22).download",
            "Copy of clientlib.js(23).download",
            "Copy of clientlib.js(21).download",
            "Copy of clientlib.js(26).download",
            "Copy of clientlib.js(25).download",
            "Copy of clientlib.js(24).download",
            "Copy of clientlib.js(31).download",
            "Copy of clientlib.js(28).download",
            "Copy of clientlib.js(30).download",
            "Copy of clientlib.js(32).download",
            "Copy of clientlib.js(29).download",
            "Copy of clientlib.js(34).download",
            "Copy of clientlib.js(35).download",
            "Copy of clientlib.js(37).download",
            "Copy of clientlib.js(36).download",
            "Copy of clientlib.js(38).download",
            "Copy of clientlib.js(39).download",
            "Copy of clientlib.js(33).download",
            "Copy of clientlib.js(44).download",
            "Copy of clientlib.js(43).download",
            "Copy of clientlib.js(41).download",
            "Copy of clientlib.js(42).download",
            "Copy of clientlib.js(45).download",
            "Copy of clientlib.js(51).download",
            "Copy of clientlib.js(56).download",
            "Copy of clientlib.js(55).download",
            "Copy of clientlib.js(54).download",
            "Copy of clientlib.js(57).download",
            "Copy of clientlib.js(52).download",
            "Copy of clientlib.js(53).download",
            "Copy of clientlib.js(60).download",
            "Copy of clientlib(1).css",
            "Copy of clientlib.js(59).download",
            "Copy of clientlib(3).css",
            "Copy of clientlib(2).css",
            "Copy of clientlib(5).css",
            "Copy of clientlib.js(58).download",
            "Copy of clientlib(8).css",
            "Copy of clientlib(10).css",
            "Copy of clientlib(7).css",
            "Copy of clientlib(6).css",
            "Copy of clientlib(12).css",
            "Copy of clientlib(13).css",
            "Copy of clientlib(9).css",
            "Copy of clientlib(4).css",
            "Copy of clientlib(14).css",
            "Copy of clientlib(17).css",
            "Copy of clientlib(15).css",
            "Copy of clientlib(19).css",
            "Copy of clientlib(18).css",
            "Copy of clientlib(11).css",
            "Copy of clientlib(20).css",
            "Copy of clientlib(16).css",
            "Copy of clientlib(23).css",
            "Copy of clientlib(24).css",
            "Copy of clientlib(26).css",
            "Copy of clientlib(25).css",
            "Copy of clientlib(28).css",
            "Copy of clientlib(22).css",
            "Copy of clientlib(27).css",
            "Copy of clientlib(31).css",
            "Copy of clientlib(29).css",
            "Copy of clientlib(30).css",
            "Copy of clientlib(32).css",
            "Copy of clientlib(34).css",
            "Copy of clientlib(35).css",
            "Copy of clientlib(33).css",
            "Copy of clientlib(38).css",
            "Copy of clientlib(37).css",
            "Copy of clientlib(36).css",
            "Copy of clientlib(40).css",
            "Copy of clientlib(39).css",
            "Copy of clientlib(43).css",
            "Copy of clientlib(21).css",
            "Copy of clientlib(41).css",
            "Copy of clientlib(44).css",
            "Copy of clientlib(42).css",
            "Copy of clientlib(46).css",
            "Copy of clientlib(45).css",
            "Copy of clientlib(47).css",
            "Copy of clientlib(48).css",
            "Copy of clientlib(49).css",
            "Copy of clientlib(50).css",
            "Copy of clientlib(52).css",
            "Copy of clientlib(54).css",
            "Copy of clientlibs.js(3).download",
            "Copy of clientlib(53).css",
            "Copy of clientlibs.js(2).download",
            "Copy of clientlibs(3).css",
            "Copy of clientlib(51).css",
            "Copy of clientlibs(1).css",
            "Copy of clientlibs(2).css",
            "Copy of clientlibs.js.download",
            "Copy of clientlibs.js(4).download",
            "Copy of clientlibs(5).css",
            "Copy of clientlibs.css",
            "Copy of clientlibs(4).css",
            "Copy of dir (1).c9r",
            "Copy of clientlib(55).css",
            "Copy of iframe_api",
            "Copy of fbevents.js.download",
            "Copy of clientlibs.js(1).download",
            "Copy of js",
            "https://www.virustotal.com/gui/collection/7196cbc5285fb7e155a529980dc1797d3ab3884e20c77c66d9b1b971c313fe56/iocs",
            "https://www.virustotal.com/gui/collection/7196cbc5285fb7e155a529980dc1797d3ab3884e20c77c66d9b1b971c313fe56/graph",
            "hxxps://go[.]microsoft[.]com/fwlink/?LinkId=2033498",
            "hxxps://portal[.]office[.]com/Account",
            "hxxps://myapplications[.]microsoft[.]com/",
            "https://tria.ge/240521-rvybaahb79",
            "https://tria.ge/240521-rxpf6ahd6w",
            "https://tria.ge/240521-r1yh8shd44",
            "https://tria.ge/240521-ry949ahe2z/behavioral1",
            "https://tria.ge/240521-r3mvhshd83"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Canada",
            "Mexico",
            "Anguilla",
            "Aruba",
            "Panama",
            "Ukraine",
            "Trinidad and Tobago",
            "Saint Vincent and the Grenadines",
            "Saint Martin (French part)",
            "Sint Maarten (Dutch part)",
            "Philippines",
            "Netherlands",
            "Cura\u00e7ao",
            "Georgia",
            "Tanzania, United Republic of",
            "Costa Rica",
            "Guatemala",
            "Japan",
            "Barbados"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            }
          ],
          "industries": [
            "Education",
            "Technology",
            "Government",
            "Healthcare",
            "Biotechnology",
            "Telecommunications",
            "Energy",
            "Construction",
            "Chemical",
            "Agriculture",
            "Finance",
            "Media",
            "Defense",
            "Transportation"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 24,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Disable_Duck",
            "id": "244325",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 251,
            "hostname": 188,
            "FileHash-SHA256": 142,
            "URL": 69,
            "FileHash-MD5": 77,
            "FileHash-SHA1": 77
          },
          "indicator_count": 804,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 133,
          "modified_text": "593 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "669a3ac4cd30cc6eb2c08846",
          "name": "asses",
          "description": "",
          "modified": "2024-07-19T10:07:00.244000",
          "created": "2024-07-19T10:07:00.244000",
          "tags": [
            "error",
            "typeof e",
            "typeof t",
            "typeof n",
            "react",
            "typeof l",
            "typeof o",
            "context",
            "forwardref",
            "null",
            "facebook",
            "template",
            "unknown",
            "meta",
            "scroll",
            "backspace",
            "insert",
            "lazy"
          ],
          "references": [
            "https://www.joesandbox.com/analysis/1370149/0/html#dropped"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 14,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Apetree1001",
            "id": "266828",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 10,
            "domain": 58,
            "hostname": 6
          },
          "indicator_count": 74,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 26,
          "modified_text": "639 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "66480cb1cc174fd804e0cef9",
          "name": "Elgoogle",
          "description": "",
          "modified": "2024-05-18T02:12:28.801000",
          "created": "2024-05-18T02:04:33.967000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": "65709f0bbdd32cb4b343a12f",
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Elgoogle",
            "id": "281171",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 2218,
            "FileHash-SHA256": 24526,
            "FileHash-MD5": 7187,
            "URL": 1175,
            "hostname": 2514,
            "JA3": 2,
            "email": 83,
            "FileHash-SHA1": 7164,
            "CVE": 35
          },
          "indicator_count": 44904,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 8,
          "modified_text": "701 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6639853fc403f7be5bd6f27d",
          "name": "Facebook+",
          "description": "",
          "modified": "2024-05-07T01:34:55.365000",
          "created": "2024-05-07T01:34:55.365000",
          "tags": [],
          "references": [
            "https://www.virustotal.com/gui/collection/09af9ef0b7b23d2dc73d83858106ae4fc97a352dbb521ac04493a0e79095ac69/iocs",
            "https://www.virustotal.com/gui/collection/79c25168b2f93d9730a56b8d2b834cbfb2752b63b21b9dd51109416fbaa676d8/iocs",
            "https://www.virustotal.com/graph/embed/g8726609a12794ebeb59edd531961a233068149bcdf994b428f20141be6111551?theme=dark",
            "https://www.virustotal.com/graph/embed/g365a82115f934e31a69118715695c91c231f66cda9084c9389e56afb985a243e?theme=dark",
            "",
            "https://www.virustotal.com/gui/collection/6a8d582df4fe5a29885dad4074236bc9e4ed445aaf0cc00702d45963fb0459bb/iocs"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "65eea19a23474b8c7dca351f",
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Phone2209",
            "id": "281168",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1165,
            "hostname": 866,
            "URL": 657,
            "FileHash-SHA256": 26,
            "email": 337,
            "FileHash-MD5": 12,
            "FileHash-SHA1": 8,
            "CIDR": 1
          },
          "indicator_count": 3072,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 1,
          "modified_text": "712 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a8bf416a1c314819ea53",
          "name": "Remote Access Related |  APK attack targets independent artists",
          "description": "",
          "modified": "2023-12-06T17:00:47.888000",
          "created": "2023-12-06T17:00:47.888000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 5,
            "FileHash-SHA256": 2385,
            "hostname": 1054,
            "domain": 713,
            "URL": 3595,
            "FileHash-MD5": 1104,
            "FileHash-SHA1": 585,
            "FilePath": 1
          },
          "indicator_count": 9442,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a756ee3c8ce2314e235a",
          "name": "Home Networks",
          "description": "",
          "modified": "2023-12-06T16:54:46.263000",
          "created": "2023-12-06T16:54:46.263000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 290,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 2298,
            "FileHash-SHA256": 24535,
            "FileHash-MD5": 7197,
            "URL": 1188,
            "hostname": 2636,
            "JA3": 2,
            "email": 96,
            "CVE": 44,
            "FileHash-SHA1": 7174
          },
          "indicator_count": 45170,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 114,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65709f0bbdd32cb4b343a12f",
          "name": "WHO SAV.COM LLC (SOURCEADULT.COM)",
          "description": "",
          "modified": "2023-12-06T16:19:23.067000",
          "created": "2023-12-06T16:19:23.067000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 13,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 2218,
            "FileHash-SHA256": 24526,
            "FileHash-MD5": 7187,
            "URL": 1175,
            "hostname": 2514,
            "JA3": 2,
            "email": 83,
            "FileHash-SHA1": 7164,
            "CVE": 35
          },
          "indicator_count": 44904,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65709eee2f74978bd15d60a9",
          "name": "WHO SAV.COM LLC (SOURCEADULT.COM)",
          "description": "",
          "modified": "2023-12-06T16:18:53.346000",
          "created": "2023-12-06T16:18:53.346000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 2219,
            "FileHash-SHA256": 24526,
            "FileHash-MD5": 7187,
            "URL": 1175,
            "hostname": 2513,
            "JA3": 2,
            "email": 83,
            "FileHash-SHA1": 7164,
            "CVE": 35
          },
          "indicator_count": 44904,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65709ed8415c89746a234d89",
          "name": "WHO SAV.COM LLC (SOURCEADULT.COM)",
          "description": "",
          "modified": "2023-12-06T16:18:32.627000",
          "created": "2023-12-06T16:18:32.627000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 2218,
            "FileHash-SHA256": 24526,
            "FileHash-MD5": 7187,
            "URL": 1175,
            "hostname": 2513,
            "JA3": 2,
            "email": 83,
            "FileHash-SHA1": 7164,
            "CVE": 35
          },
          "indicator_count": 44903,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65709ebd65cdc059b8e373ef",
          "name": "WHO SAV.COM LLC (SOURCEADULT.COM)",
          "description": "",
          "modified": "2023-12-06T16:18:05.044000",
          "created": "2023-12-06T16:18:05.044000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 2218,
            "FileHash-SHA256": 24526,
            "FileHash-MD5": 7187,
            "URL": 1175,
            "hostname": 2519,
            "JA3": 2,
            "email": 83,
            "FileHash-SHA1": 7164,
            "CVE": 36
          },
          "indicator_count": 44910,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65709ea58a4b251d0f7aac7b",
          "name": "WHO SAV.COM LLC (SOURCEADULT.COM)",
          "description": "",
          "modified": "2023-12-06T16:17:41.816000",
          "created": "2023-12-06T16:17:41.816000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 2221,
            "FileHash-SHA256": 24526,
            "FileHash-MD5": 7187,
            "URL": 1176,
            "hostname": 2513,
            "JA3": 2,
            "email": 83,
            "FileHash-SHA1": 7164,
            "CVE": 37
          },
          "indicator_count": 44909,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65709e8b31eda9b13196277a",
          "name": "WHO SAV.COM LLC (SOURCEADULT.COM)",
          "description": "",
          "modified": "2023-12-06T16:17:15.458000",
          "created": "2023-12-06T16:17:15.458000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 2222,
            "FileHash-SHA256": 24526,
            "FileHash-MD5": 7187,
            "URL": 1176,
            "hostname": 2513,
            "JA3": 2,
            "email": 83,
            "FileHash-SHA1": 7164,
            "CVE": 38
          },
          "indicator_count": 44911,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65709e736e1768898768814f",
          "name": "WHO SAV.COM LLC (SOURCEADULT.COM)",
          "description": "",
          "modified": "2023-12-06T16:16:51.265000",
          "created": "2023-12-06T16:16:51.265000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 2221,
            "FileHash-SHA256": 24526,
            "FileHash-MD5": 7187,
            "URL": 1179,
            "hostname": 2521,
            "JA3": 2,
            "email": 84,
            "FileHash-SHA1": 7164,
            "CVE": 40
          },
          "indicator_count": 44924,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65709e5d4c59f8ac3f86f615",
          "name": "WHO SAV.COM LLC (SOURCEADULT.COM)",
          "description": "",
          "modified": "2023-12-06T16:16:29.659000",
          "created": "2023-12-06T16:16:29.659000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 2430,
            "FileHash-SHA256": 24526,
            "FileHash-MD5": 7187,
            "URL": 1331,
            "hostname": 2748,
            "JA3": 2,
            "email": 94,
            "CVE": 42,
            "FileHash-SHA1": 7164
          },
          "indicator_count": 45524,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65709ded7d8a5ce8dba3444a",
          "name": "Who is SHAW.CA (TUSCOW DOMAINS)",
          "description": "",
          "modified": "2023-12-06T16:14:37.212000",
          "created": "2023-12-06T16:14:37.212000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 2362,
            "FileHash-SHA256": 24578,
            "FileHash-MD5": 7241,
            "URL": 1216,
            "hostname": 2688,
            "JA3": 2,
            "email": 97,
            "CVE": 43,
            "FileHash-SHA1": 7217
          },
          "indicator_count": 45444,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65709dd6926a5676de0e2a19",
          "name": "Who is SHAW.CA (TUSCOW DOMAINS)",
          "description": "",
          "modified": "2023-12-06T16:14:13.668000",
          "created": "2023-12-06T16:14:13.668000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 2427,
            "FileHash-SHA256": 24528,
            "FileHash-MD5": 7187,
            "URL": 1346,
            "hostname": 2829,
            "JA3": 2,
            "email": 99,
            "CVE": 43,
            "FileHash-SHA1": 7164
          },
          "indicator_count": 45625,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65709a49ed44fea53e9aeec5",
          "name": "home networks",
          "description": "",
          "modified": "2023-12-06T15:59:05.075000",
          "created": "2023-12-06T15:59:05.075000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 2298,
            "FileHash-SHA256": 24535,
            "FileHash-MD5": 7197,
            "URL": 1188,
            "hostname": 2636,
            "JA3": 2,
            "email": 96,
            "CVE": 44,
            "FileHash-SHA1": 7174
          },
          "indicator_count": 45170,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65709632333f37e8de4185e9",
          "name": "whitelisted angular.js",
          "description": "",
          "modified": "2023-12-06T15:41:38.498000",
          "created": "2023-12-06T15:41:38.498000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "domain": 245,
            "FileHash-MD5": 127,
            "FileHash-SHA1": 125,
            "FileHash-SHA256": 424,
            "hostname": 466,
            "URL": 1805
          },
          "indicator_count": 3193,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "657093ebb4721854f28870a1",
          "name": "http://www.appasamy.com/",
          "description": "",
          "modified": "2023-12-06T15:31:54.924000",
          "created": "2023-12-06T15:31:54.924000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 110,
            "domain": 99,
            "URL": 584,
            "FileHash-SHA256": 195,
            "FileHash-MD5": 17,
            "FileHash-SHA1": 13
          },
          "indicator_count": 1018,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708efbe1108a2df26f5c5f",
          "name": "Theconstantcompany.com \u2014>Elizabeth Messer &#8211; Spiritual Encouragement for your beautiful, messy life",
          "description": "",
          "modified": "2023-12-06T15:10:51.712000",
          "created": "2023-12-06T15:10:51.712000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 538,
            "hostname": 307,
            "domain": 220,
            "URL": 1053
          },
          "indicator_count": 2118,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708ef0cdb40fa0e7d239ca",
          "name": "either emotet or a part of it",
          "description": "",
          "modified": "2023-12-06T15:10:40.867000",
          "created": "2023-12-06T15:10:40.867000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 342,
            "hostname": 456,
            "domain": 349,
            "URL": 1730,
            "FileHash-MD5": 1,
            "FileHash-SHA1": 1
          },
          "indicator_count": 2879,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708eedef45abdffcb1a9ae",
          "name": "tracking more than space junk",
          "description": "",
          "modified": "2023-12-06T15:10:37.631000",
          "created": "2023-12-06T15:10:37.631000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 371,
            "domain": 139,
            "URL": 1034,
            "FileHash-SHA256": 113,
            "FileHash-MD5": 1
          },
          "indicator_count": 1658,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708ee4e69d8c30c04154d0",
          "name": "develapp.me - weglot.com",
          "description": "",
          "modified": "2023-12-06T15:10:28.836000",
          "created": "2023-12-06T15:10:28.836000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 75,
            "domain": 265,
            "hostname": 482,
            "URL": 731,
            "FileHash-MD5": 4,
            "FileHash-SHA1": 1,
            "email": 1
          },
          "indicator_count": 1559,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708ed8f7d4b5483117bb66",
          "name": "abuse.ch",
          "description": "",
          "modified": "2023-12-06T15:10:16.397000",
          "created": "2023-12-06T15:10:16.397000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 223,
            "domain": 383,
            "URL": 1639,
            "hostname": 560,
            "email": 1,
            "FileHash-MD5": 2
          },
          "indicator_count": 2808,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 114,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708e456bdbf8ea8d0d504a",
          "name": "whitehouse.gov",
          "description": "",
          "modified": "2023-12-06T15:07:49.577000",
          "created": "2023-12-06T15:07:49.577000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 449,
            "hostname": 639,
            "domain": 245,
            "URL": 1609,
            "FileHash-MD5": 4
          },
          "indicator_count": 2946,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708e2d7cb4228401888b63",
          "name": "possibly a central bank",
          "description": "",
          "modified": "2023-12-06T15:07:25.990000",
          "created": "2023-12-06T15:07:25.990000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 622,
            "domain": 2558,
            "URL": 4203,
            "hostname": 1221,
            "CVE": 1
          },
          "indicator_count": 8605,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708e254b734f1efd8bd0ad",
          "name": "1688.com .. 404-\u963f\u91cc\u5df4\u5df4",
          "description": "",
          "modified": "2023-12-06T15:07:17.380000",
          "created": "2023-12-06T15:07:17.380000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1645,
            "URL": 8598,
            "domain": 1004,
            "hostname": 2066,
            "FileHash-MD5": 3
          },
          "indicator_count": 13316,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708e178755574d9812e4c9",
          "name": "Followed lead to brechlerinsurance.com",
          "description": "",
          "modified": "2023-12-06T15:07:03.528000",
          "created": "2023-12-06T15:07:03.528000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 2,
            "FileHash-SHA256": 1329,
            "domain": 2068,
            "hostname": 4185,
            "URL": 12454,
            "email": 1,
            "FileHash-MD5": 3,
            "FileHash-SHA1": 1
          },
          "indicator_count": 20043,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708e0d95a8c74cc715f7a2",
          "name": "West.cn",
          "description": "",
          "modified": "2023-12-06T15:06:53.350000",
          "created": "2023-12-06T15:06:53.350000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 208,
            "domain": 533,
            "hostname": 757,
            "URL": 1861,
            "FileHash-MD5": 1
          },
          "indicator_count": 3360,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "",
        "GCKeyboard.h",
        "ASAuthorizationPublicKeyCredentialLargeBlobRegistrationOutput.h",
        "embed.js.pobrane",
        "https://www.icloud.com/attachment/?u=https%3a%2f%2f%cvws.icloud-content.com",
        "ipc_pthread_priority_types.h",
        "nfsproto.h",
        "IOPCIDevice.h",
        "ip_icmp.h",
        "embed.h",
        "OSMalloc.h",
        "MultipeerConnectivity.h",
        "xfe-URL-Serverhub.com-stix2-2.1-export.json",
        "sbox32_hash.h",
        "IOBluetooth.h",
        "GKAchievement.h",
        "GCExtendedGamepad.h",
        "font_switcher.26.css",
        "https://js.hscollectedforms.net/collectedforms.js",
        "Copy of clientlib(20).css",
        "his technique allows the GoBrut/StealthWorker agent to circumvent automated revocation checks, enabling its decentralized C2 infrastructure to recruit Linux hosts via high-velocity credential exhaustion.",
        "GCGamepadSnapshot.h",
        "24px.svg",
        "GKAchievementViewController.h",
        "slider.js.pobrane",
        "op_reg_common.h",
        "Copy of clientlib(33).css",
        "ASAuthorizationCustomMethod.h",
        "jcemediabox.css",
        "https://www.virustotal.com/gui/collection/09af9ef0b7b23d2dc73d83858106ae4fc97a352dbb521ac04493a0e79095ac69/iocs",
        "nostdio.h",
        "GCKeyCodes.h",
        "Bluetooth.h",
        "GCDeviceBattery.h",
        "ASAuthorizationProvider.h",
        "ASAuthorizationPublicKeyCredentialLargeBlobAssertionOutput.h",
        "ASPasskeyAssertionCredential.h",
        "ASAccountAuthenticationModificationReplacePasswordWithSignInWithAppleRequest.h",
        "GCRacingWheel.h",
        "Copy of clientlib(55).css",
        "WKScriptMessage.h",
        "bootstrap_responsive.26.css",
        "common.js.pobrane",
        "layout.min.js.pobrane",
        "WebKit.h",
        "ASAuthorizationPublicKeyCredentialAssertionRequest.h",
        "string.h",
        "GCControllerTouchpad.h",
        "Uses code, no phone calls. Connected via instagram.",
        "MCPeerID.h",
        "Copy of clientlib(3).css",
        "ASAuthorizationWebBrowserPlatformPublicKeyCredentialProvider.h",
        "crc.h",
        "WKWebsiteDataRecord.h",
        "GCSyntheticDeviceKeys.h",
        "Copy of clientlib(14).css",
        "GCDevicePhysicalInputState.h",
        "ASAuthorizationWebBrowserSecurityKeyPublicKeyCredentialProvider.h",
        "Targets associated warned. Not very open to advice.",
        "mydtrace.h",
        "popen_spawn_win32.py",
        "ASAuthorizationPublicKeyCredentialAssertion.h",
        "GKDialogController.h",
        "patchlevel.h",
        "Copy of clientlib(24).css",
        "Quasi Government: Specifically Pinnacol and Commerce & Industry ( AIG)",
        "http://vgt.pl/static/js/bootstrap-typeahead.js",
        "zconf.h",
        "tcp_var.h",
        "uswds.min.js.pobrane",
        "al.h",
        "WKBackForwardList.h",
        "search--white.svg",
        "GCInputNames.h",
        "Copy of clientlib.js(52).download",
        "IOUSBHostDefinitions.h",
        "OBEX.h",
        "tcp_private.h",
        "OSTypes.h",
        "ip.h",
        "WKFrameInfo.h",
        "ASAuthorizationPlatformPublicKeyCredentialRegistrationRequest.h",
        "Copy of clientlib.js(3).download",
        "IOBluetoothUIUserLib.h",
        "xdr_subs.h",
        "WKFindResult.h",
        "Denver Justice System. Palantir allegedly moved  potato Headquarters to Miami",
        "scripts.js.pobrane",
        "Copy of clientlib(47).css",
        "WKPDFConfiguration.h",
        "EXTERN.h",
        "vm_compressor_algorithms.h",
        "Copy of clientlib.js(11).download",
        "WKContentRuleList.h",
        "overlay.js.pobrane",
        "GCAxisInput.h",
        "Copy of clientlib.js(44).download",
        "utf8.h",
        "GCMicroGamepadSnapshot.h",
        "Clyde &Co | Chris Ahmann | Brian Sabey /Hall & Evans & Hall Render",
        "IOUSBHostInterface.h",
        "GCMicroGamepad.h",
        "config.h",
        "GCEventViewController.h",
        "stdatomic.h",
        "offcanvas.js.pobrane",
        "WKWebView.h",
        "GKTurnBasedMatchmakerViewController.h",
        "xfe-URL-Intercom.io-stix2-2.1-export.json",
        "Connects to all NEW targets key contacts main targets contacts.",
        "vm_options.h",
        "vBasicOps.h",
        "Copy of clientlib.js(14).download",
        "Copy of clientlib.js(21).download",
        "Universal-Federated-Analytics-Min.js",
        "ASAuthorizationPublicKeyCredentialConstants.h",
        "tcp_fsm.h",
        "GCControllerDirectionPad.h",
        "INTERN.h",
        "Copy of clientlib.js(9).download",
        "GCPhysicalInputProfile.h",
        "ASCredentialRequest.h",
        "regexp.h",
        "ASAuthorizationProviderExtensionAuthorizationResult.h",
        "Copy of clientlibs.js(2).download",
        "jquery.easing.min.js.pobrane",
        "reentr.h",
        "GCExtendedGamepadSnapshot.h",
        "capture_resize.js",
        "GCGearShifterElement.h",
        "IOBluetoothServiceBrowserController.h",
        "IOBluetoothUI.tbd",
        "sysctl.h",
        "sel.h",
        "regnodes.h",
        "io.h",
        "https://vtbehaviour.commondatastorage.googleapis.com/970fdc4da66bc8fff977698c150fc6ebdf9488356ed41ded52d2659830ec5353_VirusTotal%20Droidy.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775189984&Signature=f%2FZZkKTu5zUihkCuCj%2F0pEGmBjWWBiZRDmREgGkkkKvTyR7M5iC0oLGYfaL6WibiUB6pQirxgBtEcS2JtupD291Or3j7%2BKoyngW7R9uf%2FjjWQwfC5YHKjNutT6K5TYuEmzySVs9onhIBSjj4U%2Bi2q%2FMJmQFiDtFZHfcyy00LYqbAbBwEAUnVJZUdH6FvNBu4ArU26VDLDwv1nMSgEjxUWBCwiP4HXlwL5%2BxU6y0eTc2",
        "udp_var.h",
        "ASAuthorizationController.h",
        "Copy of clientlibs.js(4).download",
        "WKURLSchemeTask.h",
        "caption.js.pobrane",
        "Copy of clientlib(37).css",
        "jquery.autocomplete.min.js.pobrane",
        "ASAuthorizationError.h",
        "machine_remote_time.h",
        "vm_fault.h",
        "vecLibTypes.h",
        "UNDRequest.defs",
        "GCRacingWheelInput.h",
        "WKUserContentController.h",
        "ASAuthorizationWebBrowserPlatformPublicKeyCredential.h",
        "jquery.cookie.js.pobrane",
        "https://vtbehaviour.commondatastorage.googleapis.com/02b1749e96b257099d5bafaeb1fc502442b4e064cca63fbcf4fc52af34b6435d_VirusTotal%20Jujubox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775283154&Signature=m%2BGdulpws9rcUoJIzr45sR5qJdIxK89UYb6GUJL6p7n4mgYV69NJWbc3Jslcn117UKHnbSYYtRZSBRhviHhLuWsbhUG199mW8iGDiwaarp%2BbvmEIw6OXF2MgVIh%2FrJYr8slRZbUwjd9t8dMWwn%2FM5DNq6AzLyBqpznrBoVrvlibZuA9pWsHraA3P24WyEGUlbWN3NqLfmJ6gDeCKRfG7zhubGI%2Bb8Wl8GaBCodOtX2LlrA",
        "geometry.js.pobrane",
        "https://www.virustotal.com/gui/collection/6a8d582df4fe5a29885dad4074236bc9e4ed445aaf0cc00702d45963fb0459bb/iocs",
        "jquery.djmobilemenu.js.pobrane",
        "param.h",
        "SwiftUI.swiftoverlay",
        "WKWebViewConfiguration.h",
        "CredentialsCache.h",
        "atomic.h",
        "https://www.justice.gov/opa/pr/departmen.t",
        "AuthenticationServices.apinotes",
        "https://otx.alienvault.com/pulse/69b1f368db0d00947ef729c2",
        "https://vtbehaviour.commondatastorage.googleapis.com/a0fb314babd51dbc460ab126b615da4c6f9481f5d1225d0ac189da9d99923bb3_VirusTotal%20Droidy.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775190345&Signature=33%2BM36uNOvEfi8bNtJvnbxcTgcnoIlIO2vBglXpCJFNwC8HAewGOF91Q26TOAsw4sbmtTxQ2F5Q2jv2V3ULV8MAxxgYVptJ69SusRt7qZeBDUpMY%2BOdTYqjkdBuYUqYiCvM756aQheS1KvDepeD64x8e%2FivWkpm%2BZ9yDaKUc7w2143zYkc8kpyBSsO8rJI9vyoHYvbr4sfZOowoUWK7yMjQD9SN5bL%2FFABbMrPEOMyobApm",
        "alc.h",
        "oalStaticBufferExtension.h",
        "regcomp.h",
        "GKLeaderboardEntry.h",
        "icon-dot-gov.svg",
        "WKError.h",
        "Copy of clientlib(25).css",
        "ASCredentialIdentityStore.h",
        "https://vtbehaviour.commondatastorage.googleapis.com/37efacb8411234dd9882d8d3a8709f492eb2ed252132da099a11be07c0b4ccb0_Tencent%20HABO.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775189954&Signature=2gy%2BsyEM78P6orDGWKQU%2FFPSIdVK9X7o8Nkcwb%2BY4r%2FCb%2Bo9JmA9T%2Bfonw9IqbojQSIK%2BNShZUJJ9GV4wWT5l1QfkYfZP0MJ91%2BkDw39PLOc4VVgmBApIQJRTIlgSlI020YfOeIPoIYH8yuCF2dJ32zKg87g0dDFkg4zbExGDJB3%2BGDxX5MJ6hHuzVrwxm7E1L%2F%2FffKQ%2B9rXqoT0hRHEdPSaXSydmnqfMfnjCv",
        "inline.h",
        "remote.js.pobrane",
        "tcp_seq.h",
        "locks.h",
        "https://hybrid-analysis.com/sample/2f05feed2065b7385b156ebf3a7c6c19def3d412227cee0d46e8a53fb3e9ac41/697bc423b6e7a4dc46010737",
        "Copy of clientlib(44).css",
        "profile.h",
        "IOUSBHostStream.h",
        "Imphash: 9698f46495ce9401c8bcaf9a2afe1598 | Imports (additional): GdipSetSmoothingMode, I_UuidCreate, RpcStringFreeW, UuidCreate, UuidToStringW, InternetCheckConnectionW | Resource: RT_MANIFEST (1, ENGLISH US, SHA-256 4bb79dcea0a901f7d9eac5aa05728ae92acb42e0cb22e5dd14134f4421a3d8df, XML, entropy 4.91)",
        "IntentsUI.h",
        "Copy of clientlib.js(28).download",
        "Copy of clientlib.js(17).download",
        "WKContentRuleListStore.h",
        "You have to go through a series of steps to change themes and wallpapers , including powering off TV",
        "_mcontext.h",
        "_limits.h",
        "Persistent C2 Orchestration: This ELF:Agent-VW variant serves as a critical GoBrut node, utilizing XOR 0x20 obfuscation and ICMP/HTTP beaconing to maintain a persistent link across 1,834 domains and 797 unique IPs",
        "LDAP.tbd",
        "icmp_var.h",
        "https://vtbehaviour.commondatastorage.googleapis.com/ba49f65ef5d694311c535991812ee2fa8f0c639f4e053d136c1161b8b1bfaf8f_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775282803&Signature=CE28%2B8Orp96YBz3AWi4L4LJoj5B677T4lpyJl4VIG%2BN68qLtOorzpmY%2BdQgPcKJxqxcvmf3JmeA2zAZFyVdmEzznUnaiSY6xhbkbZ8nrReWLN9MBQZJuFd6by3aYlQoYFg2Bxu5d%2FLEAxWm4ljnJApBcv1csUNbJ8KxjkdXXAyPkiWPwMc4JDmXrnH5%2FXBQ7Tf1qxmze1lX2S5QvktDVUA3Bdn67nGtMvguY5EIl7tj1AezbuTFM",
        "in_stat.h",
        "Copy of clientlib.js(2).download",
        "GCSteeringWheelElement.h",
        "pagesettings.js.pobrane",
        "ad_status.js.pobrane",
        "Copy of clientlib.js(18).download",
        "IOUSBHost.h",
        "vForce.h",
        "Copy of clientlib.js(31).download",
        "GCExtern.h",
        "IOBluetoothTypes.h",
        "https://www.pay.gov/public/home",
        "version.h",
        "util.js.pobrane",
        "GCSwitchPositionInput.h",
        "IOUSBHost.tbd",
        "css",
        "ASAccountAuthenticationModificationController.h",
        "GKLeaderboard.h",
        "WKPreviewActionItemIdentifiers.h",
        "https://www.massbroadcasters.org/eeo-organizations/marshfield-high-school",
        "GCDeviceHaptics.h",
        "stdarg.h",
        "ASAccountAuthenticationModificationRequest.h",
        "hxxps://myapplications[.]microsoft[.]com/",
        "perly.h",
        "WKDataDetectorTypes.h",
        "Copy of clientlib.js(51).download",
        "if_ether.h",
        "Researcher msudosos suggests the VirusTotal (Tencent HABO) behavior report may indicate a potential execution path from volatile storage at /tmp/EB93A6/996E.elf.",
        "KUNCUserNotifications.h",
        "OSDebug.h",
        "perl.h",
        "ASAuthorizationSecurityKeyPublicKeyCredentialAssertionRequest.h",
        "GKSessionError.h",
        "GKPlayer.h",
        "SHA-256: fc1fedce1419d4e2009828aad8644deca78b4eeed176e5b009797e0eb0d7d3ff \u2014 Detected as Win.Malware.Vtflooder / Trojan:Win32/Vflooder; UPX-packed PE32 executable, with 812 IDS hits (including C2 checkin + HTTP EXE upload).",
        "pad.h",
        "ASAuthorizationWebBrowserSecurityKeyPublicKeyCredentialAssertionRequest.h",
        "BluetoothAssignedNumbers.h",
        "GKBasePlayer.h",
        "Copy of clientlib(23).css",
        "SHA256 3d10374b55a18a2dd90d35d28472600496c680a7efab4e772595f735cb062343 identified as Win.Malware.Vtflooder-9783271-0 / Trojan:Win32/Vflooder.B with UPX/Nrv2x packing YARA hits, IDS detections for Win32/Vflooder.B check-in and DOS behavior, and network C2 indicators including 172.66.0.227 and 34.54.88.138.",
        "asm_help.h",
        "GCPressedStateInput.h",
        "https://tria.ge/240521-ry949ahe2z/behavioral1",
        "https://vtbehaviour.commondatastorage.googleapis.com/ffe3319990984c10c84fc18f6c1d40b2c7ad44666ebc2b54368bd96327ec6abc_Zenbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775283093&Signature=GU02WhsC3g0ztmDdXDNuqx9T9POv8DnaMp7NQX%2B70%2FybCmZtbIpyPiUCOuYG5ZD1RY8bCIR9k%2F%2BGsKSwWLVUNNih3CgvqShoWsNfLKvtS%2BDRbmV6G4ohLWIP0xPHJOCA%2FWvnSdblJ%2FdibwXFCT851RdpfK3f6ph2EPHXIq%2FBwhSc28%2BJfFSMK%2B1toESpR7COi%2FUwpnMfcoSpcIMZudaaU8JrTvEVLgtJ%2FAgHjmfoXxvJlD",
        "https://tor.sebastianhahn.net \u2022 faui2k9.de\t \u2022 gitbot.faui2k9.de \u2022 tor-dirauth.sebastianhahn.net \u2022",
        "Related to: https://otx.alienvault.com/pulse/69a1a73eb0578b92962dae97",
        "vfs_support.h",
        "GKTurnBasedMatch.h",
        "in_var.h",
        "GKAccessPoint.h",
        "ASAuthorizationCredential.h",
        "WKPreviewElementInfo.h",
        "Copy of clientlib(43).css",
        "Copy of clientlib.js(33).download",
        "WKScriptMessageHandlerWithReply.h",
        "lz4_constants.h",
        "GCRelativeInput.h",
        "Luxury Apartments and Townhome communities do use Foundry Palantir",
        "time64_config.h",
        "Copy of clientlib.js(37).download",
        "Copy of clientlibs(1).css",
        "ASFoundation.h",
        "cpuid_internal.h",
        "tcp.h",
        "GKVoiceChatService.h",
        "Copy of clientlib.js(36).download",
        "module.modulemap",
        "intrpvar.h",
        "ASCredentialIdentityStoreState.h",
        "x86_64-apple-macos.swiftinterface",
        "malloc_ctl.h",
        "Msudosos Regional Notes: While historical pivots show Russian-hosted nodes, the current dual-origin telemetry\u2014dominated by 181 United States-based endpoints\u2014strongly suggests a domestic-aligned adversary leveraging global 'grey space' to obfuscate its operational core. This massive US-centric footprint (exceeding all other regions combined) reinforces the theory of a false-flag orchestration designed to divert attribution toward foreign infrastructure while abusing legitimate Western-hosted trust chains.",
        "scope.h",
        "Accurately tipped about air travel safety. In past. Proven true.",
        "WKFoundation.h",
        "Copy of clientlib(42).css",
        "djimageslider.css",
        "WKDownload.h",
        "Copy of clientlib.js(45).download",
        "tss.h",
        "cpu.h",
        "WebDriver.tbd",
        "https://vtbehaviour.commondatastorage.googleapis.com/a0fb314babd51dbc460ab126b615da4c6f9481f5d1225d0ac189da9d99923bb3_Zenbox%20android.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775189872&Signature=P%2Fa2KXhuVwj4RO8cyfIpkYofLKzsLiKRPHuVAi7hjApskLh84OqCfKuK51z7bTKZd8lCCiQ7XuIaxWQDR7qzDFvuCWutobNhKDdHSDLrTMtqqX3o5RmBpSzMUw3jQJcbxsYWqaOMHy8ZeWEVRuB9orvLwMZbJMMIJM8GhUVHZ6%2BwciVIoj0lYTCb%2FEEkQWTV4g3hs9l8KRzbEfvJGja6ANuv1OtdFLk8pejrraAJMB7ThsjINOXbJb",
        "GCPhysicalInputElement.h",
        "Monitor DGA Shifts: Track new domains registered through NAMECHEAP INC using the current WhoisGuard patterns to identify the next cluster before it goes active. Analyze Telfhash Clusters: Use the Telfhash (t1f303a0...) to pivot and find if the adversary has updated to 64-bit ELF or ARM architectures. Harden DMARC: Ensure your environment moves from \"p=none\" to \"p=reject\" to mitigate the internal spoofing loops exploited by this botnet's telemetry suppression.",
        "nfs.h",
        "IOBluetoothPairingController.h",
        "python-3.9.pc",
        "AFKMemoryDescriptorOptions.h",
        "Copy of clientlib.js(43).download",
        "The pivot from cd398983... to this domain confirms a multi-year campaign (2019\u20132023) utilizing Namecheap-registered infrastructure to orchestrate wide-scale T1110.001 brute-force operations while bypassing standard PKI expiration checks.",
        "perlsdio.h",
        "By operating through WhoisGuard-protected infrastructure and exploiting XOR 0x20 obfuscation, the adversary effectively suppresses telemetry into skim space, successfully bypassing DMARC and Microsoft-integrated trust-chain validation.",
        "hxxps://go[.]microsoft[.]com/fwlink/?LinkId=2033498",
        "preauth_plugin.h",
        "internationalfrontier.com",
        "Copy of clientlib(28).css",
        "arm64e-apple-macos.swiftinterface",
        "https://vtbehaviour.commondatastorage.googleapis.com/bc3cc97398d5f56a4731085e8a385694f6ef1ab37243c6c00deed4a1335ced55_CAPE%20Linux.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775281979&Signature=LrquDQAOc%2Bf90O7wkZ9lRNx5uIZopS4VL7qYn7UKkzTI19c7sNJWNdGeBPtnE%2FG4yxsv1tBxkoojr78E808e78vceGG2xskRT6tUTjtDo2c8JW%2FD9Mr5ZAVe8Cn%2BP%2BpCbBkZXbtaceCtVq0b9zVWx9YstN2ju69uofX50LbI%2FgmHh%2Bghta79DgdBrNmkcQEXDu7t%2FqSZSozfso9i%2BoSZdHXEfsU59hoc%2FhUSoPMEPGFU",
        "Copy of clientlib(49).css",
        "https://tria.ge/240521-rxpf6ahd6w",
        "Multiple antivirus engines flagged the sample with generic heuristic names (e.g., Trojan:Win32/Vigorf.A, Win32:Malware-gen, Trojan.Generic), consistent with multi-engine heuristic detection on VirusTotal.",
        "ASAuthorizationProviderExtensionAuthorizationRequest.h",
        "AdID.tbd",
        "ASAuthorization.h",
        "ASAuthorizationPasswordRequest.h",
        "Copy of clientlib.js(25).download",
        "Block.h",
        "Foundry Palantir still has a presence in Colorado",
        "Copy of clientlibs(3).css",
        "Copy of clientlib.js(54).download",
        "GCDualSenseGamepad.h",
        "warnings.h",
        "animate.min.css",
        "IOPCIDevice.iig",
        "MCBrowserViewController.h",
        "gssapi_krb5.h",
        "ASAuthorizationSecurityKeyPublicKeyCredentialRegistrationRequest.h",
        "GKDefines.h",
        "bootstrap.min.js.pobrane",
        "machine_cpuid.h",
        "math.h",
        "git_version.h",
        "metaconfig.h",
        "onion.js.pobrane",
        "udp.h",
        "time64.h",
        "ASAccountAuthenticationModificationExtensionContext.h",
        "https://otx.alienvault.com/pulse/69af3fd8db2ede31abda6c14",
        "audit_ioctl.h",
        "c.j.location.host \u2022 videodata.video \u2022 referrer.search",
        "https://vtbehaviour.commondatastorage.googleapis.com/100a90c0ff019b19f0f2622cfa529d874f580b2ac6257d018e5eb9ab6d861f44_VirusTotal%20Jujubox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775281812&Signature=jttp%2BTn66O5EfEB%2FASdpjDONf%2BzydGtfIUy3AtwYz0ppPzVA88%2BzZ8LtzV0TDhkMiju4oLHr%2BauJnKYexqnF0MfNTXGKPfj3ux9oZ2%2Baqve%2B3xgapdwdz0N64RgWo3SBqCKFBOQmi57mqIy%2F8qgnAfdVX99BwF2BuRSYSbIjNW5NHjir1JrAAKwOHZFyNsKj99PImyug2FPpRnss8VrJvDyYdnaGLHIAbZMRl72V",
        "ASAuthorizationPlatformPublicKeyCredentialAssertion.h",
        "https://widget.intercom.io/widget/rbc8ok9w",
        "FBI files opened up on a targeted phone, Iunseel, only in search history.",
        "ASAuthorizationWebBrowserPublicKeyCredentialManager.h",
        "GKLocalPlayer.h",
        "icmp6.h",
        "IOBluetoothPasskeyDisplay.h",
        "https://tria.ge/240521-rvybaahb79",
        "https://hybrid-analysis.com/sample/c8e97fd85003de128ef716093cc1ec68f676c737b614f4a55c75c5c0f837de70",
        "config.xml",
        "cpuid.h",
        "op.h",
        "search_impl.js.pobrane",
        "https://www.googletagmanager.com/ns.html?id=GTM-PHWTRTJ",
        "Kerberos.h",
        "animations.css",
        "in_private.h",
        "ASAuthorizationAppleIDCredential.h",
        "Research into the gogetlife.co telemetry confirms a dual-port obfuscation strategy designed to bypass multi-layer security indexing. Forensic HTTP scans identify a Port 80 \"Fail-Closed\" state, where standard web traffic is gated by a Cloudflare-managed 403 Forbidden challenge, effectively neutralizing automated crawlers. Conversely, Port 443 remains accessible, serving a WordPress-based interface backed by a freshly issued Google Trust Services certificate (Feb 4, 2026). This asymmetric configuration ensure",
        "https://vtbehaviour.commondatastorage.googleapis.com/06b6d62477011fa63fdb44046351fbe574391916a4f3ea0486b3e3498145a7d7_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775190407&Signature=Y3EAa%2Fwo4ligJHfBUxkzWLjU9FPLyNmsxeNdcPCIPQBYTTGUIaFddrFIYHFhawxMDvixd7uA0qGc0zVDWgbStf2qhTOU1D0aF%2F%2BSLSXEY3VB8oWRXZCEI12zrSd5P4lHInxRS3CJKbNnJP4GvYx20ctpNSo4u%2FvVMLM%2B92TiYCunAVTquDVrFNNim6LJTEz2ucjhcgF2gKn%2FF0f9ALEheC1lk4omwpcYEPQLNX0wNsxNC%2BWQ",
        "http://www.internationalfrontier.com/i/pdf/2017-04-03-IFR-2017.pdf",
        "f5Y41t9wqY4.html",
        "jcemediabox.js.pobrane",
        "ASAuthorizationPublicKeyCredentialRegistration.h",
        "vmparam.h",
        "capture_0.bundle.js",
        "https://hybrid-analysis.com/sample/430c376c1754f1f160e3d68bafc970eba37811bdb08d73a86bf6f4be1e7267b3/69a1ea603a3303fa120dad19",
        "Copy of clientlib.js(26).download",
        "MCSession.h",
        "vm_dyld_pager.h",
        "Copy of dir (1).c9r",
        "GKVoiceChat.h",
        "GKScore.h",
        "Copy of clientlibs.js(1).download",
        "hv_macro.h",
        "WKSnapshotConfiguration.h",
        "embed.html",
        "IOUSBHostCIDeviceStateMachine.h",
        "https://www.findagrave.com/memorial/139047900/peter-deftos",
        "Hours after files were deemed malicious. We powered on targeted Smart TV",
        "http://www.internationalfrontier.com",
        "IntentsUI.apinotes",
        "GKChallengeEventHandler.h",
        "LBresearcher: msudosos notes: The campaign's use of T1110.001 (Password Guessing) is specifically tuned to exhaust credentials across SSH, MySQL, and CMS backends, effectively recruiting server infrastructure into a global \"zombie\" network.",
        "https://vtbehaviour.commondatastorage.googleapis.com/100a90c0ff019b19f0f2622cfa529d874f580b2ac6257d018e5eb9ab6d861f44_Zenbox%20Linux.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775281711&Signature=G81N%2BSvpl7rLMvDIGLovzSBK8YJzNBOTs7Ycfze1L%2BdFheZX%2BS6EbtlDx545BRgefMUoJSwn%2BdK4eRpYlyMGmHvkv2tw3apezXxBF5J95vedk3RlOzXgGUAvJvewt0RBBR9f9hiVn9CuYTHvY3Cf%2BVog32%2BRLrv8sMhZ%2FeqX0%2FhraP6leNtAta5iUv73pYWeMmdsQ7nX2EvTO7uUvGggX6TmnBhiHHd8E9uCsoPHCTP4i0",
        "https://vtbehaviour.commondatastorage.googleapis.com/a0fb314babd51dbc460ab126b615da4c6f9481f5d1225d0ac189da9d99923bb3_VirusTotal%20Droidy.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775189779&Signature=KfMCCyf96T3bMlo9SpmV1KGK0zKBbkhhSc6Ig5Hvwfx%2FTKTqEVBDXB28XNeWzWbCRTwCNnYlHV3Ed%2BMjcd%2B1aCTDYi5GH9Qw3msxqk5iKwRhzDIhfpM98SwOLC%2B7xZUAC60ecDmVDsjA9OOwOkJe87q3Rrx2lrU9%2BjuSJ1EdwI16qoJyd29sLcX7STTqAMHuzCjIixIOre64HAjpH4lt%2F8tSgE1A5Rs2V7PRHSX6ibKLD",
        "table.h",
        "krpc.h",
        "WHOIS data anchors administrative and technical operations for prioritywirreles.com in Los Angeles, CA (90064) via Namecheap infrastructure. Following its 2020 expiration, the domain has transitioned into redemptionPeriod/pendingDelete status, signaling the formal decommissioning of this C2 asset.",
        "https://vtbehaviour.commondatastorage.googleapis.com/5dae281deccea2c5229861b4f2ff8c386da1726a836839961311896a6c9f5a69_VirusTotal%20Jujubox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775190298&Signature=eEF6m7QHRnKk%2FYB374HxqU2TE0p8gXC9CWwIHPT7M6fEZKjeFUEmUEbqdupsD2hQQbkW%2Fmijo2rSEQ30q3EAyR9aQO3m6L91A6osc3kDipeyZqFrIqoj6wIe8MJGuRf4OC9cVAWipGYXPG5bqc3v6RUHir9MeLOggoGjalexCwBgs3SsGyhqU1uWZdJ%2Fs4nUbHyIJGc3FB9OrnhDRuGPdkfPSOA09hfujcul91zQNws4dznvmM",
        "Copy of clientlib.js(1).download",
        "Copy of clientlib(17).css",
        "Copy of clientlib(51).css",
        "GCKeyNames.h",
        "The AlienVault OTX report for flypdx.com documents 11 related tags, including ids detections and av detections, across 4 active AWS IP addresses (3.175.34.30\u2013.106). These indicators confirm the airport's network has been flagged for unauthorized activity, specifically pointing to a bridge between their web infrastructure and internal passenger tracking. The display of PII on aviation hardware during my June flight matches a known data-bleeding pattern where Personally Identifiable Information (PII) leaks fr",
        "IOUSBHostIOSource.h",
        "magnific-init.js.pobrane",
        "GKGameSession.h",
        "Compilation / Toolchain Compiler: Microsoft Visual C++ 2017 Linker: Microsoft Linker 14.16.27032 IDE: Visual Studio 2017 (15.9) Classification: PEBIN TrID: Win64 EXE (32.2%) / Win32 DLL (20.1%) / Win16 NE (15.4%) PE Section Entropy (Suspicion): .data 7.36 \u2192 high (suggests packing/encryption), .reloc 6.66 \u2192 possible runtime modification, .text 6.01, .rdata 5.88, .rsrc 4.72 Imports (Capabilities): CreateRemoteThread, CreateThread, ExitProcess",
        "Sound crazy. We know Palantir commits ALL manner of crime. They are money motivated.",
        "finder.css",
        "map.js.pobrane",
        "IOUSBHostCIEndpointStateMachine.h",
        "cop.h",
        "ASWebAuthenticationSessionWebBrowserSessionManager.h",
        "Copy of clientlibs(4).css",
        "jquery.djmegamenu.js.pobrane",
        "GCTypes.h",
        "INUIAddVoiceShortcutViewController.h",
        "_OSByteOrder.h",
        "http://truefoundry.prodigaltech.com/",
        "https://js.hs-scripts.com/3844463.js",
        "IOBluetoothUtilities.h",
        "Copy of clientlib.js(12).download",
        "Copy of js",
        "https://vtbehaviour.commondatastorage.googleapis.com/5dae281deccea2c5229861b4f2ff8c386da1726a836839961311896a6c9f5a69_Zenbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775189913&Signature=KduKv0QQf8IKhUUAV%2F0zpzpUmIU%2BEctpJKxUJlyu0Myu11iCQCXfXPprtMBAv5ifc4GLTHDiIuEAJwg%2B%2BHGWjun5ZKLKzoz8Ot2udHqFxvy6ZToPEC4Iui9vdRDHqosVaT77R1Tm1TGuyKVmwYTcow4klVAcpzEWanzWx1jHS42ARepJVrS3AFXHMaaBdTgr23jXcbmly1t3b8lwVilcsk2itdoprPpClQTzwYr1y7YV1%2FbYTDGocHnDwCYy",
        "https://vtbehaviour.commondatastorage.googleapis.com/a041cbdeb64c802bde90e06f25213524b2eac500d6000da7e4caeb96e5de1991_VirusTotal%20Droidy.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775191439&Signature=evxsL1kaOuLe5KziYCSqZ56H%2FqXRQgEN0tkJo0j5G7JQ3mmO0Kav5K9LCz%2FUEzi%2BdtB%2B3%2B7VM6r9pC%2BMh7nHxT%2Bs8UAYuVXPE%2FUbBdHWMjvZQuqrZ0hHqIR2xHVB132HiYQWLo%2FgS1QATOfAcHci3X4FqmqvUp7A%2FmNsE1aVFbLc971RHQOuTapOGhiDZlVUyA9KvpMDKw0DzdeHFSlayBSrDDsWL7xW06XOf",
        "https://vtbehaviour.commondatastorage.googleapis.com/bb46c18b5b2c98937c8fdfb7acd3e0fa4d0534cfc44d4b41ccd6db9198266fbf_Zenbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775190605&Signature=Rcvj5v%2By7yAX52ap8q3zDGTMjVRQm1LkjuWyhDQUaO6QXR1Ld%2F1dD2QjluOGOuXNiW%2FMNP%2Bqj%2Bx6KtYCvttE847keFo1Em2Bm%2F8bv4vK%2FJL0nGIiz%2FatgO7O78LZZ1wkYwcfG5JZAj8VdjDlHQbuOIUz8Nahqt2JUyQ84z3OeH5d3%2BjV8NKW5SjGWQw4mcmjPQXUznoCsysLbjCd5sgZTpyLUdeFJcNKQPiNBURsJeiyCI5llz0j",
        "GCAxis2DInput.h",
        "GCProductCategories.h",
        "GCDevicePhysicalInput.h",
        "endian.h",
        "zlib.h",
        "Conversely, Port 443 remains accessible, serving a WordPress-based interface backed by a freshly issued Google Trust Services certificate (Feb 4, 2026). This asymmetric configuration ensures that the structurally invalid X.509 \"Broken Seal\" is only delivered via encrypted channels, while the gated Port 80 tier prevents the discovery of the underlying Zeppelin/Bloat-A redirection logic by non-human-interacted sessions.",
        "vm_far.h",
        "ASAuthorizationSecurityKeyPublicKeyCredentialRegistration.h",
        "ASWebAuthenticationSession.h",
        "calathea-containers.palantirfedstart.com \u2018 BYE ALREADY\u2019",
        "ASEProcessing.tbd",
        "Copy of clientlibs.js(3).download",
        "feature.h",
        "pp.h",
        "stddef.h",
        "GCKeyboardInput.h",
        "IOUSBHostObject.h",
        "Copy of clientlib.js(35).download",
        "Copy of clientlib(38).css",
        "invlist_inline.h",
        "WebGPU.tbd",
        "Copy of clientlib(41).css",
        "GCGamepad.h",
        "av.h",
        "WKContentWorld.h",
        "WKFindConfiguration.h",
        "WKHTTPCookieStore.h",
        "l1_char_class_tab.h",
        "Researcher msudosos: This activity appears to facilitate a preliminary reconnaissance phase, possibly utilizing system commands to query /proc/cpuinfo and /proc/version for architectural profiling purposes.",
        "in_systm.h",
        "GameKit.h",
        "perl_langinfo.h",
        "in_pcb.h",
        "Admin.tbd",
        "perliol.h",
        "pio.h",
        "Copy of clientlib(26).css",
        "pmap.h",
        "Copy of fbevents.js.download",
        "WKScriptMessageHandler.h",
        "Attacker being used by several legal entities attacking a target\u2019s family",
        "ASAuthorizationWebBrowserPlatformPublicKeyCredentialRegistrationRequest.h",
        "GKPeerPickerController.h",
        "GKPublicProtocols.h",
        "IOBluetoothUserLib.h",
        "igmp.h",
        "INUIAddVoiceShortcutButton.h",
        "hv_func.h",
        "WKOpenPanelParameters.h",
        "ASWebAuthenticationSessionWebBrowserSessionHandling.h",
        "extended_layouts.26.css",
        "paygov-final.min.js",
        "IOUSBHostCIPortStateMachine.h",
        "https://tylerjoycedenver.followupboss.com/unsubscribe/T6pEHkEaLZAN5Jxflvspix0zKbJZwfY9pjBpUTk7q06azxItZ7aiRb7brQhy1NNFqrcrUe4cKmI455MBqcwK9_it6dqx6QWdANshp0om1Bv-5ezKkyVJDphCHvPQNvMupI1owe03rtqYAyu8Cj3cWw~~",
        "_param.h",
        "Broken Seal exploitation: The invalid X.509 seal appears engineered to exploit verification logic gaps, forcing fail-open behavior and allowing SEG bypass under certain configurations. Human-gated delivery posture: Cloudflare 403 challenges suggest the actor enforces human interaction before payload delivery, reducing automated discovery and sandbox analysis. Industrialized infrastructure: Correlation across thousands of domains and URLs indicates a highly automated, rotating delivery ecosystem.",
        "Copy of clientlib.js(10).download",
        "https://www.virustotal.com/gui/url/f6db0235760bd467ca822ad515a8410121fde4713501b3e718b8fb127dfa259c?nocache=1",
        "WebKitLegacy.h",
        "https://serverhub.com/combine/a059fe7a562c0b582328162f0ee69fda-1426025688",
        "perldtrace.h",
        "GKSession.h",
        "GCDeviceLight.h",
        "static_if.h",
        "A man claiming to have the name Sebastian is communicating with targets love one",
        "https://vtbehaviour.commondatastorage.googleapis.com/fa8a59149604c73572bf92b42640de49faa7e8f16cd4bc18345d3e6a16378744_Zenbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775282019&Signature=VwsuvdyY52E5jzftipHSNWVrwmO7YUwSQa9yHiMIgbsXcJDnDNcdELamMXjmvzDn%2FT6L5HguJFyj%2F4DHLmPfddzVphNAKCPvz3IRVae2piJ%2B8VWa2%2B98W3RjMft93LZhdNHwxeEYM8oJ%2FOjAjw%2FIicginJBUwlGeHX3kfTJieSEC7SYf6BkJ4UNfnF2pPQjiaAqG9mop%2FPKsB%2FF1K%2FrL7Rpsxwhl1rGglHYPM4%2BtJj6zDYx%2F",
        "https://hybrid-analysis.com/sample/41859e0b198fbe88772ef12c577023c0481ec19867e410bab335e67fea87c1bb/642ca80cde2048242a0e097d",
        "GCDualSenseAdaptiveTrigger.h",
        "ASAuthorizationPublicKeyCredentialRegistrationRequest.h",
        "perl_inc_macro.h",
        "MITRE ATT&CK: Process Hollowing (T1055.012): Documentation on the RunPE injection method used by the payload to achieve a fileless state in RWX memory. RFC 5652 - Cryptographic Message Syntax (CMS): This standard defines the structure of the digital signatures that this campaign's \"Broken Seal\" exploit bypasses.",
        "GKGameCenterViewController.h",
        "https://www.virustotal.com/gui/collection/79c25168b2f93d9730a56b8d2b834cbfb2752b63b21b9dd51109416fbaa676d8/iocs",
        "util.h",
        "utfebcdic.h",
        "uswds-init.min.js",
        "Some Colorado communities have been taken over by the State Government",
        "GCMotion.h",
        "vecLib.h",
        "Copy of clientlib(16).css",
        "copyio.h",
        "GKSavedGameListener.h",
        "GKMatchmaker.h",
        "ASAuthorizationSingleSignOnProvider.h",
        "MCError.h",
        "Copy of clientlib(27).css",
        "ip6.h",
        "Obfuscation: XOR-based String Encryption (0x20)",
        "NSAttributedString.h",
        "marriott-control-prd.accenture.cn",
        "thread.h",
        "GKMatchmakerViewController.h",
        "vm_kern.h",
        "limits.h",
        "vm_shared_region.h",
        "mg.h",
        "ASAuthorizationOpenIDRequest.h",
        "dosish.h",
        "lz4.h",
        "template_responsive.26.css",
        "Copy of clientlib.js(30).download",
        "magnific.css",
        "https://hybrid-analysis.com/sample/c8e97fd85003de128ef716093cc1ec68f676c737b614f4a55c75c5c0f837de70/69a19551cb5537805706bca9",
        "ASPublicKeyCredential.h",
        "Copy of clientlib.js(39).download",
        "igmp_var.h",
        "form.h",
        "Copy of clientlibs.css",
        "ASAuthorizationPublicKeyCredentialParameters.h",
        "IOUSBHostControllerInterface.h",
        "tcp_timer.h",
        "www-embed-player.js.pobrane",
        "kpi_ipfilter.h",
        "python3-embed.pc",
        "GameController.h",
        "GCMouseInput.h",
        "signal.h",
        "Copy of clientlibs(2).css",
        "Copy of clientlib(13).css",
        "IOUSBHostDevice.h",
        "ptrauth.h",
        "locate_plugin.h",
        "_types.h",
        "desc.h",
        "https://www.virustotal.com/graph/embed/g8726609a12794ebeb59edd531961a233068149bcdf994b428f20141be6111551?theme=dark",
        "parser.h",
        "Copy of clientlib.js(8).download",
        "GCTouchedStateInput.h",
        "https://d31qbv1cthcecs.cloudfront.net/atrk.js",
        "js",
        "reg_help.h",
        "close.svg",
        "cpu_capabilities_public.h",
        "Researcher msudosos posits a strategic exploitation of Root Certificate Validation Failures, where the adversary leverages an expired trust chain to bypass heuristic security filters and establish persistence.",
        "By maintaining a hollowed root posture, the sample facilitates persistent, low-signal synchronization with external cloud infrastructure while bypassing traditional heuristic trust-chain verification.",
        "https://vtbehaviour.commondatastorage.googleapis.com/100a90c0ff019b19f0f2622cfa529d874f580b2ac6257d018e5eb9ab6d861f44_Zenbox%20Linux.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775281904&Signature=B9x8BUVCeldkVImU%2Bb%2B7d97Q9Y2suAJFE1HvxBCu6MQUOt52HrgAUTBIeXPKgNP0gKiqrr%2BwDvN7q637Ht6n5C9QhuTPI%2FhWTub0F22jsp8lU2Pvp2bS%2FlaSchLRN5gDngyPABgnaqYERICP8QQkwfaB9pY%2Bii1%2FAeel%2BIDGYwxPPfIcYevejNv2O%2F0J6qYRftrtXwa95pbsecrfOzH6bpF3AzHQrTLJAuZ%2B%2BykW",
        "MultipeerConnectivity.apinotes",
        "GKEventListener.h",
        "TargetConditionals.h",
        "GCDirectionalGamepad.h",
        "GCXboxGamepad.h",
        "https://serverhub.com/modules/system/assets/js/framework.js",
        "GKAchievementDescription.h",
        "Copy of clientlib(5).css",
        "cv.h",
        "https://www.virustotal.com/gui/collection/7196cbc5285fb7e155a529980dc1797d3ab3884e20c77c66d9b1b971c313fe56/graph",
        "WKPreviewActionItem.h",
        "ASPasskeyRegistrationCredential.h",
        "hxxps://portal[.]office[.]com/Account",
        "Air Safety: it\u2019s important to have  passengers or hackers unable  to communicate via airline networks /",
        "hv.h",
        "ASAuthorizationPlatformPublicKeyCredentialDescriptor.h",
        "vm_map.h",
        "Copy of clientlib.js(19).download",
        "Copy of clientlib.js(55).download",
        "(stream_tcp) data sent on stream after TCP reset sent (1).txt",
        "GKGameSessionSharingViewController.h",
        "vm_pageout.h",
        "GCDevice.h",
        "mg_raw.h",
        "UNDReply.defs",
        "target.id  \u2022 tostring.call  \u2022 title.search",
        "fontswitcher.js.pobrane",
        "WebKit.apinotes",
        "_endian.h",
        "AppleUSBDescriptorParsing.h",
        "fakesdio.h",
        "Copy of clientlib.js(57).download",
        "in_arp.h",
        "ASCredentialProviderExtensionContext.h",
        "ASWebAuthenticationSessionRequest.h",
        "animate.ext.css",
        "Copy of clientlib(8).css",
        "GKFriendRequestComposeViewController.h",
        "WKWebsiteDataStore.h",
        "Copy of clientlib.js(32).download",
        "ASPasswordCredential.h",
        "ASAccountAuthenticationModificationUpgradePasswordToStrongPasswordRequest.h",
        "GCDeviceCursor.h",
        "IOBluetoothObjectPushUIController.h",
        "python-3.9-embed.pc",
        "search.js.pobrane",
        "http://www.internationalfrontier.com/i/pdf/Montana-Presentation-2011.pdf",
        "stickybar.js.pobrane",
        "jquery.ui.sortable.min.js.pobrane",
        "rpcv2.h",
        "No phones or circuit board tech. Smart watches.You can\u2019t bring large bottles of hygiene products. Deal with a new reality!",
        "vm_memtag.h",
        "https://vtbehaviour.commondatastorage.googleapis.com/1256f3aa5f091ac40a573113fcc1a4d0e320af5ee363b0eca79618602cb7dc66_Dr.Web%20vxCube.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775190146&Signature=3XpRLUQ3g712Vw0Gv1aflVxZs7RKpzIhEK8giO9ydwOrOGjLnAK89Y%2BmEf4g2U2YbO04EE%2BcdR5xPgcch1%2B1Gf4thYCgBcbKEEIfNK5UrJwBpAkYRm3D9xsnD%2FVxZt26yLC6aQy87D%2FKNC9aLvViRHGxuFgOp4zkcU%2BRD6mmpIB8SpX5%2BDpocWc4s9R%2BywRPXZ2U2E49g81i%2B5io3Ycqe8ikdjbPlZo9R0KEFLaDQtH",
        "trap.h",
        "Tipped on hits and other savage plans  to be executed against targets. Targets can be any (1) person.",
        "Copy of clientlib.js(13).download",
        "overload.h",
        "ASAuthorizationPublicKeyCredentialDescriptor.h",
        "I\u2019m not sure what brings man to from NY to Denver today. I consider him malicious",
        "icon-https.svg",
        "IOBluetoothUI.h",
        "atm_types.h",
        "GKGameSessionError.h",
        "bootstrap.26.css",
        "Copy of iframe_api",
        "xfe-URL-Enom.com-stix2-2.1-export 2.json",
        "ASPasskeyCredentialRequestParameters.h",
        "Copy of clientlib(29).css",
        "GCControllerButtonInput.h",
        "template.26.css",
        "https://vtbehaviour.commondatastorage.googleapis.com/3e6e0898a7b1b297d2b9322f5f578b02e2fd5d5647dbeef6b9273cda383e1547_Zenbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775283189&Signature=PtLPpZoeHrLkYIaV2etyfYslOxR9PtxqmjNNDdMHoJjBUuweFaoOVGyfkf%2BUGEiGQCogCu7az%2B4btIJ3frL%2BEdzwNV7Ufeb24KQqbVUQrVITPGPCW42mMdsKdDoNQsqLooDqFsjxRGt2meZgP3F3roSTIWDEJPwr35bBBkdANOOdXZG1mg3O8JHm35%2BBQMkSxOiAxeftigjPK7On%2Fk%2FvMli1USxDUfi2eRlkRaL090nKenRXt3cz4FEBe8",
        "As of Feb 13 (early AM) \u2014 Indicators of Compromise: 17K | Types: Email (30), FileHash-SHA256 (2,146), URL (8,070), Hostname (2,755), Domain (3,528), Other (1,110) | Geo: US (233), Canada (15), China (10), Japan (2), Spain (2), Other (13)",
        "saved_resource.html",
        "ASAuthorizationPlatformPublicKeyCredentialRegistration.h",
        "GCSwitchElement.h",
        "Copy of clientlib(53).css",
        "eversource.com (IP: 159.108.5.46, ASN: AS2024) has 2 flagged malicious files within its infrastructure, despite being whitelisted. The domain hosts 95 subdomains and maintains an active SPF record, indicating potential security risks under an otherwise trusted facade.",
        "ASPublicKeyCredentialClientData.h",
        "Copy of clientlib.js(41).download",
        "Copy of clientlib(31).css",
        "pp_proto.h",
        "LBresearcher: msudosos notes: The threat actor maintains operational longevity by rotating through WhoisGuard-protected nodes like prioritywirreles.com, which historically resolved to Russian-hosted IP space (194.61.24.231) to obfuscate its origin.",
        "Copy of clientlib(18).css",
        "https://www.joesandbox.com/analysis/1370149/0/html#dropped",
        "WKBackForwardListItem.h",
        "Copy of clientlib(6).css",
        "GCMouse.h",
        "stdint.h",
        "pycore_condvar.h",
        "KerberosLogin.h",
        "WKURLSchemeHandler.h",
        "MCAdvertiserAssistant.h",
        "Copy of clientlibs.js.download",
        "jquery-migrate.min.js.pobrane",
        "Copy of clientlib(2).css",
        "bootp.h",
        "unicode_constants.h",
        "ASAuthorizationSingleSignOnRequest.h",
        "GKNotificationBanner.h",
        "AppSandbox.tbd",
        "Copy of clientlib.js(23).download",
        "https://js.hsleadflows.net/leadflows.js",
        "GKMatch.h",
        "OpenAL.tbd",
        "machine_machdep.h",
        "libkern.h",
        "GCDirectionPadElement.h",
        "WKNavigationAction.h",
        "perl_siphash.h",
        "The domain prioritywirreles.com (registered via NAMECHEAP INC) shows a 4/93 detection ratio, confirming it is a live but \"low-noise\" C2 node used to avoid broad-spectrum blacklisting",
        "IOUSBHostPipe.h",
        "opcode.h",
        "ASAuthorizationAppleIDButton.h",
        "vDSP.h",
        "WKWebpagePreferences.h",
        "AirPlayReceiver.tbd",
        "GCDevicePhysicalInputStateDiff.h",
        "accenture.cn",
        "https://vtbehaviour.commondatastorage.googleapis.com/68e1e958d101feb1044553d3e8ba341448a17d917e4b613cb05873814159ed40_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775282913&Signature=TKCWJVTu8VHNWLhsI%2BkIN06KJgV4R1%2F2oO9G3V2x%2Bdxi14E9JDPHosmNkN%2Fk02BRc0I8Yg4HJPmcxjdAvb8mTCZjA10bizFznZC3epwH0hmoxTVgryMxpD%2B7zTQqKIRpE9UGGC1WSu0CTJ3rI9dCyopLkmeiyJPVw%2BIuERp37p2MEwzwwIPRuYpB190GfOdCkGt6TuMjDG6cVa%2BxvJlEdoEw8US6W8WPaioxSu1KVCoKjwky",
        "https://www.googletagmanager.com/gtag/js?id=GT-NNS2QH6C",
        "Copy of clientlib.js(4).download",
        "https://www.virustotal.com/gui/collection/7196cbc5285fb7e155a529980dc1797d3ab3884e20c77c66d9b1b971c313fe56/iocs",
        "ip_var.h",
        "OBEXBluetooth.h",
        "PCIDriverKit.h",
        "content.css",
        "stdbool.h",
        "GCPhysicalInputSource.h",
        "ASCredentialProviderViewController.h",
        "I need some help.",
        "monotonic.h",
        "offcanvas.css",
        "ASAuthorizationSecurityKeyPublicKeyCredentialProvider.h",
        "Copy of clientlib.js(60).download",
        "Copy of clientlib(10).css",
        "ASAuthorizationSecurityKeyPublicKeyCredentialAssertion.h",
        "https://vtbehaviour.commondatastorage.googleapis.com/100a90c0ff019b19f0f2622cfa529d874f580b2ac6257d018e5eb9ab6d861f44_Zenbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775281734&Signature=3FFHeC27RvCC9623M2f8xoSU4fl9LBd%2FvI%2F98rUNvmdceN4AZjjw77yTU0ApUTXU5FbdCpODVhKi0X4pqDz1pqEP%2FBRLq%2FNhgoRliai6LlD4yhdTtKNi4zrfCDG%2Bd4dRzD5y674IfEPynxGiFOWxc6wiCtl3rhwTPEqisyDqFbvnF57SxrcPoVSzVO3wEtxpCOIw8iAFXdW2zgnnYYbSrbaQBfghKLtFA6r2vP%2Bmrd33YSUiH%2Fe2EqBz",
        "https://vtbehaviour.commondatastorage.googleapis.com/37efacb8411234dd9882d8d3a8709f492eb2ed252132da099a11be07c0b4ccb0_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775190004&Signature=Nzt9YHY3Ji2VsLO1kvr7%2FyWWwOgo%2BCIoXyjtyshhzTGRxGzhcNdyKU9byPqyv%2F5YAzj%2BmNnDego3ImYeToBCbgyY%2BJJMmUKX6ZrUT1a2O4gv9eMyysIFgYhJ7ZpzyGIvHR5VSJlzPX0AWS81Ml7syDCjTGHikZ9G%2B%2B0cfDA0dhp%2FR7zhAp7yxB2jsDhz1kDY3nncYpjeVtj2o02Nt4JxPa5ML%2FvKBF%2FBHtOtBCqh%2",
        "https://www.virustotal.com/graph/embed/g365a82115f934e31a69118715695c91c231f66cda9084c9389e56afb985a243e?theme=dark",
        "sw3VTUzeRvWIVwvWSyk6S5gHWPxOOwU1OxerozmN4Hw.js.pobrane",
        "ASAuthorizationAppleIDProvider.h",
        "ASExtensionErrors.h",
        "magnific.js.pobrane",
        "GKChallengesViewController.h",
        "MCNearbyServiceBrowser.h",
        "GKError.h",
        "Copy of clientlib(9).css",
        "Copy of clientlib(39).css",
        "Copy of clientlib(52).css",
        "Copy of clientlib.js(56).download",
        "ASAuthorizationWebBrowserExternallyAuthenticatableRequest.h",
        "ASSettingsHelper.h",
        "Copy of clientlib(30).css",
        "style.css",
        "perlvars.h",
        "GCController.h",
        "GCColor.h",
        "python3.pc",
        "Copy of clientlib(7).css",
        "ebcdic_tables.h",
        "sv.h",
        "keywords.h",
        "Copy of clientlib(32).css",
        "https://vtbehaviour.commondatastorage.googleapis.com/fa8a59149604c73572bf92b42640de49faa7e8f16cd4bc18345d3e6a16378744_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775282044&Signature=Y%2FEJZwm3h4tUuhn9%2FgO7QDcTnUoojZIDnoL%2FuGaoe0o5h%2FPUEiZpyFQLH9JfrvNN0h58UWlcJNCMxaSZl%2BZDvBDliVat0wDr0fE35mo0jGTK3uwa7DykFrjyI0NAVFlzkVSyxC0euM4lSJaw9PqyJGgLb4FfaztkzK7ZQYTIsGMYWSsCAKzatCObwK%2B8nqV63M9VXUeJy8ZQx7IwbttNffD6FQUaPbtCwlsywb%2Bu7NVqkFSG",
        "We have foot soldiers. Be aware",
        "IOUSBHostControllerInterfaceHelpers.h",
        "INImage+IntentsUI.h",
        "https://api.manus.im/api/oauth2_callback/apple",
        "libperl.tbd",
        "encode.h",
        "Observed hosting and routing telemetry indicates the delivery infrastructure is operating through AS209242 (Cloudflare London LLC), suggesting the actor is leveraging Cloudflare\u2019s transit layer for resilience and to reduce direct exposure of origin infrastructure.",
        "WKDownloadDelegate.h",
        "tor.sebastianhahn.net \u2022 dap.digitalgov.gov \u2022 fbi.gov \u2022  x.com \u2022 sebastianhahn.net",
        "com_err.h",
        "Primary Hash (SHA256): cd3989830da99a69380901769fd78902efb3cd8ba5c9390e94bd4333b7fad186",
        "perlio.h",
        "Copy of clientlib.js(59).download",
        "AuthenticationServicesCore.tbd",
        "GCDualShockGamepad.h",
        "The local environment exhibits advanced telemetry suppression within specialized skim memory regions, effectively neutralizing standard DMARC validation and Microsoft-integrated defensive protocols.",
        "MapKit.tbd",
        "ASAuthorizationPublicKeyCredentialLargeBlobRegistrationInput.h",
        "Copy of clientlib.js(53).download",
        "ASCredentialIdentity.h",
        "INUIEditVoiceShortcutViewController.h",
        "Copy of clientlib.js(34).download",
        "GKLeaderboardViewController.h",
        "GKSavedGame.h",
        "jquery.min.js.pobrane",
        "OSAtomic.h",
        "Copy of clientlib.js(15).download",
        "Copy of clientlib.js(24).download",
        "CredentialsCache2.h",
        "OSByteOrder.h",
        "WKContextMenuElementInfo.h",
        "ASAuthorizationRequest.h",
        "gv.h",
        "https://tria.ge/240521-r3mvhshd83",
        "jquery-ui.min.css",
        "gssapi.h",
        "IOUSBHostControllerInterfaceDefinitions.h",
        "ASAuthorizationAppleIDRequest.h",
        "xfe-URL-Cloudfront.net-stix2-2.1-export.json",
        "MCNearbyServiceAdvertiser.h",
        "mg_vtable.h",
        "tree.h",
        "GKChallenge.h",
        "Copy of clientlib(22).css",
        "Copy of clientlib.js(58).download",
        "https://tria.ge/240521-r1yh8shd44",
        "AuthenticationServices.h",
        "Copy of clientlib.js(22).download",
        "The payload (SHA256: dfff54...4af) achieves a fileless execution state via Process Hollowing (RunPE), injecting into RWX memory regions of legitimate system processes to evade disk-based EDR telemetry. Anti-analysis controls\u2014including Bochs artifact checks, geofencing logic, and direct CPU clock interrogation\u2014are implemented to validate a high-interaction user environment prior to execution.",
        "vutil.h",
        "WKUserScript.h",
        "ASCOSEConstants.h",
        "https://vtbehaviour.commondatastorage.googleapis.com/bc3cc97398d5f56a4731085e8a385694f6ef1ab37243c6c00deed4a1335ced55_Zenbox%20Linux.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775281954&Signature=Tythlx%2B0x7Dzf2SYvJDgwby2Ifinb7IbK5GTx%2ByqvqVc1r4cz7rhoVD3NZqUAgUpxSkIAsRAK5WV5tMXUGiiB6JWp8Y9YmaL7Zhb5NxMBcodk57r7XhYzEbDxYg%2Fh1ChwMliA5cBr%2BXbUcW4q2aA4xQeNE1XVNpalGtyHh8bsDTKgQG0Ch1gikPF%2BeKc2ANprXe6z%2FJBXtqJBxh6%2Bem6fGON6%2BpRP1%2BgmNg4%2FtFnlQ",
        "ASPasswordCredentialRequest.h",
        "djmobilemenu.css",
        "uudmap.h",
        "UNDTypes.h",
        "ASAuthorizationWebBrowserSecurityKeyPublicKeyCredentialRegistrationRequest.h",
        "Pivot-Ready Indicators (IOCs) Go BuildID: nGYES3pajdOmKy1i6Ghh/KO9ydOtZpXtoKtB0KHE-/iisNoniHgTbj_cV6M-uk/XmMYzkBiZs8NXMRZYTiT Telfhash: t1f303a0b3055d54e8b7f08907c7af7624cef6e0f726d078f169e278d09a72c826626874 Imphash: 9698f46495ce9401c8bcaf9a2afe1598 Vhash: 1e53f1a1b59ecb93f821c74b25d81e9f",
        "canvas.html",
        "Tipped of new looming airline threats",
        "UNDTypes.defs",
        "WKSecurityOrigin.h",
        "GameKit.apinotes",
        "Copy of clientlib(46).css",
        "IOBluetoothDeviceSelectorController.h",
        "nationalgrid.com \u2014 Whitelisted domain (US, AS13335 Cloudflare) with 500+ passive DNS entries, 692 URLs, 195 subdomains, and 2 malicious files hosted on IP 104.17.1.192, which is concerning given the infrastructure and trust level.",
        "GKCloudPlayer.h",
        "oalMacOSX_OALExtensions.h",
        "Malicious sample (SHA256: fa8e2ddfe42e77a9771a7c4d6421c7a808cf4508f8cd6dc6f4cf8bd4e2ae7f8f) detected as TrojanDownloader:Win32/Tugspay.A with YARA hits for Win32_PUA_Domaiq, aPLib, PECompact_2xx and IDS alerts including TLS Handshake Failure + 403 Forbidden, contacting 36 domains (e.g., api.123mediaplayer.com, static.sslsecure1.com) and IPs such as 104.18.23.19 and 193.166.255.171.",
        "https://vtbehaviour.commondatastorage.googleapis.com/1256f3aa5f091ac40a573113fcc1a4d0e320af5ee363b0eca79618602cb7dc66_Yomi%20Hunter.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775190083&Signature=a1bnyt5OUcTN8ONeNVqbY%2Fe%2FDVJ2N3olQ9r59dijMLLegF84xQDghj0r6VPdFB8fc%2B3QTcJqhpm6vag1pK9us%2F3UqDJ3Yubf%2FukjL4GMKXDdMSggljB7d%2FpkTraQysnttspVal56LzXitjgIEGYZTidKcIv5LM6YH4zCAXn%2BVueaBNIgpcDS0RuX8fVAQYOeftW9AiEz2TZzx1BT6KUgoj0Tzetn4k541357bb58K1w9n9QV1",
        "uconfig.h",
        "arch.h",
        "Verification failure observed in automated verification handlers during sandbox replay.",
        "WKPreferences.h",
        "machine_kpc.h",
        "Copy of clientlib.js(16).download",
        "AFKUser.tbd",
        "Copy of clientlib(15).css",
        "ASAuthorizationSecurityKeyPublicKeyCredentialDescriptor.h",
        "ASAuthorizationPlatformPublicKeyCredentialProvider.h",
        "main.js.pobrane",
        "OpenAL.h",
        "GCControllerElement.h",
        "Copy of clientlib(35).css",
        "Copy of clientlib(11).css",
        "mg_data.h",
        "zaphod32_hash.h",
        "WKWindowFeatures.h",
        "kdp_callout.h",
        "jquery.ui.core.min.js.pobrane",
        "OSBase.h",
        "Whitelisted IP Address 204.79.197.212 Location  United States ASN AS8068 microsoft corporation Nameservers ns4-205.azure-dns.info. ,  ns1-205.azure-dns.com. More WHOIS Registrar: MarkMonitor, Inc.,   Creation Date: Mar 26, 1996 Related Pulses OTX User-Created Pulses (50) Related Tags 2025 Related Tags 4328 ,  5943 ,  80211 ,  #supportsitewebsiteabuse #rootcertificatefailure #cryptographicf ,  The dynamics of the mudoSOSIntersectalign with sophisticated adv More Indicator Facts 982 malicious files communicat",
        "IOPCIFamilyDefinitions.h",
        "ASCredentialServiceIdentifier.h",
        "Copy of clientlib(40).css",
        "gssapi_generic.h",
        "ASPasskeyCredentialIdentity.h",
        "GCControllerAxisInput.h",
        "uuid.h",
        "WebKit.tbd",
        "OSvKernDSPLib.h",
        "memory_types.h",
        "WKUIDelegate.h",
        "GKLeaderboardScore.h",
        "git.spywarewatchdog.org",
        "GCLinearInput.h",
        "ASPasskeyCredentialRequest.h",
        "GKGameSessionEventListener.h",
        "GKPublicConstants.h",
        "iperlsys.h",
        "ASAuthorizationPasswordProvider.h",
        "Copy of clientlib(34).css",
        "m=el_main_css",
        "https://apple.btprmjo.cc/",
        "Copy of clientlib(45).css",
        "offcanvas.26.css",
        "ASAuthorizationPublicKeyCredentialLargeBlobAssertionInput.h",
        "https://vtbehaviour.commondatastorage.googleapis.com/37efacb8411234dd9882d8d3a8709f492eb2ed252132da099a11be07c0b4ccb0_VirusTotal%20Jujubox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775190199&Signature=RiO2p%2BBvc38TqeTuiMJNxoT6Jr3JfHvTQFQIk94ZaRY%2FPP5yEPSH45GncMCh4GqP1%2F%2BNLR2IVm5Z2svEWojLwxq%2Fl0eIAWy1chUQmg2GcEg5YoaEEnXpWjb1er08EIYwV0ZC8parFwVrr194MKeUmZYo5NLYk4%2BCim9ipnxYse12eROsMSXZtyS4daGivzQzihRqTUU9iEn%2FxAKEOI%2F3V8JRrqNy3nDqmo1mdoVr",
        "WKNavigation.h",
        "cast_sender.js.pobrane",
        "marriott-datacenter-prd.accenture.cn",
        "GKLeaderboardSet.h",
        "Foundry Foot Soldiers are still in Colorado targeting innocents",
        "unixish.h",
        "pal_routines.h",
        "This ELF 32-bit LSB artifact is a sophisticated GoBrut/StealthWorker agent, compiled via Golang 1.10 and stripped to obfuscate its high-velocity service-bruting logic. VirusTotal confirms a critical threat profile with 44/65 security vendors flagging the file, which leverages a unique Go BuildID (nGYES3pajdOm...) and a Telfhash (t1f303a0...) for architectural fingerprinting. The binary orchestrates decentralized Command and Control (C2) through an expansive infrastructure of 797 unique IPs and 1,834 domains",
        "handy.h",
        "opnames.h",
        "ASAuthorizationSingleSignOnCredential.h",
        "ASPasswordCredentialIdentity.h",
        "IOUSBHostCIControllerStateMachine.h",
        "IOBluetooth.tbd",
        "apfs_boot_mount.tbd",
        "jquery-noconflict.js.pobrane",
        "tcpip.h",
        "WKProcessPool.h",
        "ASAccountAuthenticationModificationViewController.h",
        "machine_routines.h",
        "GCButtonElement.h",
        "Copy of clientlib(12).css",
        "T1110.001 (Brute Force: Password Guessing)",
        "MultipeerConnectivity.tbd",
        "arm_features.inc",
        "embedvar.h",
        "GameController.tbd",
        "Copy of clientlib.js(29).download",
        "Copy of clientlib(36).css",
        "Copy of clientlib(48).css",
        "ASAuthorizationPlatformPublicKeyCredentialAssertionRequest.h",
        "OSKextLib.h",
        "jquery.countTo.js.pobrane",
        "WKNavigationDelegate.h",
        "ASAuthorizationWebBrowserPlatformPublicKeyCredentialAssertionRequest.h",
        "kdp_en_debugger.h",
        "Copy of clientlib.js(38).download",
        "GCAxisElement.h",
        "ipc_types.h",
        "Copy of clientlib.js(5).download",
        "XSUB.h",
        "paygov.min.css",
        "Copy of clientlib(19).css",
        "I would post his public information. It may be unwise.",
        "byte_order.h",
        "djmegamenu.26.css",
        "https://vtbehaviour.commondatastorage.googleapis.com/bc20f137a2281fae2ee13f698e613e72c37f6b4eb6784653f284f11f4d83ba77_Tencent%20HABO.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775190236&Signature=Fg7jPZWmHQO%2BH8GRQx%2FxSMq5Na7Oo9cN0HR99DHFY8svYTkPoerGELKx7Sf906aTDq2Rer45ajXeYPzzHTiab9NKqWR1JGHbaq0WapVqsRzvXz2QLuBhHoz50tIoVKnx8ZrN9HqHBQweg8nfN%2FWEoaHVlSgav3jhoNTnZAC%2Fa%2BsTLexjXFBIP2v4jpISAl82ESU%2FGZH64BtZpgIJz7RZXdDqZ3LF7JTgwG2JX94%2BOOSn3G14",
        "The environment leverages prioritywirreles.com as a high-fidelity DGA-derived C2 node, utilizing its historical resolution to Russian-hosted IP space (194.61.24.231) to maintain persistent Stealthworker botnet synchronization.",
        "Significant? The screen once had a floral theme. Now a black background with a single fish as Wallpaper .",
        "GCControllerInput.h",
        "https://creative.miqdigital.com/.well-known/apple-app-site-association",
        "Copy of clientlib(4).css",
        "plugin.js",
        "WKNavigationResponse.h",
        "xfe-URL-Eonix.net-stix2-2.1-export.json",
        "Copy of clientlib(1).css",
        "perlapi.h",
        "https://vtbehaviour.commondatastorage.googleapis.com/a0fb314babd51dbc460ab126b615da4c6f9481f5d1225d0ac189da9d99923bb3_VirusTotal%20R2DBox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775189811&Signature=O96heM5BVAaltXSZInHXgIgK35KjLrLg%2FfKtFXVS%2BoRHTlfpZtn4LpFvolATpK7dED66Ms7SXpn8nX0i7j1IpuDOXOXSm112TOKIKVVPZJH5ppCD6uFYvhkfNcQGa%2FXK%2BDixyM%2BuqwGoJSFD6QzP8J2Iz1GyU4RYYWuB2C7ZD7LOWKlvxF%2F9LTAX8jFDLgFVsE3Og3cU8y3jK%2BenDPthRM6YFu3qewxpti7KVNwKeMJ",
        "ASWebAuthenticationSessionCallback.h",
        "By remote view of NEW targeys view, all key calls are routed through him.",
        "Copy of clientlib(54).css",
        "types.h",
        "LBresearcher: msudosos notes: By exploiting Root Certificate Validation Failures, the StealthWorker (GoBrut) agent ensures that its 32-bit ELF binaries bypass the automated reputation checks enforced by major cloud providers.",
        "lz4_assembly_select.h",
        "Copy of clientlib.js(7).download",
        "OSReturn.h",
        "krb5.h",
        "Copy of clientlib(50).css",
        "bitcount.h",
        "Copy of clientlib.js(42).download",
        "Copy of clientlibs(5).css",
        "Copy of clientlib(21).css"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": []
        },
        "other": {
          "adversary": [
            "StealthWorker/GoBrut (The adversary demonstrates advanced telemetry suppression within specialized s",
            "Turla Group, FIN7, APT34, APT28, DragonForce Malaysia Hacker Group, Indonesia Islamic Warriors Counc"
          ],
          "malware_families": [
            "Gc",
            "Internet",
            "Vui",
            "Osreturn",
            "Vasaris",
            "Srpanj",
            "Anda",
            "Md5 hash: f8add7e7161460ea2b1970cf4ca535bf",
            "#fp539598-vbs/loveletter.bt",
            "Esc",
            "Node traffic",
            "Osatomic",
            "Ver",
            "Outubro",
            "Trackingclient",
            "Malware family: stealthworker / gobrut",
            "Rabu",
            "Tente"
          ],
          "industries": [
            "Government",
            "Agriculture",
            "Telecommunications",
            "Education",
            "Construction",
            "Technology",
            "Energy",
            "Healthcare",
            "Chemical",
            "Finance",
            "Transportation",
            "Legal, financial, healthcare, government, municipal, real-estate, enterprise-technology, critical-in",
            "Defense",
            "Biotechnology",
            "Media"
          ]
        }
      }
    },
    "false_positive": []
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 50,
  "pulses": [
    {
      "id": "698e93e1ab02db8c49e8c3ed",
      "name": "\u201cBroken Seal\u201d DocuSign-themed Delivery with Fileless Process Hollowing (Zeppelin/Bloat-A)",
      "description": "Forensic analysis indicates a DocuSign-themed phishing campaign using a deliberately invalid X.509 PKI seal (\u201cBroken Seal\u201d) to trigger fail-open verification logic in automated handlers. The delivery mechanism bypasses Secure Email Gateway (SEG) reputation checks by using encrypted channels and human-gated infrastructure. The payload is a fileless Process Hollowing (RunPE) malware that injects into RWX memory of legitimate processes to evade disk-based EDR.",
      "modified": "2026-04-19T08:11:41.130000",
      "created": "2026-02-13T03:00:49.872000",
      "tags": [
        "Zeppelin, Bloat-A, W32.Bloat-A, Zero-Day-Delivery, Protocol-Devi",
        "9698f46495ce9401c8bcaf9a2afe1598",
        "Imphash: 9698f46495ce9401c8bcaf9a2afe1598 | Imports (additional)",
        "MD5: b47266fef17ad4b2e4ca6ee1d06c39a7 SHA-1: cb92796715c799d7e71",
        "Filename: b47266fef17ad4b2e4ca6ee1d06c39a7.virus File Type: Win3",
        "Compilation / Toolchain Compiler: Microsoft Visual C++ 2017 Link",
        "DocuSign-themed phishing lure Invalid X.509 seal (\u201cBroken Seal\u201d)"
      ],
      "references": [
        "Conversely, Port 443 remains accessible, serving a WordPress-based interface backed by a freshly issued Google Trust Services certificate (Feb 4, 2026). This asymmetric configuration ensures that the structurally invalid X.509 \"Broken Seal\" is only delivered via encrypted channels, while the gated Port 80 tier prevents the discovery of the underlying Zeppelin/Bloat-A redirection logic by non-human-interacted sessions.",
        "Imphash: 9698f46495ce9401c8bcaf9a2afe1598 | Imports (additional): GdipSetSmoothingMode, I_UuidCreate, RpcStringFreeW, UuidCreate, UuidToStringW, InternetCheckConnectionW | Resource: RT_MANIFEST (1, ENGLISH US, SHA-256 4bb79dcea0a901f7d9eac5aa05728ae92acb42e0cb22e5dd14134f4421a3d8df, XML, entropy 4.91)",
        "Observed hosting and routing telemetry indicates the delivery infrastructure is operating through AS209242 (Cloudflare London LLC), suggesting the actor is leveraging Cloudflare\u2019s transit layer for resilience and to reduce direct exposure of origin infrastructure.",
        "Research into the gogetlife.co telemetry confirms a dual-port obfuscation strategy designed to bypass multi-layer security indexing. Forensic HTTP scans identify a Port 80 \"Fail-Closed\" state, where standard web traffic is gated by a Cloudflare-managed 403 Forbidden challenge, effectively neutralizing automated crawlers. Conversely, Port 443 remains accessible, serving a WordPress-based interface backed by a freshly issued Google Trust Services certificate (Feb 4, 2026). This asymmetric configuration ensure",
        "Compilation / Toolchain Compiler: Microsoft Visual C++ 2017 Linker: Microsoft Linker 14.16.27032 IDE: Visual Studio 2017 (15.9) Classification: PEBIN TrID: Win64 EXE (32.2%) / Win32 DLL (20.1%) / Win16 NE (15.4%) PE Section Entropy (Suspicion): .data 7.36 \u2192 high (suggests packing/encryption), .reloc 6.66 \u2192 possible runtime modification, .text 6.01, .rdata 5.88, .rsrc 4.72 Imports (Capabilities): CreateRemoteThread, CreateThread, ExitProcess",
        "Broken Seal exploitation: The invalid X.509 seal appears engineered to exploit verification logic gaps, forcing fail-open behavior and allowing SEG bypass under certain configurations. Human-gated delivery posture: Cloudflare 403 challenges suggest the actor enforces human interaction before payload delivery, reducing automated discovery and sandbox analysis. Industrialized infrastructure: Correlation across thousands of domains and URLs indicates a highly automated, rotating delivery ecosystem.",
        "MITRE ATT&CK: Process Hollowing (T1055.012): Documentation on the RunPE injection method used by the payload to achieve a fileless state in RWX memory. RFC 5652 - Cryptographic Message Syntax (CMS): This standard defines the structure of the digital signatures that this campaign's \"Broken Seal\" exploit bypasses.",
        "As of Feb 13 (early AM) \u2014 Indicators of Compromise: 17K | Types: Email (30), FileHash-SHA256 (2,146), URL (8,070), Hostname (2,755), Domain (3,528), Other (1,110) | Geo: US (233), Canada (15), China (10), Japan (2), Spain (2), Other (13)",
        "Verification failure observed in automated verification handlers during sandbox replay.",
        "The payload (SHA256: dfff54...4af) achieves a fileless execution state via Process Hollowing (RunPE), injecting into RWX memory regions of legitimate system processes to evade disk-based EDR telemetry. Anti-analysis controls\u2014including Bochs artifact checks, geofencing logic, and direct CPU clock interrogation\u2014are implemented to validate a high-interaction user environment prior to execution.",
        "Multiple antivirus engines flagged the sample with generic heuristic names (e.g., Trojan:Win32/Vigorf.A, Win32:Malware-gen, Trojan.Generic), consistent with multi-engine heuristic detection on VirusTotal.",
        "Malicious sample (SHA256: fa8e2ddfe42e77a9771a7c4d6421c7a808cf4508f8cd6dc6f4cf8bd4e2ae7f8f) detected as TrojanDownloader:Win32/Tugspay.A with YARA hits for Win32_PUA_Domaiq, aPLib, PECompact_2xx and IDS alerts including TLS Handshake Failure + 403 Forbidden, contacting 36 domains (e.g., api.123mediaplayer.com, static.sslsecure1.com) and IPs such as 104.18.23.19 and 193.166.255.171.",
        "SHA256 3d10374b55a18a2dd90d35d28472600496c680a7efab4e772595f735cb062343 identified as Win.Malware.Vtflooder-9783271-0 / Trojan:Win32/Vflooder.B with UPX/Nrv2x packing YARA hits, IDS detections for Win32/Vflooder.B check-in and DOS behavior, and network C2 indicators including 172.66.0.227 and 34.54.88.138.",
        "SHA-256: fc1fedce1419d4e2009828aad8644deca78b4eeed176e5b009797e0eb0d7d3ff \u2014 Detected as Win.Malware.Vtflooder / Trojan:Win32/Vflooder; UPX-packed PE32 executable, with 812 IDS hits (including C2 checkin + HTTP EXE upload).",
        "nationalgrid.com \u2014 Whitelisted domain (US, AS13335 Cloudflare) with 500+ passive DNS entries, 692 URLs, 195 subdomains, and 2 malicious files hosted on IP 104.17.1.192, which is concerning given the infrastructure and trust level.",
        "eversource.com (IP: 159.108.5.46, ASN: AS2024) has 2 flagged malicious files within its infrastructure, despite being whitelisted. The domain hosts 95 subdomains and maintains an active SPF record, indicating potential security risks under an otherwise trusted facade.",
        "Whitelisted IP Address 204.79.197.212 Location  United States ASN AS8068 microsoft corporation Nameservers ns4-205.azure-dns.info. ,  ns1-205.azure-dns.com. More WHOIS Registrar: MarkMonitor, Inc.,   Creation Date: Mar 26, 1996 Related Pulses OTX User-Created Pulses (50) Related Tags 2025 Related Tags 4328 ,  5943 ,  80211 ,  #supportsitewebsiteabuse #rootcertificatefailure #cryptographicf ,  The dynamics of the mudoSOSIntersectalign with sophisticated adv More Indicator Facts 982 malicious files communicat",
        "",
        "The AlienVault OTX report for flypdx.com documents 11 related tags, including ids detections and av detections, across 4 active AWS IP addresses (3.175.34.30\u2013.106). These indicators confirm the airport's network has been flagged for unauthorized activity, specifically pointing to a bridge between their web infrastructure and internal passenger tracking. The display of PII on aviation hardware during my June flight matches a known data-bleeding pattern where Personally Identifiable Information (PII) leaks fr"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "China",
        "United States of America",
        "Spain",
        "Japan",
        "Canada"
      ],
      "malware_families": [],
      "attack_ids": [],
      "industries": [
        "Legal, Financial, Healthcare, Government, Municipal, Real-Estate, Enterprise-Technology, Critical-In"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 11,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 27678,
        "FileHash-SHA256": 47676,
        "FileHash-MD5": 42534,
        "FileHash-SHA1": 23213,
        "hostname": 33703,
        "URL": 75433,
        "SSLCertFingerprint": 30,
        "CVE": 7582,
        "email": 313,
        "FileHash-IMPHASH": 8,
        "CIDR": 26205,
        "JA3": 1,
        "IPv4": 80,
        "URI": 5
      },
      "indicator_count": 284461,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 68,
      "modified_text": "12 hours ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "69b7ac3b32ac89ecba53f3d9",
      "name": "Malicious",
      "description": "",
      "modified": "2026-04-15T08:44:52.171000",
      "created": "2026-03-16T07:07:39.495000",
      "tags": [
        "march",
        "input http",
        "posix shell",
        "ascii text",
        "threat level",
        "summary av",
        "detection",
        "environment",
        "action"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 291,
        "URL": 272,
        "hostname": 296,
        "domain": 293,
        "FileHash-MD5": 90,
        "FileHash-SHA1": 89,
        "CIDR": 3,
        "email": 3,
        "SSLCertFingerprint": 9
      },
      "indicator_count": 1346,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 49,
      "modified_text": "4 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "69b5f9d274bcc1df8e48b1f9",
      "name": "CAPE Sandbox - LEN: 7 needs further review or whatnot.",
      "description": "OB0001\nAnti-Static Analysis\nOB0002\nCredential Access\nOB0005\nDefense Evasion\nOB0006\nDiscovery\nOB0007\nImpact\nOB0008\nExecution\nOB0009\nPersistence\nOB0012\nPrivilege Escalation\nOB0013\nFile System\nOC0001\nMemory\nOC0002\nProcess\nOC0003\nData\nOC0004\nCryptography\nOC0005\nCommunication\nOC0006\nOperating System\nOC0008\nCapabilities\nLinking\nData-Manipulation\nHost-Interaction\nAnti-Analysis\nCollection\nTargeting\nExecutable\nCompiler",
      "modified": "2026-04-14T00:14:29.475000",
      "created": "2026-03-15T00:14:09.815000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 448,
        "FileHash-SHA1": 239,
        "FileHash-SHA256": 219,
        "URL": 36,
        "domain": 48,
        "hostname": 133
      },
      "indicator_count": 1123,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 48,
      "modified_text": "5 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "6992bae83a5988dff8311490",
      "name": "Distributed Credential Exhaustion & C2 Orchestration via Golang-Based StealthWorker (ELF.Agent-VW)",
      "description": "Researcher credit: msudosos, level blue platform----\nThis artifact represents a high-integrity StealthWorker (GoBrut) botnet agent, architected as a statically linked, stripped 32-bit ELF binary to ensure cross-platform environmental independence. The sample utilizes XOR 0x20-encoded JavaScript payloads and String.fromCharCode obfuscation to mask its internal logic and bypass heuristic-based memory scanners. [User Notes] Its operational core is a multi-threaded service bruter targeting SSH, MySQL, and CMS backends, leveraging a massive infrastructure of 1,834 domains and 797 unique IPv4 endpoints for decentralized Command & Control (C2). Network telemetry confirms the use of ICMP and HTTP-based beaconing, indicating a sophisticated retry logic designed to maintain persistence across diverse network topologies. With a malicious file score of 10, this binary serves as a primary vector for large-scale credential harvesting and the subsequent integration of Linux infrastructure into global botnet clusters.",
      "modified": "2026-04-13T23:46:20.071000",
      "created": "2026-02-16T06:36:24.788000",
      "tags": [
        "Obfuscation: XOR-based String Encryption (0x20)",
        "T1110.001 (Brute Force: Password Guessing)",
        "Primary Hash (SHA256): cd3989830da99a69380901769fd78902efb3cd8ba",
        "MD5 Hash: f8add7e7161460ea2b1970cf4ca535bf",
        "#PotentialUS-Origin_FalseFlag_Obfuscation"
      ],
      "references": [
        "Primary Hash (SHA256): cd3989830da99a69380901769fd78902efb3cd8ba5c9390e94bd4333b7fad186",
        "Obfuscation: XOR-based String Encryption (0x20)",
        "T1110.001 (Brute Force: Password Guessing)",
        "This ELF 32-bit LSB artifact is a sophisticated GoBrut/StealthWorker agent, compiled via Golang 1.10 and stripped to obfuscate its high-velocity service-bruting logic. VirusTotal confirms a critical threat profile with 44/65 security vendors flagging the file, which leverages a unique Go BuildID (nGYES3pajdOm...) and a Telfhash (t1f303a0...) for architectural fingerprinting. The binary orchestrates decentralized Command and Control (C2) through an expansive infrastructure of 797 unique IPs and 1,834 domains",
        "Pivot-Ready Indicators (IOCs) Go BuildID: nGYES3pajdOmKy1i6Ghh/KO9ydOtZpXtoKtB0KHE-/iisNoniHgTbj_cV6M-uk/XmMYzkBiZs8NXMRZYTiT Telfhash: t1f303a0b3055d54e8b7f08907c7af7624cef6e0f726d078f169e278d09a72c826626874 Imphash: 9698f46495ce9401c8bcaf9a2afe1598 Vhash: 1e53f1a1b59ecb93f821c74b25d81e9f",
        "Researcher msudosos posits a strategic exploitation of Root Certificate Validation Failures, where the adversary leverages an expired trust chain to bypass heuristic security filters and establish persistence.",
        "his technique allows the GoBrut/StealthWorker agent to circumvent automated revocation checks, enabling its decentralized C2 infrastructure to recruit Linux hosts via high-velocity credential exhaustion.",
        "The local environment exhibits advanced telemetry suppression within specialized skim memory regions, effectively neutralizing standard DMARC validation and Microsoft-integrated defensive protocols.",
        "By maintaining a hollowed root posture, the sample facilitates persistent, low-signal synchronization with external cloud infrastructure while bypassing traditional heuristic trust-chain verification.",
        "The domain prioritywirreles.com (registered via NAMECHEAP INC) shows a 4/93 detection ratio, confirming it is a live but \"low-noise\" C2 node used to avoid broad-spectrum blacklisting",
        "",
        "The environment leverages prioritywirreles.com as a high-fidelity DGA-derived C2 node, utilizing its historical resolution to Russian-hosted IP space (194.61.24.231) to maintain persistent Stealthworker botnet synchronization.",
        "By operating through WhoisGuard-protected infrastructure and exploiting XOR 0x20 obfuscation, the adversary effectively suppresses telemetry into skim space, successfully bypassing DMARC and Microsoft-integrated trust-chain validation.",
        "The pivot from cd398983... to this domain confirms a multi-year campaign (2019\u20132023) utilizing Namecheap-registered infrastructure to orchestrate wide-scale T1110.001 brute-force operations while bypassing standard PKI expiration checks.",
        "LBresearcher: msudosos notes: The campaign's use of T1110.001 (Password Guessing) is specifically tuned to exhaust credentials across SSH, MySQL, and CMS backends, effectively recruiting server infrastructure into a global \"zombie\" network.",
        "LBresearcher: msudosos notes: The threat actor maintains operational longevity by rotating through WhoisGuard-protected nodes like prioritywirreles.com, which historically resolved to Russian-hosted IP space (194.61.24.231) to obfuscate its origin.",
        "LBresearcher: msudosos notes: By exploiting Root Certificate Validation Failures, the StealthWorker (GoBrut) agent ensures that its 32-bit ELF binaries bypass the automated reputation checks enforced by major cloud providers.",
        "Monitor DGA Shifts: Track new domains registered through NAMECHEAP INC using the current WhoisGuard patterns to identify the next cluster before it goes active. Analyze Telfhash Clusters: Use the Telfhash (t1f303a0...) to pivot and find if the adversary has updated to 64-bit ELF or ARM architectures. Harden DMARC: Ensure your environment moves from \"p=none\" to \"p=reject\" to mitigate the internal spoofing loops exploited by this botnet's telemetry suppression.",
        "Persistent C2 Orchestration: This ELF:Agent-VW variant serves as a critical GoBrut node, utilizing XOR 0x20 obfuscation and ICMP/HTTP beaconing to maintain a persistent link across 1,834 domains and 797 unique IPs",
        "Researcher msudosos: This activity appears to facilitate a preliminary reconnaissance phase, possibly utilizing system commands to query /proc/cpuinfo and /proc/version for architectural profiling purposes.",
        "Researcher msudosos suggests the VirusTotal (Tencent HABO) behavior report may indicate a potential execution path from volatile storage at /tmp/EB93A6/996E.elf.",
        "Msudosos Regional Notes: While historical pivots show Russian-hosted nodes, the current dual-origin telemetry\u2014dominated by 181 United States-based endpoints\u2014strongly suggests a domestic-aligned adversary leveraging global 'grey space' to obfuscate its operational core. This massive US-centric footprint (exceeding all other regions combined) reinforces the theory of a false-flag orchestration designed to divert attribution toward foreign infrastructure while abusing legitimate Western-hosted trust chains.",
        "WHOIS data anchors administrative and technical operations for prioritywirreles.com in Los Angeles, CA (90064) via Namecheap infrastructure. Following its 2020 expiration, the domain has transitioned into redemptionPeriod/pendingDelete status, signaling the formal decommissioning of this C2 asset."
      ],
      "public": 1,
      "adversary": "StealthWorker/GoBrut (The adversary demonstrates advanced telemetry suppression within specialized s",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Malware Family: StealthWorker / GoBrut",
          "display_name": "Malware Family: StealthWorker / GoBrut",
          "target": "/malware/Malware Family: StealthWorker / GoBrut"
        },
        {
          "id": "MD5 Hash: f8add7e7161460ea2b1970cf4ca535bf",
          "display_name": "MD5 Hash: f8add7e7161460ea2b1970cf4ca535bf",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1001",
          "name": "Data Obfuscation",
          "display_name": "T1001 - Data Obfuscation"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 5,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 2166,
        "FileHash-SHA1": 2067,
        "FileHash-SHA256": 3371,
        "domain": 13295,
        "URL": 6860,
        "email": 272,
        "hostname": 4705,
        "SSLCertFingerprint": 268,
        "CVE": 107,
        "CIDR": 6
      },
      "indicator_count": 33117,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 62,
      "modified_text": "5 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "69d0ac884cb646fac0b8d3d4",
      "name": "VirusTotal report\n                    for Other-20230212T074754Z-001.zip",
      "description": "<Registrant: 3432650ec337c945 \u00c2\u00a33.5m.>com - is the name of a German domain registered with the United-Domains AG.<pretext>\n\n3 hearts\npure bleeds. sigma shields. commander hunts.\nlegacy puppetmaster suppresses.\nthe octopus is forever tangled.",
      "modified": "2026-04-04T06:43:36.558000",
      "created": "2026-04-04T06:15:36.916000",
      "tags": [
        "date",
        "server",
        "registrar abuse",
        "postal code",
        "registrant name",
        "expiration date",
        "registry domain",
        "registrar iana",
        "registrar url",
        "registrant city",
        "ascii text",
        "javascript",
        "mitre attack",
        "network info",
        "dropped info",
        "file type",
        "processes extra",
        "overview zenbox",
        "linux verdict",
        "guest system",
        "ultimate file",
        "info file",
        "persistence",
        "next",
        "pe file",
        "text format",
        "ansi",
        "ms windows",
        "zip archive",
        "found",
        "crlf line",
        "windows start",
        "default",
        "delphi",
        "code",
        "malicious",
        "windows sandbox",
        "calls clear",
        "ascii",
        "java source",
        "web open",
        "font format",
        "truetype",
        "version",
        "python",
        "cape sandbox",
        "machine summary",
        "report time",
        "machine name",
        "analysis id",
        "machine label",
        "duration",
        "machine manager",
        "kvm os",
        "shutdown",
        "https",
        "shpk",
        "performs dns",
        "t1055 process",
        "layer protocol",
        "overview",
        "title",
        "phishing",
        "loader",
        "script",
        "meta",
        "albania",
        "structured data",
        "artan lenja",
        "street",
        "building",
        "tiran",
        "body",
        "icloud",
        "free",
        "apple",
        "link",
        "style",
        "doctype html",
        "timestamp",
        "sectigo",
        "official",
        "disney",
        "walt disney",
        "countryus",
        "center",
        "head",
        "forbidden",
        "creates",
        "command",
        "clear filters",
        "sigma",
        "verdict"
      ],
      "references": [
        "https://vtbehaviour.commondatastorage.googleapis.com/100a90c0ff019b19f0f2622cfa529d874f580b2ac6257d018e5eb9ab6d861f44_Zenbox%20Linux.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775281711&Signature=G81N%2BSvpl7rLMvDIGLovzSBK8YJzNBOTs7Ycfze1L%2BdFheZX%2BS6EbtlDx545BRgefMUoJSwn%2BdK4eRpYlyMGmHvkv2tw3apezXxBF5J95vedk3RlOzXgGUAvJvewt0RBBR9f9hiVn9CuYTHvY3Cf%2BVog32%2BRLrv8sMhZ%2FeqX0%2FhraP6leNtAta5iUv73pYWeMmdsQ7nX2EvTO7uUvGggX6TmnBhiHHd8E9uCsoPHCTP4i0",
        "https://vtbehaviour.commondatastorage.googleapis.com/100a90c0ff019b19f0f2622cfa529d874f580b2ac6257d018e5eb9ab6d861f44_Zenbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775281734&Signature=3FFHeC27RvCC9623M2f8xoSU4fl9LBd%2FvI%2F98rUNvmdceN4AZjjw77yTU0ApUTXU5FbdCpODVhKi0X4pqDz1pqEP%2FBRLq%2FNhgoRliai6LlD4yhdTtKNi4zrfCDG%2Bd4dRzD5y674IfEPynxGiFOWxc6wiCtl3rhwTPEqisyDqFbvnF57SxrcPoVSzVO3wEtxpCOIw8iAFXdW2zgnnYYbSrbaQBfghKLtFA6r2vP%2Bmrd33YSUiH%2Fe2EqBz",
        "https://vtbehaviour.commondatastorage.googleapis.com/100a90c0ff019b19f0f2622cfa529d874f580b2ac6257d018e5eb9ab6d861f44_VirusTotal%20Jujubox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775281812&Signature=jttp%2BTn66O5EfEB%2FASdpjDONf%2BzydGtfIUy3AtwYz0ppPzVA88%2BzZ8LtzV0TDhkMiju4oLHr%2BauJnKYexqnF0MfNTXGKPfj3ux9oZ2%2Baqve%2B3xgapdwdz0N64RgWo3SBqCKFBOQmi57mqIy%2F8qgnAfdVX99BwF2BuRSYSbIjNW5NHjir1JrAAKwOHZFyNsKj99PImyug2FPpRnss8VrJvDyYdnaGLHIAbZMRl72V",
        "https://vtbehaviour.commondatastorage.googleapis.com/100a90c0ff019b19f0f2622cfa529d874f580b2ac6257d018e5eb9ab6d861f44_Zenbox%20Linux.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775281904&Signature=B9x8BUVCeldkVImU%2Bb%2B7d97Q9Y2suAJFE1HvxBCu6MQUOt52HrgAUTBIeXPKgNP0gKiqrr%2BwDvN7q637Ht6n5C9QhuTPI%2FhWTub0F22jsp8lU2Pvp2bS%2FlaSchLRN5gDngyPABgnaqYERICP8QQkwfaB9pY%2Bii1%2FAeel%2BIDGYwxPPfIcYevejNv2O%2F0J6qYRftrtXwa95pbsecrfOzH6bpF3AzHQrTLJAuZ%2B%2BykW",
        "https://vtbehaviour.commondatastorage.googleapis.com/bc3cc97398d5f56a4731085e8a385694f6ef1ab37243c6c00deed4a1335ced55_Zenbox%20Linux.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775281954&Signature=Tythlx%2B0x7Dzf2SYvJDgwby2Ifinb7IbK5GTx%2ByqvqVc1r4cz7rhoVD3NZqUAgUpxSkIAsRAK5WV5tMXUGiiB6JWp8Y9YmaL7Zhb5NxMBcodk57r7XhYzEbDxYg%2Fh1ChwMliA5cBr%2BXbUcW4q2aA4xQeNE1XVNpalGtyHh8bsDTKgQG0Ch1gikPF%2BeKc2ANprXe6z%2FJBXtqJBxh6%2Bem6fGON6%2BpRP1%2BgmNg4%2FtFnlQ",
        "https://vtbehaviour.commondatastorage.googleapis.com/bc3cc97398d5f56a4731085e8a385694f6ef1ab37243c6c00deed4a1335ced55_CAPE%20Linux.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775281979&Signature=LrquDQAOc%2Bf90O7wkZ9lRNx5uIZopS4VL7qYn7UKkzTI19c7sNJWNdGeBPtnE%2FG4yxsv1tBxkoojr78E808e78vceGG2xskRT6tUTjtDo2c8JW%2FD9Mr5ZAVe8Cn%2BP%2BpCbBkZXbtaceCtVq0b9zVWx9YstN2ju69uofX50LbI%2FgmHh%2Bghta79DgdBrNmkcQEXDu7t%2FqSZSozfso9i%2BoSZdHXEfsU59hoc%2FhUSoPMEPGFU",
        "https://vtbehaviour.commondatastorage.googleapis.com/fa8a59149604c73572bf92b42640de49faa7e8f16cd4bc18345d3e6a16378744_Zenbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775282019&Signature=VwsuvdyY52E5jzftipHSNWVrwmO7YUwSQa9yHiMIgbsXcJDnDNcdELamMXjmvzDn%2FT6L5HguJFyj%2F4DHLmPfddzVphNAKCPvz3IRVae2piJ%2B8VWa2%2B98W3RjMft93LZhdNHwxeEYM8oJ%2FOjAjw%2FIicginJBUwlGeHX3kfTJieSEC7SYf6BkJ4UNfnF2pPQjiaAqG9mop%2FPKsB%2FF1K%2FrL7Rpsxwhl1rGglHYPM4%2BtJj6zDYx%2F",
        "https://vtbehaviour.commondatastorage.googleapis.com/fa8a59149604c73572bf92b42640de49faa7e8f16cd4bc18345d3e6a16378744_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775282044&Signature=Y%2FEJZwm3h4tUuhn9%2FgO7QDcTnUoojZIDnoL%2FuGaoe0o5h%2FPUEiZpyFQLH9JfrvNN0h58UWlcJNCMxaSZl%2BZDvBDliVat0wDr0fE35mo0jGTK3uwa7DykFrjyI0NAVFlzkVSyxC0euM4lSJaw9PqyJGgLb4FfaztkzK7ZQYTIsGMYWSsCAKzatCObwK%2B8nqV63M9VXUeJy8ZQx7IwbttNffD6FQUaPbtCwlsywb%2Bu7NVqkFSG",
        "https://www.icloud.com/attachment/?u=https%3a%2f%2f%cvws.icloud-content.com",
        "https://vtbehaviour.commondatastorage.googleapis.com/ba49f65ef5d694311c535991812ee2fa8f0c639f4e053d136c1161b8b1bfaf8f_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775282803&Signature=CE28%2B8Orp96YBz3AWi4L4LJoj5B677T4lpyJl4VIG%2BN68qLtOorzpmY%2BdQgPcKJxqxcvmf3JmeA2zAZFyVdmEzznUnaiSY6xhbkbZ8nrReWLN9MBQZJuFd6by3aYlQoYFg2Bxu5d%2FLEAxWm4ljnJApBcv1csUNbJ8KxjkdXXAyPkiWPwMc4JDmXrnH5%2FXBQ7Tf1qxmze1lX2S5QvktDVUA3Bdn67nGtMvguY5EIl7tj1AezbuTFM",
        "https://vtbehaviour.commondatastorage.googleapis.com/68e1e958d101feb1044553d3e8ba341448a17d917e4b613cb05873814159ed40_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775282913&Signature=TKCWJVTu8VHNWLhsI%2BkIN06KJgV4R1%2F2oO9G3V2x%2Bdxi14E9JDPHosmNkN%2Fk02BRc0I8Yg4HJPmcxjdAvb8mTCZjA10bizFznZC3epwH0hmoxTVgryMxpD%2B7zTQqKIRpE9UGGC1WSu0CTJ3rI9dCyopLkmeiyJPVw%2BIuERp37p2MEwzwwIPRuYpB190GfOdCkGt6TuMjDG6cVa%2BxvJlEdoEw8US6W8WPaioxSu1KVCoKjwky",
        "https://vtbehaviour.commondatastorage.googleapis.com/ffe3319990984c10c84fc18f6c1d40b2c7ad44666ebc2b54368bd96327ec6abc_Zenbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775283093&Signature=GU02WhsC3g0ztmDdXDNuqx9T9POv8DnaMp7NQX%2B70%2FybCmZtbIpyPiUCOuYG5ZD1RY8bCIR9k%2F%2BGsKSwWLVUNNih3CgvqShoWsNfLKvtS%2BDRbmV6G4ohLWIP0xPHJOCA%2FWvnSdblJ%2FdibwXFCT851RdpfK3f6ph2EPHXIq%2FBwhSc28%2BJfFSMK%2B1toESpR7COi%2FUwpnMfcoSpcIMZudaaU8JrTvEVLgtJ%2FAgHjmfoXxvJlD",
        "https://vtbehaviour.commondatastorage.googleapis.com/02b1749e96b257099d5bafaeb1fc502442b4e064cca63fbcf4fc52af34b6435d_VirusTotal%20Jujubox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775283154&Signature=m%2BGdulpws9rcUoJIzr45sR5qJdIxK89UYb6GUJL6p7n4mgYV69NJWbc3Jslcn117UKHnbSYYtRZSBRhviHhLuWsbhUG199mW8iGDiwaarp%2BbvmEIw6OXF2MgVIh%2FrJYr8slRZbUwjd9t8dMWwn%2FM5DNq6AzLyBqpznrBoVrvlibZuA9pWsHraA3P24WyEGUlbWN3NqLfmJ6gDeCKRfG7zhubGI%2Bb8Wl8GaBCodOtX2LlrA",
        "https://vtbehaviour.commondatastorage.googleapis.com/3e6e0898a7b1b297d2b9322f5f578b02e2fd5d5647dbeef6b9273cda383e1547_Zenbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775283189&Signature=PtLPpZoeHrLkYIaV2etyfYslOxR9PtxqmjNNDdMHoJjBUuweFaoOVGyfkf%2BUGEiGQCogCu7az%2B4btIJ3frL%2BEdzwNV7Ufeb24KQqbVUQrVITPGPCW42mMdsKdDoNQsqLooDqFsjxRGt2meZgP3F3roSTIWDEJPwr35bBBkdANOOdXZG1mg3O8JHm35%2BBQMkSxOiAxeftigjPK7On%2Fk%2FvMli1USxDUfi2eRlkRaL090nKenRXt3cz4FEBe8"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1547",
          "name": "Boot or Logon Autostart Execution",
          "display_name": "T1547 - Boot or Logon Autostart Execution"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1064",
          "name": "Scripting",
          "display_name": "T1064 - Scripting"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1564",
          "name": "Hide Artifacts",
          "display_name": "T1564 - Hide Artifacts"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1095",
          "name": "Non-Application Layer Protocol",
          "display_name": "T1095 - Non-Application Layer Protocol"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1046",
          "name": "Network Service Scanning",
          "display_name": "T1046 - Network Service Scanning"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1574",
          "name": "Hijack Execution Flow",
          "display_name": "T1574 - Hijack Execution Flow"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 359,
        "email": 2,
        "hostname": 664,
        "URL": 794,
        "FileHash-SHA256": 827,
        "FileHash-MD5": 21,
        "FileHash-SHA1": 17,
        "IPv4": 187
      },
      "indicator_count": 2871,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 48,
      "modified_text": "15 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "69cf461ebc1a9bcfbffa2aad",
      "name": "VirusTotal Droidy Android Sandbox",
      "description": "Here is the full list of results from the second day of the 2016 Android World Championship, held at 22:00 BST on Tuesday, 1 July.. . and \u00c2\u00a31.\n\ni cant add this one - legacy - http://100tosdefotos.com/",
      "modified": "2026-04-03T05:08:23.191000",
      "created": "2026-04-03T04:46:22.211000",
      "tags": [
        "process",
        "current object",
        "android sandbox",
        "europemadrid",
        "windows sandbox",
        "clear filters",
        "has permission",
        "file type",
        "apks",
        "accesses",
        "sim provider",
        "name",
        "may check",
        "mitre attack",
        "network info",
        "malicious",
        "persistence",
        "cloud",
        "chrome cache",
        "png image",
        "cache entry",
        "rgba",
        "entry",
        "web open",
        "font format",
        "version",
        "truetype",
        "next",
        "detail info",
        "text",
        "classname",
        "window",
        "static",
        "behaviour",
        "filename",
        "offset",
        "class",
        "button",
        "mozilla",
        "shell",
        "nsis",
        "find",
        "back",
        "state",
        "connecting",
        "connected",
        "suspended",
        "disconnected",
        "unknown",
        "shell folders",
        "default",
        "inprocserver32",
        "new roman",
        "registry keys",
        "nothing",
        "shell dlg",
        "roman baltic186",
        "roman cyr204",
        "roman tur162",
        "xffxfea xffxfea",
        "xffu xffu",
        "xffxfcs xffxfcs",
        "x8af x8af",
        "xb6p xb6p",
        "xb6y xb6y",
        "x88g x88g",
        "xb6xf2 xb6xf2",
        "xfft",
        "xc1xe7 xc1xe7",
        "axec",
        "programfiles",
        "allusersprofile",
        "windir",
        "protocol level",
        "application",
        "previous",
        "next connection",
        "address",
        "full path",
        "behavior",
        "bits",
        "dump",
        "path",
        "calls clear",
        "eandroidruntime",
        "pufwifi",
        "flag",
        "networkinfo",
        "action",
        "extras",
        "start",
        "componentname",
        "write",
        "calls process",
        "cname",
        "file size",
        "mwdb",
        "bazaar",
        "sha3384",
        "ssdeep",
        "address virtual",
        "path c",
        "sha256",
        "accept",
        "shutdown",
        "error",
        "sandbox",
        "stack",
        "win32 exe",
        "pe32",
        "intel",
        "ms windows",
        "win16 ne",
        "os2 executable",
        "generic windos",
        "executable",
        "dos executable",
        "generic",
        "processes extra",
        "performs dns",
        "t1055 process",
        "overview",
        "overview zenbox",
        "verdict",
        "guest system",
        "ultimate file",
        "android",
        "zip archive",
        "xapk android",
        "android package",
        "java archive",
        "sweet home",
        "design",
        "html document",
        "unicode text",
        "utf8 text",
        "crlf",
        "lf line",
        "language",
        "date mon",
        "gmt contenttype",
        "connection",
        "link",
        "json",
        "xlitespeedcache",
        "reportto",
        "server",
        "contentencoding",
        "cfray",
        "king88",
        "ch cng",
        "c thit",
        "c bit",
        "iu hp",
        "trang ch",
        "king88 com",
        "ci ng",
        "cp s",
        "c vit",
        "object",
        "string",
        "number",
        "null",
        "function",
        "g5wmgjr5qk4",
        "cssselector",
        "regexp",
        "date",
        "void",
        "trident",
        "mini",
        "meta",
        "please",
        "javascript",
        "members",
        "staff",
        "inspection",
        "abip",
        "local broadcast",
        "newsletter fcc",
        "resource center",
        "marshfield high",
        "school",
        "localism join",
        "facebook",
        "contact",
        "summer",
        "grave",
        "email",
        "photo",
        "strong",
        "peter deftos",
        "sign",
        "learn",
        "memorial",
        "leave",
        "problem",
        "done",
        "already",
        "close",
        "verify",
        "twitter",
        "details",
        "full",
        "persist",
        "editorimpl"
      ],
      "references": [
        "https://vtbehaviour.commondatastorage.googleapis.com/a0fb314babd51dbc460ab126b615da4c6f9481f5d1225d0ac189da9d99923bb3_VirusTotal%20Droidy.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775189779&Signature=KfMCCyf96T3bMlo9SpmV1KGK0zKBbkhhSc6Ig5Hvwfx%2FTKTqEVBDXB28XNeWzWbCRTwCNnYlHV3Ed%2BMjcd%2B1aCTDYi5GH9Qw3msxqk5iKwRhzDIhfpM98SwOLC%2B7xZUAC60ecDmVDsjA9OOwOkJe87q3Rrx2lrU9%2BjuSJ1EdwI16qoJyd29sLcX7STTqAMHuzCjIixIOre64HAjpH4lt%2F8tSgE1A5Rs2V7PRHSX6ibKLD",
        "https://vtbehaviour.commondatastorage.googleapis.com/a0fb314babd51dbc460ab126b615da4c6f9481f5d1225d0ac189da9d99923bb3_VirusTotal%20R2DBox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775189811&Signature=O96heM5BVAaltXSZInHXgIgK35KjLrLg%2FfKtFXVS%2BoRHTlfpZtn4LpFvolATpK7dED66Ms7SXpn8nX0i7j1IpuDOXOXSm112TOKIKVVPZJH5ppCD6uFYvhkfNcQGa%2FXK%2BDixyM%2BuqwGoJSFD6QzP8J2Iz1GyU4RYYWuB2C7ZD7LOWKlvxF%2F9LTAX8jFDLgFVsE3Og3cU8y3jK%2BenDPthRM6YFu3qewxpti7KVNwKeMJ",
        "https://vtbehaviour.commondatastorage.googleapis.com/a0fb314babd51dbc460ab126b615da4c6f9481f5d1225d0ac189da9d99923bb3_Zenbox%20android.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775189872&Signature=P%2Fa2KXhuVwj4RO8cyfIpkYofLKzsLiKRPHuVAi7hjApskLh84OqCfKuK51z7bTKZd8lCCiQ7XuIaxWQDR7qzDFvuCWutobNhKDdHSDLrTMtqqX3o5RmBpSzMUw3jQJcbxsYWqaOMHy8ZeWEVRuB9orvLwMZbJMMIJM8GhUVHZ6%2BwciVIoj0lYTCb%2FEEkQWTV4g3hs9l8KRzbEfvJGja6ANuv1OtdFLk8pejrraAJMB7ThsjINOXbJb",
        "https://vtbehaviour.commondatastorage.googleapis.com/5dae281deccea2c5229861b4f2ff8c386da1726a836839961311896a6c9f5a69_Zenbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775189913&Signature=KduKv0QQf8IKhUUAV%2F0zpzpUmIU%2BEctpJKxUJlyu0Myu11iCQCXfXPprtMBAv5ifc4GLTHDiIuEAJwg%2B%2BHGWjun5ZKLKzoz8Ot2udHqFxvy6ZToPEC4Iui9vdRDHqosVaT77R1Tm1TGuyKVmwYTcow4klVAcpzEWanzWx1jHS42ARepJVrS3AFXHMaaBdTgr23jXcbmly1t3b8lwVilcsk2itdoprPpClQTzwYr1y7YV1%2FbYTDGocHnDwCYy",
        "https://vtbehaviour.commondatastorage.googleapis.com/37efacb8411234dd9882d8d3a8709f492eb2ed252132da099a11be07c0b4ccb0_Tencent%20HABO.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775189954&Signature=2gy%2BsyEM78P6orDGWKQU%2FFPSIdVK9X7o8Nkcwb%2BY4r%2FCb%2Bo9JmA9T%2Bfonw9IqbojQSIK%2BNShZUJJ9GV4wWT5l1QfkYfZP0MJ91%2BkDw39PLOc4VVgmBApIQJRTIlgSlI020YfOeIPoIYH8yuCF2dJ32zKg87g0dDFkg4zbExGDJB3%2BGDxX5MJ6hHuzVrwxm7E1L%2F%2FffKQ%2B9rXqoT0hRHEdPSaXSydmnqfMfnjCv",
        "https://vtbehaviour.commondatastorage.googleapis.com/970fdc4da66bc8fff977698c150fc6ebdf9488356ed41ded52d2659830ec5353_VirusTotal%20Droidy.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775189984&Signature=f%2FZZkKTu5zUihkCuCj%2F0pEGmBjWWBiZRDmREgGkkkKvTyR7M5iC0oLGYfaL6WibiUB6pQirxgBtEcS2JtupD291Or3j7%2BKoyngW7R9uf%2FjjWQwfC5YHKjNutT6K5TYuEmzySVs9onhIBSjj4U%2Bi2q%2FMJmQFiDtFZHfcyy00LYqbAbBwEAUnVJZUdH6FvNBu4ArU26VDLDwv1nMSgEjxUWBCwiP4HXlwL5%2BxU6y0eTc2",
        "https://vtbehaviour.commondatastorage.googleapis.com/37efacb8411234dd9882d8d3a8709f492eb2ed252132da099a11be07c0b4ccb0_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775190004&Signature=Nzt9YHY3Ji2VsLO1kvr7%2FyWWwOgo%2BCIoXyjtyshhzTGRxGzhcNdyKU9byPqyv%2F5YAzj%2BmNnDego3ImYeToBCbgyY%2BJJMmUKX6ZrUT1a2O4gv9eMyysIFgYhJ7ZpzyGIvHR5VSJlzPX0AWS81Ml7syDCjTGHikZ9G%2B%2B0cfDA0dhp%2FR7zhAp7yxB2jsDhz1kDY3nncYpjeVtj2o02Nt4JxPa5ML%2FvKBF%2FBHtOtBCqh%2",
        "https://vtbehaviour.commondatastorage.googleapis.com/1256f3aa5f091ac40a573113fcc1a4d0e320af5ee363b0eca79618602cb7dc66_Yomi%20Hunter.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775190083&Signature=a1bnyt5OUcTN8ONeNVqbY%2Fe%2FDVJ2N3olQ9r59dijMLLegF84xQDghj0r6VPdFB8fc%2B3QTcJqhpm6vag1pK9us%2F3UqDJ3Yubf%2FukjL4GMKXDdMSggljB7d%2FpkTraQysnttspVal56LzXitjgIEGYZTidKcIv5LM6YH4zCAXn%2BVueaBNIgpcDS0RuX8fVAQYOeftW9AiEz2TZzx1BT6KUgoj0Tzetn4k541357bb58K1w9n9QV1",
        "https://vtbehaviour.commondatastorage.googleapis.com/1256f3aa5f091ac40a573113fcc1a4d0e320af5ee363b0eca79618602cb7dc66_Dr.Web%20vxCube.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775190146&Signature=3XpRLUQ3g712Vw0Gv1aflVxZs7RKpzIhEK8giO9ydwOrOGjLnAK89Y%2BmEf4g2U2YbO04EE%2BcdR5xPgcch1%2B1Gf4thYCgBcbKEEIfNK5UrJwBpAkYRm3D9xsnD%2FVxZt26yLC6aQy87D%2FKNC9aLvViRHGxuFgOp4zkcU%2BRD6mmpIB8SpX5%2BDpocWc4s9R%2BywRPXZ2U2E49g81i%2B5io3Ycqe8ikdjbPlZo9R0KEFLaDQtH",
        "https://vtbehaviour.commondatastorage.googleapis.com/37efacb8411234dd9882d8d3a8709f492eb2ed252132da099a11be07c0b4ccb0_VirusTotal%20Jujubox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775190199&Signature=RiO2p%2BBvc38TqeTuiMJNxoT6Jr3JfHvTQFQIk94ZaRY%2FPP5yEPSH45GncMCh4GqP1%2F%2BNLR2IVm5Z2svEWojLwxq%2Fl0eIAWy1chUQmg2GcEg5YoaEEnXpWjb1er08EIYwV0ZC8parFwVrr194MKeUmZYo5NLYk4%2BCim9ipnxYse12eROsMSXZtyS4daGivzQzihRqTUU9iEn%2FxAKEOI%2F3V8JRrqNy3nDqmo1mdoVr",
        "https://vtbehaviour.commondatastorage.googleapis.com/bc20f137a2281fae2ee13f698e613e72c37f6b4eb6784653f284f11f4d83ba77_Tencent%20HABO.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775190236&Signature=Fg7jPZWmHQO%2BH8GRQx%2FxSMq5Na7Oo9cN0HR99DHFY8svYTkPoerGELKx7Sf906aTDq2Rer45ajXeYPzzHTiab9NKqWR1JGHbaq0WapVqsRzvXz2QLuBhHoz50tIoVKnx8ZrN9HqHBQweg8nfN%2FWEoaHVlSgav3jhoNTnZAC%2Fa%2BsTLexjXFBIP2v4jpISAl82ESU%2FGZH64BtZpgIJz7RZXdDqZ3LF7JTgwG2JX94%2BOOSn3G14",
        "https://vtbehaviour.commondatastorage.googleapis.com/5dae281deccea2c5229861b4f2ff8c386da1726a836839961311896a6c9f5a69_VirusTotal%20Jujubox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775190298&Signature=eEF6m7QHRnKk%2FYB374HxqU2TE0p8gXC9CWwIHPT7M6fEZKjeFUEmUEbqdupsD2hQQbkW%2Fmijo2rSEQ30q3EAyR9aQO3m6L91A6osc3kDipeyZqFrIqoj6wIe8MJGuRf4OC9cVAWipGYXPG5bqc3v6RUHir9MeLOggoGjalexCwBgs3SsGyhqU1uWZdJ%2Fs4nUbHyIJGc3FB9OrnhDRuGPdkfPSOA09hfujcul91zQNws4dznvmM",
        "https://vtbehaviour.commondatastorage.googleapis.com/a0fb314babd51dbc460ab126b615da4c6f9481f5d1225d0ac189da9d99923bb3_VirusTotal%20Droidy.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775190345&Signature=33%2BM36uNOvEfi8bNtJvnbxcTgcnoIlIO2vBglXpCJFNwC8HAewGOF91Q26TOAsw4sbmtTxQ2F5Q2jv2V3ULV8MAxxgYVptJ69SusRt7qZeBDUpMY%2BOdTYqjkdBuYUqYiCvM756aQheS1KvDepeD64x8e%2FivWkpm%2BZ9yDaKUc7w2143zYkc8kpyBSsO8rJI9vyoHYvbr4sfZOowoUWK7yMjQD9SN5bL%2FFABbMrPEOMyobApm",
        "https://vtbehaviour.commondatastorage.googleapis.com/06b6d62477011fa63fdb44046351fbe574391916a4f3ea0486b3e3498145a7d7_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775190407&Signature=Y3EAa%2Fwo4ligJHfBUxkzWLjU9FPLyNmsxeNdcPCIPQBYTTGUIaFddrFIYHFhawxMDvixd7uA0qGc0zVDWgbStf2qhTOU1D0aF%2F%2BSLSXEY3VB8oWRXZCEI12zrSd5P4lHInxRS3CJKbNnJP4GvYx20ctpNSo4u%2FvVMLM%2B92TiYCunAVTquDVrFNNim6LJTEz2ucjhcgF2gKn%2FF0f9ALEheC1lk4omwpcYEPQLNX0wNsxNC%2BWQ",
        "https://vtbehaviour.commondatastorage.googleapis.com/bb46c18b5b2c98937c8fdfb7acd3e0fa4d0534cfc44d4b41ccd6db9198266fbf_Zenbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775190605&Signature=Rcvj5v%2By7yAX52ap8q3zDGTMjVRQm1LkjuWyhDQUaO6QXR1Ld%2F1dD2QjluOGOuXNiW%2FMNP%2Bqj%2Bx6KtYCvttE847keFo1Em2Bm%2F8bv4vK%2FJL0nGIiz%2FatgO7O78LZZ1wkYwcfG5JZAj8VdjDlHQbuOIUz8Nahqt2JUyQ84z3OeH5d3%2BjV8NKW5SjGWQw4mcmjPQXUznoCsysLbjCd5sgZTpyLUdeFJcNKQPiNBURsJeiyCI5llz0j",
        "https://www.googletagmanager.com/gtag/js?id=GT-NNS2QH6C",
        "https://www.googletagmanager.com/ns.html?id=GTM-PHWTRTJ",
        "https://www.virustotal.com/gui/url/f6db0235760bd467ca822ad515a8410121fde4713501b3e718b8fb127dfa259c?nocache=1",
        "https://www.massbroadcasters.org/eeo-organizations/marshfield-high-school",
        "https://www.findagrave.com/memorial/139047900/peter-deftos",
        "https://vtbehaviour.commondatastorage.googleapis.com/a041cbdeb64c802bde90e06f25213524b2eac500d6000da7e4caeb96e5de1991_VirusTotal%20Droidy.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775191439&Signature=evxsL1kaOuLe5KziYCSqZ56H%2FqXRQgEN0tkJo0j5G7JQ3mmO0Kav5K9LCz%2FUEzi%2BdtB%2B3%2B7VM6r9pC%2BMh7nHxT%2Bs8UAYuVXPE%2FUbBdHWMjvZQuqrZ0hHqIR2xHVB132HiYQWLo%2FgS1QATOfAcHci3X4FqmqvUp7A%2FmNsE1aVFbLc971RHQOuTapOGhiDZlVUyA9KvpMDKw0DzdeHFSlayBSrDDsWL7xW06XOf"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1016",
          "name": "System Network Configuration Discovery",
          "display_name": "T1016 - System Network Configuration Discovery"
        },
        {
          "id": "T1406",
          "name": "Obfuscated Files or Information",
          "display_name": "T1406 - Obfuscated Files or Information"
        },
        {
          "id": "T1409",
          "name": "Access Stored Application Data",
          "display_name": "T1409 - Access Stored Application Data"
        },
        {
          "id": "T1412",
          "name": "Capture SMS Messages",
          "display_name": "T1412 - Capture SMS Messages"
        },
        {
          "id": "T1413",
          "name": "Access Sensitive Data in Device Logs",
          "display_name": "T1413 - Access Sensitive Data in Device Logs"
        },
        {
          "id": "T1414",
          "name": "Capture Clipboard Data",
          "display_name": "T1414 - Capture Clipboard Data"
        },
        {
          "id": "T1418",
          "name": "Application Discovery",
          "display_name": "T1418 - Application Discovery"
        },
        {
          "id": "T1421",
          "name": "System Network Connections Discovery",
          "display_name": "T1421 - System Network Connections Discovery"
        },
        {
          "id": "T1422",
          "name": "System Network Configuration Discovery",
          "display_name": "T1422 - System Network Configuration Discovery"
        },
        {
          "id": "T1424",
          "name": "Process Discovery",
          "display_name": "T1424 - Process Discovery"
        },
        {
          "id": "T1426",
          "name": "System Information Discovery",
          "display_name": "T1426 - System Information Discovery"
        },
        {
          "id": "T1429",
          "name": "Capture Audio",
          "display_name": "T1429 - Capture Audio"
        },
        {
          "id": "T1430",
          "name": "Location Tracking",
          "display_name": "T1430 - Location Tracking"
        },
        {
          "id": "T1432",
          "name": "Access Contact List",
          "display_name": "T1432 - Access Contact List"
        },
        {
          "id": "T1439",
          "name": "Eavesdrop on Insecure Network Communication",
          "display_name": "T1439 - Eavesdrop on Insecure Network Communication"
        },
        {
          "id": "T1447",
          "name": "Delete Device Data",
          "display_name": "T1447 - Delete Device Data"
        },
        {
          "id": "T1472",
          "name": "Generate Fraudulent Advertising Revenue",
          "display_name": "T1472 - Generate Fraudulent Advertising Revenue"
        },
        {
          "id": "T1507",
          "name": "Network Information Discovery",
          "display_name": "T1507 - Network Information Discovery"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1523",
          "name": "Evade Analysis Environment",
          "display_name": "T1523 - Evade Analysis Environment"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1189",
          "name": "Drive-by Compromise",
          "display_name": "T1189 - Drive-by Compromise"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1095",
          "name": "Non-Application Layer Protocol",
          "display_name": "T1095 - Non-Application Layer Protocol"
        },
        {
          "id": "T1574",
          "name": "Hijack Execution Flow",
          "display_name": "T1574 - Hijack Execution Flow"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 70,
        "FileHash-SHA1": 40,
        "FileHash-SHA256": 549,
        "URL": 344,
        "domain": 292,
        "hostname": 443,
        "IPv4": 127
      },
      "indicator_count": 1865,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 49,
      "modified_text": "16 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "69cf461ceb2e58f5e3c0a44d",
      "name": "VirusTotal Droidy Android Sandbox",
      "description": "Here is the full list of results from the second day of the 2016 Android World Championship, held at 22:00 BST on Tuesday, 1 July.. . and \u00c2\u00a31.\n\ni cant add this one - legacy - http://100tosdefotos.com/",
      "modified": "2026-04-03T04:48:04.475000",
      "created": "2026-04-03T04:46:20.102000",
      "tags": [
        "process",
        "current object",
        "android sandbox",
        "europemadrid",
        "windows sandbox",
        "clear filters",
        "has permission",
        "file type",
        "apks",
        "accesses",
        "sim provider",
        "name",
        "may check",
        "mitre attack",
        "network info",
        "malicious",
        "persistence",
        "cloud",
        "chrome cache",
        "png image",
        "cache entry",
        "rgba",
        "entry",
        "web open",
        "font format",
        "version",
        "truetype",
        "next",
        "detail info",
        "text",
        "classname",
        "window",
        "static",
        "behaviour",
        "filename",
        "offset",
        "class",
        "button",
        "mozilla",
        "shell",
        "nsis",
        "find",
        "back",
        "state",
        "connecting",
        "connected",
        "suspended",
        "disconnected",
        "unknown",
        "shell folders",
        "default",
        "inprocserver32",
        "new roman",
        "registry keys",
        "nothing",
        "shell dlg",
        "roman baltic186",
        "roman cyr204",
        "roman tur162",
        "xffxfea xffxfea",
        "xffu xffu",
        "xffxfcs xffxfcs",
        "x8af x8af",
        "xb6p xb6p",
        "xb6y xb6y",
        "x88g x88g",
        "xb6xf2 xb6xf2",
        "xfft",
        "xc1xe7 xc1xe7",
        "axec",
        "programfiles",
        "allusersprofile",
        "windir",
        "protocol level",
        "application",
        "previous",
        "next connection",
        "address",
        "full path",
        "behavior",
        "bits",
        "dump",
        "path",
        "calls clear",
        "eandroidruntime",
        "pufwifi",
        "flag",
        "networkinfo",
        "action",
        "extras",
        "start",
        "componentname",
        "write",
        "calls process",
        "cname",
        "file size",
        "mwdb",
        "bazaar",
        "sha3384",
        "ssdeep",
        "address virtual",
        "path c",
        "sha256",
        "accept",
        "shutdown",
        "error",
        "sandbox",
        "stack",
        "win32 exe",
        "pe32",
        "intel",
        "ms windows",
        "win16 ne",
        "os2 executable",
        "generic windos",
        "executable",
        "dos executable",
        "generic",
        "processes extra",
        "performs dns",
        "t1055 process",
        "overview",
        "overview zenbox",
        "verdict",
        "guest system",
        "ultimate file",
        "android",
        "zip archive",
        "xapk android",
        "android package",
        "java archive",
        "sweet home",
        "design",
        "html document",
        "unicode text",
        "utf8 text",
        "crlf",
        "lf line",
        "language",
        "date mon",
        "gmt contenttype",
        "connection",
        "link",
        "json",
        "xlitespeedcache",
        "reportto",
        "server",
        "contentencoding",
        "cfray",
        "king88",
        "ch cng",
        "c thit",
        "c bit",
        "iu hp",
        "trang ch",
        "king88 com",
        "ci ng",
        "cp s",
        "c vit",
        "object",
        "string",
        "number",
        "null",
        "function",
        "g5wmgjr5qk4",
        "cssselector",
        "regexp",
        "date",
        "void",
        "trident",
        "mini",
        "meta",
        "please",
        "javascript",
        "members",
        "staff",
        "inspection",
        "abip",
        "local broadcast",
        "newsletter fcc",
        "resource center",
        "marshfield high",
        "school",
        "localism join",
        "facebook",
        "contact",
        "summer",
        "grave",
        "email",
        "photo",
        "strong",
        "peter deftos",
        "sign",
        "learn",
        "memorial",
        "leave",
        "problem",
        "done",
        "already",
        "close",
        "verify",
        "twitter",
        "details",
        "full",
        "persist",
        "editorimpl"
      ],
      "references": [
        "https://vtbehaviour.commondatastorage.googleapis.com/a0fb314babd51dbc460ab126b615da4c6f9481f5d1225d0ac189da9d99923bb3_VirusTotal%20Droidy.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775189779&Signature=KfMCCyf96T3bMlo9SpmV1KGK0zKBbkhhSc6Ig5Hvwfx%2FTKTqEVBDXB28XNeWzWbCRTwCNnYlHV3Ed%2BMjcd%2B1aCTDYi5GH9Qw3msxqk5iKwRhzDIhfpM98SwOLC%2B7xZUAC60ecDmVDsjA9OOwOkJe87q3Rrx2lrU9%2BjuSJ1EdwI16qoJyd29sLcX7STTqAMHuzCjIixIOre64HAjpH4lt%2F8tSgE1A5Rs2V7PRHSX6ibKLD",
        "https://vtbehaviour.commondatastorage.googleapis.com/a0fb314babd51dbc460ab126b615da4c6f9481f5d1225d0ac189da9d99923bb3_VirusTotal%20R2DBox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775189811&Signature=O96heM5BVAaltXSZInHXgIgK35KjLrLg%2FfKtFXVS%2BoRHTlfpZtn4LpFvolATpK7dED66Ms7SXpn8nX0i7j1IpuDOXOXSm112TOKIKVVPZJH5ppCD6uFYvhkfNcQGa%2FXK%2BDixyM%2BuqwGoJSFD6QzP8J2Iz1GyU4RYYWuB2C7ZD7LOWKlvxF%2F9LTAX8jFDLgFVsE3Og3cU8y3jK%2BenDPthRM6YFu3qewxpti7KVNwKeMJ",
        "https://vtbehaviour.commondatastorage.googleapis.com/a0fb314babd51dbc460ab126b615da4c6f9481f5d1225d0ac189da9d99923bb3_Zenbox%20android.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775189872&Signature=P%2Fa2KXhuVwj4RO8cyfIpkYofLKzsLiKRPHuVAi7hjApskLh84OqCfKuK51z7bTKZd8lCCiQ7XuIaxWQDR7qzDFvuCWutobNhKDdHSDLrTMtqqX3o5RmBpSzMUw3jQJcbxsYWqaOMHy8ZeWEVRuB9orvLwMZbJMMIJM8GhUVHZ6%2BwciVIoj0lYTCb%2FEEkQWTV4g3hs9l8KRzbEfvJGja6ANuv1OtdFLk8pejrraAJMB7ThsjINOXbJb",
        "https://vtbehaviour.commondatastorage.googleapis.com/5dae281deccea2c5229861b4f2ff8c386da1726a836839961311896a6c9f5a69_Zenbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775189913&Signature=KduKv0QQf8IKhUUAV%2F0zpzpUmIU%2BEctpJKxUJlyu0Myu11iCQCXfXPprtMBAv5ifc4GLTHDiIuEAJwg%2B%2BHGWjun5ZKLKzoz8Ot2udHqFxvy6ZToPEC4Iui9vdRDHqosVaT77R1Tm1TGuyKVmwYTcow4klVAcpzEWanzWx1jHS42ARepJVrS3AFXHMaaBdTgr23jXcbmly1t3b8lwVilcsk2itdoprPpClQTzwYr1y7YV1%2FbYTDGocHnDwCYy",
        "https://vtbehaviour.commondatastorage.googleapis.com/37efacb8411234dd9882d8d3a8709f492eb2ed252132da099a11be07c0b4ccb0_Tencent%20HABO.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775189954&Signature=2gy%2BsyEM78P6orDGWKQU%2FFPSIdVK9X7o8Nkcwb%2BY4r%2FCb%2Bo9JmA9T%2Bfonw9IqbojQSIK%2BNShZUJJ9GV4wWT5l1QfkYfZP0MJ91%2BkDw39PLOc4VVgmBApIQJRTIlgSlI020YfOeIPoIYH8yuCF2dJ32zKg87g0dDFkg4zbExGDJB3%2BGDxX5MJ6hHuzVrwxm7E1L%2F%2FffKQ%2B9rXqoT0hRHEdPSaXSydmnqfMfnjCv",
        "https://vtbehaviour.commondatastorage.googleapis.com/970fdc4da66bc8fff977698c150fc6ebdf9488356ed41ded52d2659830ec5353_VirusTotal%20Droidy.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775189984&Signature=f%2FZZkKTu5zUihkCuCj%2F0pEGmBjWWBiZRDmREgGkkkKvTyR7M5iC0oLGYfaL6WibiUB6pQirxgBtEcS2JtupD291Or3j7%2BKoyngW7R9uf%2FjjWQwfC5YHKjNutT6K5TYuEmzySVs9onhIBSjj4U%2Bi2q%2FMJmQFiDtFZHfcyy00LYqbAbBwEAUnVJZUdH6FvNBu4ArU26VDLDwv1nMSgEjxUWBCwiP4HXlwL5%2BxU6y0eTc2",
        "https://vtbehaviour.commondatastorage.googleapis.com/37efacb8411234dd9882d8d3a8709f492eb2ed252132da099a11be07c0b4ccb0_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775190004&Signature=Nzt9YHY3Ji2VsLO1kvr7%2FyWWwOgo%2BCIoXyjtyshhzTGRxGzhcNdyKU9byPqyv%2F5YAzj%2BmNnDego3ImYeToBCbgyY%2BJJMmUKX6ZrUT1a2O4gv9eMyysIFgYhJ7ZpzyGIvHR5VSJlzPX0AWS81Ml7syDCjTGHikZ9G%2B%2B0cfDA0dhp%2FR7zhAp7yxB2jsDhz1kDY3nncYpjeVtj2o02Nt4JxPa5ML%2FvKBF%2FBHtOtBCqh%2",
        "https://vtbehaviour.commondatastorage.googleapis.com/1256f3aa5f091ac40a573113fcc1a4d0e320af5ee363b0eca79618602cb7dc66_Yomi%20Hunter.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775190083&Signature=a1bnyt5OUcTN8ONeNVqbY%2Fe%2FDVJ2N3olQ9r59dijMLLegF84xQDghj0r6VPdFB8fc%2B3QTcJqhpm6vag1pK9us%2F3UqDJ3Yubf%2FukjL4GMKXDdMSggljB7d%2FpkTraQysnttspVal56LzXitjgIEGYZTidKcIv5LM6YH4zCAXn%2BVueaBNIgpcDS0RuX8fVAQYOeftW9AiEz2TZzx1BT6KUgoj0Tzetn4k541357bb58K1w9n9QV1",
        "https://vtbehaviour.commondatastorage.googleapis.com/1256f3aa5f091ac40a573113fcc1a4d0e320af5ee363b0eca79618602cb7dc66_Dr.Web%20vxCube.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775190146&Signature=3XpRLUQ3g712Vw0Gv1aflVxZs7RKpzIhEK8giO9ydwOrOGjLnAK89Y%2BmEf4g2U2YbO04EE%2BcdR5xPgcch1%2B1Gf4thYCgBcbKEEIfNK5UrJwBpAkYRm3D9xsnD%2FVxZt26yLC6aQy87D%2FKNC9aLvViRHGxuFgOp4zkcU%2BRD6mmpIB8SpX5%2BDpocWc4s9R%2BywRPXZ2U2E49g81i%2B5io3Ycqe8ikdjbPlZo9R0KEFLaDQtH",
        "https://vtbehaviour.commondatastorage.googleapis.com/37efacb8411234dd9882d8d3a8709f492eb2ed252132da099a11be07c0b4ccb0_VirusTotal%20Jujubox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775190199&Signature=RiO2p%2BBvc38TqeTuiMJNxoT6Jr3JfHvTQFQIk94ZaRY%2FPP5yEPSH45GncMCh4GqP1%2F%2BNLR2IVm5Z2svEWojLwxq%2Fl0eIAWy1chUQmg2GcEg5YoaEEnXpWjb1er08EIYwV0ZC8parFwVrr194MKeUmZYo5NLYk4%2BCim9ipnxYse12eROsMSXZtyS4daGivzQzihRqTUU9iEn%2FxAKEOI%2F3V8JRrqNy3nDqmo1mdoVr",
        "https://vtbehaviour.commondatastorage.googleapis.com/bc20f137a2281fae2ee13f698e613e72c37f6b4eb6784653f284f11f4d83ba77_Tencent%20HABO.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775190236&Signature=Fg7jPZWmHQO%2BH8GRQx%2FxSMq5Na7Oo9cN0HR99DHFY8svYTkPoerGELKx7Sf906aTDq2Rer45ajXeYPzzHTiab9NKqWR1JGHbaq0WapVqsRzvXz2QLuBhHoz50tIoVKnx8ZrN9HqHBQweg8nfN%2FWEoaHVlSgav3jhoNTnZAC%2Fa%2BsTLexjXFBIP2v4jpISAl82ESU%2FGZH64BtZpgIJz7RZXdDqZ3LF7JTgwG2JX94%2BOOSn3G14",
        "https://vtbehaviour.commondatastorage.googleapis.com/5dae281deccea2c5229861b4f2ff8c386da1726a836839961311896a6c9f5a69_VirusTotal%20Jujubox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775190298&Signature=eEF6m7QHRnKk%2FYB374HxqU2TE0p8gXC9CWwIHPT7M6fEZKjeFUEmUEbqdupsD2hQQbkW%2Fmijo2rSEQ30q3EAyR9aQO3m6L91A6osc3kDipeyZqFrIqoj6wIe8MJGuRf4OC9cVAWipGYXPG5bqc3v6RUHir9MeLOggoGjalexCwBgs3SsGyhqU1uWZdJ%2Fs4nUbHyIJGc3FB9OrnhDRuGPdkfPSOA09hfujcul91zQNws4dznvmM",
        "https://vtbehaviour.commondatastorage.googleapis.com/a0fb314babd51dbc460ab126b615da4c6f9481f5d1225d0ac189da9d99923bb3_VirusTotal%20Droidy.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775190345&Signature=33%2BM36uNOvEfi8bNtJvnbxcTgcnoIlIO2vBglXpCJFNwC8HAewGOF91Q26TOAsw4sbmtTxQ2F5Q2jv2V3ULV8MAxxgYVptJ69SusRt7qZeBDUpMY%2BOdTYqjkdBuYUqYiCvM756aQheS1KvDepeD64x8e%2FivWkpm%2BZ9yDaKUc7w2143zYkc8kpyBSsO8rJI9vyoHYvbr4sfZOowoUWK7yMjQD9SN5bL%2FFABbMrPEOMyobApm",
        "https://vtbehaviour.commondatastorage.googleapis.com/06b6d62477011fa63fdb44046351fbe574391916a4f3ea0486b3e3498145a7d7_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775190407&Signature=Y3EAa%2Fwo4ligJHfBUxkzWLjU9FPLyNmsxeNdcPCIPQBYTTGUIaFddrFIYHFhawxMDvixd7uA0qGc0zVDWgbStf2qhTOU1D0aF%2F%2BSLSXEY3VB8oWRXZCEI12zrSd5P4lHInxRS3CJKbNnJP4GvYx20ctpNSo4u%2FvVMLM%2B92TiYCunAVTquDVrFNNim6LJTEz2ucjhcgF2gKn%2FF0f9ALEheC1lk4omwpcYEPQLNX0wNsxNC%2BWQ",
        "https://vtbehaviour.commondatastorage.googleapis.com/bb46c18b5b2c98937c8fdfb7acd3e0fa4d0534cfc44d4b41ccd6db9198266fbf_Zenbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775190605&Signature=Rcvj5v%2By7yAX52ap8q3zDGTMjVRQm1LkjuWyhDQUaO6QXR1Ld%2F1dD2QjluOGOuXNiW%2FMNP%2Bqj%2Bx6KtYCvttE847keFo1Em2Bm%2F8bv4vK%2FJL0nGIiz%2FatgO7O78LZZ1wkYwcfG5JZAj8VdjDlHQbuOIUz8Nahqt2JUyQ84z3OeH5d3%2BjV8NKW5SjGWQw4mcmjPQXUznoCsysLbjCd5sgZTpyLUdeFJcNKQPiNBURsJeiyCI5llz0j",
        "https://www.googletagmanager.com/gtag/js?id=GT-NNS2QH6C",
        "https://www.googletagmanager.com/ns.html?id=GTM-PHWTRTJ",
        "https://www.virustotal.com/gui/url/f6db0235760bd467ca822ad515a8410121fde4713501b3e718b8fb127dfa259c?nocache=1",
        "https://www.massbroadcasters.org/eeo-organizations/marshfield-high-school",
        "https://www.findagrave.com/memorial/139047900/peter-deftos",
        "https://vtbehaviour.commondatastorage.googleapis.com/a041cbdeb64c802bde90e06f25213524b2eac500d6000da7e4caeb96e5de1991_VirusTotal%20Droidy.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775191439&Signature=evxsL1kaOuLe5KziYCSqZ56H%2FqXRQgEN0tkJo0j5G7JQ3mmO0Kav5K9LCz%2FUEzi%2BdtB%2B3%2B7VM6r9pC%2BMh7nHxT%2Bs8UAYuVXPE%2FUbBdHWMjvZQuqrZ0hHqIR2xHVB132HiYQWLo%2FgS1QATOfAcHci3X4FqmqvUp7A%2FmNsE1aVFbLc971RHQOuTapOGhiDZlVUyA9KvpMDKw0DzdeHFSlayBSrDDsWL7xW06XOf"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1016",
          "name": "System Network Configuration Discovery",
          "display_name": "T1016 - System Network Configuration Discovery"
        },
        {
          "id": "T1406",
          "name": "Obfuscated Files or Information",
          "display_name": "T1406 - Obfuscated Files or Information"
        },
        {
          "id": "T1409",
          "name": "Access Stored Application Data",
          "display_name": "T1409 - Access Stored Application Data"
        },
        {
          "id": "T1412",
          "name": "Capture SMS Messages",
          "display_name": "T1412 - Capture SMS Messages"
        },
        {
          "id": "T1413",
          "name": "Access Sensitive Data in Device Logs",
          "display_name": "T1413 - Access Sensitive Data in Device Logs"
        },
        {
          "id": "T1414",
          "name": "Capture Clipboard Data",
          "display_name": "T1414 - Capture Clipboard Data"
        },
        {
          "id": "T1418",
          "name": "Application Discovery",
          "display_name": "T1418 - Application Discovery"
        },
        {
          "id": "T1421",
          "name": "System Network Connections Discovery",
          "display_name": "T1421 - System Network Connections Discovery"
        },
        {
          "id": "T1422",
          "name": "System Network Configuration Discovery",
          "display_name": "T1422 - System Network Configuration Discovery"
        },
        {
          "id": "T1424",
          "name": "Process Discovery",
          "display_name": "T1424 - Process Discovery"
        },
        {
          "id": "T1426",
          "name": "System Information Discovery",
          "display_name": "T1426 - System Information Discovery"
        },
        {
          "id": "T1429",
          "name": "Capture Audio",
          "display_name": "T1429 - Capture Audio"
        },
        {
          "id": "T1430",
          "name": "Location Tracking",
          "display_name": "T1430 - Location Tracking"
        },
        {
          "id": "T1432",
          "name": "Access Contact List",
          "display_name": "T1432 - Access Contact List"
        },
        {
          "id": "T1439",
          "name": "Eavesdrop on Insecure Network Communication",
          "display_name": "T1439 - Eavesdrop on Insecure Network Communication"
        },
        {
          "id": "T1447",
          "name": "Delete Device Data",
          "display_name": "T1447 - Delete Device Data"
        },
        {
          "id": "T1472",
          "name": "Generate Fraudulent Advertising Revenue",
          "display_name": "T1472 - Generate Fraudulent Advertising Revenue"
        },
        {
          "id": "T1507",
          "name": "Network Information Discovery",
          "display_name": "T1507 - Network Information Discovery"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1523",
          "name": "Evade Analysis Environment",
          "display_name": "T1523 - Evade Analysis Environment"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1189",
          "name": "Drive-by Compromise",
          "display_name": "T1189 - Drive-by Compromise"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1095",
          "name": "Non-Application Layer Protocol",
          "display_name": "T1095 - Non-Application Layer Protocol"
        },
        {
          "id": "T1574",
          "name": "Hijack Execution Flow",
          "display_name": "T1574 - Hijack Execution Flow"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 70,
        "FileHash-SHA1": 40,
        "FileHash-SHA256": 549,
        "URL": 344,
        "domain": 293,
        "hostname": 443,
        "IPv4": 127
      },
      "indicator_count": 1866,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 49,
      "modified_text": "16 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "6996eacbe2d99caae4a5b2d7",
      "name": "172.69.58.33",
      "description": "potential rogue exploit kit",
      "modified": "2026-04-01T00:44:45.494000",
      "created": "2026-02-19T10:49:47.043000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CVE": 18,
        "FileHash-MD5": 31,
        "FileHash-SHA1": 29,
        "FileHash-SHA256": 171,
        "URL": 432,
        "domain": 629,
        "hostname": 461,
        "CIDR": 6,
        "email": 23
      },
      "indicator_count": 1800,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 48,
      "modified_text": "18 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "69a2127d12dce12538b57d72",
      "name": "FBI Files | Tor device connection | Unique attack against (non -criminal) monitored targets  ~ Apple Jacked Targets",
      "description": "Remote Attack - FBI Files | Tor device connection | Unique attack against (non -criminal) monitored targets.\n\nChecked search history on a targeted device and found an FBI link apparently delivered via unknown AI technology.\n|| yara detections\nzur foerderung\nA\n+ Add Tag\n\u8840\nCount: 1\nGRO Probability: 1\nText: Suricata Alerts Event\nCategory Description CID\nIND131.188.40.12g otx.alienvault.com\nlocal:49181 (TCP) Misc\nAttack ET TOR Known Tor\nRelay/Router (Not Exit)\n\"A\" | [[Next pulse will list on malware, rats , bats, Trojans used]",
      "modified": "2026-03-29T20:03:36.333000",
      "created": "2026-02-27T21:54:05.261000",
      "tags": [
        "pattern match",
        "heuristic match",
        "all url",
        "files domain",
        "pulses otx",
        "germany unknown",
        "aaaa",
        "ip address",
        "emails",
        "gmt server",
        "vary",
        "modified",
        "accept",
        "title",
        "present feb",
        "present jan",
        "united",
        "part",
        "moved",
        "passive dns",
        "cname",
        "final",
        "bill",
        "antivm",
        "xlsx",
        "xlsm",
        "urls",
        "otx logo",
        "all hostname",
        "server",
        "organization",
        "city",
        "stateprovince",
        "postal code",
        "phone",
        "registrar abuse",
        "privacy admin",
        "paris admin",
        "april",
        "direct",
        "february",
        "http",
        "dfn verein",
        "zur foerderung",
        "domain",
        "page url",
        "tags",
        "de summary",
        "erlangen",
        "germany",
        "securitytrails",
        "de seen",
        "general info",
        "geo erlangen",
        "as as680",
        "de note",
        "route",
        "data upload",
        "extraction",
        "failed",
        "extra data",
        "referen",
        "include review",
        "exclude data",
        "summary",
        "url age",
        "as680",
        "se source",
        "learn",
        "command",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "spawns",
        "defense evasion",
        "t1480 execution",
        "over",
        "ascii text",
        "mitre att",
        "size",
        "null",
        "refresh",
        "span",
        "hybrid",
        "general",
        "local",
        "path",
        "click",
        "strings",
        "error",
        "tools",
        "look",
        "verify",
        "restart",
        "node traffic",
        "tlsv1",
        "search",
        "rgba",
        "medium",
        "read c",
        "module load",
        "t1129",
        "execution",
        "next",
        "dock",
        "write",
        "persistence",
        "calls",
        "apis",
        "reads",
        "model",
        "value",
        "getprocaddress",
        "show technique",
        "ck matrix",
        "access type",
        "windir",
        "regexp",
        "open",
        "date",
        "format",
        "virtual disk drive",
        "sha256",
        "sha1",
        "body",
        "filehashsha1",
        "found",
        "unknown",
        "stop",
        "root",
        "form",
        "9999",
        "sandbox",
        "malware",
        "analysis",
        "online",
        "submit",
        "vxstream",
        "sample",
        "download",
        "trojan",
        "apt",
        "hybrid analysis",
        "api key",
        "vetting process",
        "please note",
        "please",
        "bad traffic",
        "et info",
        "tls handshake",
        "failure",
        "flag",
        "analysis tip",
        "openurl c",
        "msie",
        "windows nt",
        "wow64",
        "slcc2",
        "media center",
        "show",
        "pulse pulses",
        "av detections",
        "ids detections",
        "yara detections",
        "alerts",
        "analysis date",
        "file score",
        "malicious yara",
        "detections none",
        "less ip",
        "dynamicloader",
        "get na",
        "c3bhaw",
        "high",
        "copy",
        "guard",
        "push",
        "Palantir",
        "Foundry",
        "Whitehouse",
        "X.Com",
        "Justice.gov",
        "Apple",
        "AI",
        "node traffic"
      ],
      "references": [
        "tor.sebastianhahn.net \u2022 dap.digitalgov.gov \u2022 fbi.gov \u2022  x.com \u2022 sebastianhahn.net",
        "https://tor.sebastianhahn.net \u2022 faui2k9.de\t \u2022 gitbot.faui2k9.de \u2022 tor-dirauth.sebastianhahn.net \u2022",
        "http://truefoundry.prodigaltech.com/",
        "git.spywarewatchdog.org",
        "marriott-control-prd.accenture.cn",
        "marriott-datacenter-prd.accenture.cn",
        "accenture.cn",
        "c.j.location.host \u2022 videodata.video \u2022 referrer.search",
        "target.id  \u2022 tostring.call  \u2022 title.search",
        "https://hybrid-analysis.com/sample/2f05feed2065b7385b156ebf3a7c6c19def3d412227cee0d46e8a53fb3e9ac41/697bc423b6e7a4dc46010737",
        "https://hybrid-analysis.com/sample/430c376c1754f1f160e3d68bafc970eba37811bdb08d73a86bf6f4be1e7267b3/69a1ea603a3303fa120dad19",
        "https://hybrid-analysis.com/sample/c8e97fd85003de128ef716093cc1ec68f676c737b614f4a55c75c5c0f837de70/69a19551cb5537805706bca9",
        "https://hybrid-analysis.com/sample/c8e97fd85003de128ef716093cc1ec68f676c737b614f4a55c75c5c0f837de70",
        "https://hybrid-analysis.com/sample/c8e97fd85003de128ef716093cc1ec68f676c737b614f4a55c75c5c0f837de70",
        "calathea-containers.palantirfedstart.com \u2018 BYE ALREADY\u2019",
        "http://truefoundry.prodigaltech.com/",
        "Attacker being used by several legal entities attacking a target\u2019s family",
        "Clyde &Co | Chris Ahmann | Brian Sabey /Hall & Evans & Hall Render",
        "Luxury Apartments and Townhome communities do use Foundry Palantir",
        "Some Colorado communities have been taken over by the State Government",
        "Quasi Government: Specifically Pinnacol and Commerce & Industry ( AIG)",
        "Denver Justice System. Palantir allegedly moved  potato Headquarters to Miami",
        "Foundry Foot Soldiers are still in Colorado targeting innocents",
        "Foundry Palantir still has a presence in Colorado",
        "I need some help.",
        "Accurately tipped about air travel safety. In past. Proven true.",
        "Tipped of new looming airline threats",
        "Tipped on hits and other savage plans  to be executed against targets. Targets can be any (1) person.",
        "Sound crazy. We know Palantir commits ALL manner of crime. They are money motivated.",
        "FBI files opened up on a targeted phone, Iunseel, only in search history.",
        "Air Safety: it\u2019s important to have  passengers or hackers unable  to communicate via airline networks /",
        "No phones or circuit board tech. Smart watches.You can\u2019t bring large bottles of hygiene products. Deal with a new reality!",
        "Hours after files were deemed malicious. We powered on targeted Smart TV",
        "You have to go through a series of steps to change themes and wallpapers , including powering off TV",
        "Significant? The screen once had a floral theme. Now a black background with a single fish as Wallpaper .",
        "A man claiming to have the name Sebastian is communicating with targets love one",
        "Uses code, no phone calls. Connected via instagram.",
        "I\u2019m not sure what brings man to from NY to Denver today. I consider him malicious",
        "By remote view of NEW targeys view, all key calls are routed through him.",
        "Targets associated warned. Not very open to advice.",
        "I would post his public information. It may be unwise.",
        "Connects to all NEW targets key contacts main targets contacts.",
        "We have foot soldiers. Be aware",
        "https://www.justice.gov/opa/pr/departmen.t",
        "https://api.manus.im/api/oauth2_callback/apple",
        "https://apple.btprmjo.cc/",
        "https://creative.miqdigital.com/.well-known/apple-app-site-association",
        "internationalfrontier.com",
        "http://www.internationalfrontier.com/i/pdf/2017-04-03-IFR-2017.pdf",
        "http://www.internationalfrontier.com",
        "http://www.internationalfrontier.com/i/pdf/Montana-Presentation-2011.pdf",
        "https://tylerjoycedenver.followupboss.com/unsubscribe/T6pEHkEaLZAN5Jxflvspix0zKbJZwfY9pjBpUTk7q06azxItZ7aiRb7brQhy1NNFqrcrUe4cKmI455MBqcwK9_it6dqx6QWdANshp0om1Bv-5ezKkyVJDphCHvPQNvMupI1owe03rtqYAyu8Cj3cWw~~",
        "Related to: https://otx.alienvault.com/pulse/69a1a73eb0578b92962dae97"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Node Traffic",
          "display_name": "Node Traffic",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1048",
          "name": "Exfiltration Over Alternative Protocol",
          "display_name": "T1048 - Exfiltration Over Alternative Protocol"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1568.002",
          "name": "Domain Generation Algorithms",
          "display_name": "T1568.002 - Domain Generation Algorithms"
        },
        {
          "id": "T1048.003",
          "name": "Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol",
          "display_name": "T1048.003 - Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol"
        },
        {
          "id": "T1090",
          "name": "Proxy",
          "display_name": "T1090 - Proxy"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1003",
          "name": "OS Credential Dumping",
          "display_name": "T1003 - OS Credential Dumping"
        },
        {
          "id": "T1007",
          "name": "System Service Discovery",
          "display_name": "T1007 - System Service Discovery"
        },
        {
          "id": "T1010",
          "name": "Application Window Discovery",
          "display_name": "T1010 - Application Window Discovery"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1546",
          "name": "Event Triggered Execution",
          "display_name": "T1546 - Event Triggered Execution"
        },
        {
          "id": "T1555",
          "name": "Credentials from Password Stores",
          "display_name": "T1555 - Credentials from Password Stores"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1564",
          "name": "Hide Artifacts",
          "display_name": "T1564 - Hide Artifacts"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1614",
          "name": "System Location Discovery",
          "display_name": "T1614 - System Location Discovery"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1583.001",
          "name": "Domains",
          "display_name": "T1583.001 - Domains"
        },
        {
          "id": "T1553.002",
          "name": "Code Signing",
          "display_name": "T1553.002 - Code Signing"
        },
        {
          "id": "T1055.011",
          "name": "Extra Window Memory Injection",
          "display_name": "T1055.011 - Extra Window Memory Injection"
        },
        {
          "id": "T1055.001",
          "name": "Dynamic-link Library Injection",
          "display_name": "T1055.001 - Dynamic-link Library Injection"
        },
        {
          "id": "T1055.004",
          "name": "Asynchronous Procedure Call",
          "display_name": "T1055.004 - Asynchronous Procedure Call"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1069.002",
          "name": "Domain Groups",
          "display_name": "T1069.002 - Domain Groups"
        },
        {
          "id": "T1055.014",
          "name": "VDSO Hijacking",
          "display_name": "T1055.014 - VDSO Hijacking"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 5643,
        "domain": 700,
        "hostname": 1918,
        "FileHash-SHA256": 1161,
        "FileHash-MD5": 235,
        "email": 4,
        "FileHash-SHA1": 200,
        "CVE": 1,
        "CIDR": 2,
        "SSLCertFingerprint": 9
      },
      "indicator_count": 9873,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "21 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "69aa019f4509897e354fe029",
      "name": "credit Q Vashti Cloned Pulse ",
      "description": "",
      "modified": "2026-03-29T20:03:36.333000",
      "created": "2026-03-05T22:20:15.324000",
      "tags": [
        "pattern match",
        "heuristic match",
        "all url",
        "files domain",
        "pulses otx",
        "germany unknown",
        "aaaa",
        "ip address",
        "emails",
        "gmt server",
        "vary",
        "modified",
        "accept",
        "title",
        "present feb",
        "present jan",
        "united",
        "part",
        "moved",
        "passive dns",
        "cname",
        "final",
        "bill",
        "antivm",
        "xlsx",
        "xlsm",
        "urls",
        "otx logo",
        "all hostname",
        "server",
        "organization",
        "city",
        "stateprovince",
        "postal code",
        "phone",
        "registrar abuse",
        "privacy admin",
        "paris admin",
        "april",
        "direct",
        "february",
        "http",
        "dfn verein",
        "zur foerderung",
        "domain",
        "page url",
        "tags",
        "de summary",
        "erlangen",
        "germany",
        "securitytrails",
        "de seen",
        "general info",
        "geo erlangen",
        "as as680",
        "de note",
        "route",
        "data upload",
        "extraction",
        "failed",
        "extra data",
        "referen",
        "include review",
        "exclude data",
        "summary",
        "url age",
        "as680",
        "se source",
        "learn",
        "command",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "spawns",
        "defense evasion",
        "t1480 execution",
        "over",
        "ascii text",
        "mitre att",
        "size",
        "null",
        "refresh",
        "span",
        "hybrid",
        "general",
        "local",
        "path",
        "click",
        "strings",
        "error",
        "tools",
        "look",
        "verify",
        "restart",
        "node traffic",
        "tlsv1",
        "search",
        "rgba",
        "medium",
        "read c",
        "module load",
        "t1129",
        "execution",
        "next",
        "dock",
        "write",
        "persistence",
        "calls",
        "apis",
        "reads",
        "model",
        "value",
        "getprocaddress",
        "show technique",
        "ck matrix",
        "access type",
        "windir",
        "regexp",
        "open",
        "date",
        "format",
        "virtual disk drive",
        "sha256",
        "sha1",
        "body",
        "filehashsha1",
        "found",
        "unknown",
        "stop",
        "root",
        "form",
        "9999",
        "sandbox",
        "malware",
        "analysis",
        "online",
        "submit",
        "vxstream",
        "sample",
        "download",
        "trojan",
        "apt",
        "hybrid analysis",
        "api key",
        "vetting process",
        "please note",
        "please",
        "bad traffic",
        "et info",
        "tls handshake",
        "failure",
        "flag",
        "analysis tip",
        "openurl c",
        "msie",
        "windows nt",
        "wow64",
        "slcc2",
        "media center",
        "show",
        "pulse pulses",
        "av detections",
        "ids detections",
        "yara detections",
        "alerts",
        "analysis date",
        "file score",
        "malicious yara",
        "detections none",
        "less ip",
        "dynamicloader",
        "get na",
        "c3bhaw",
        "high",
        "copy",
        "guard",
        "push",
        "Palantir",
        "Foundry",
        "Whitehouse",
        "X.Com",
        "Justice.gov",
        "Apple",
        "AI",
        "node traffic"
      ],
      "references": [
        "tor.sebastianhahn.net \u2022 dap.digitalgov.gov \u2022 fbi.gov \u2022  x.com \u2022 sebastianhahn.net",
        "https://tor.sebastianhahn.net \u2022 faui2k9.de\t \u2022 gitbot.faui2k9.de \u2022 tor-dirauth.sebastianhahn.net \u2022",
        "http://truefoundry.prodigaltech.com/",
        "git.spywarewatchdog.org",
        "marriott-control-prd.accenture.cn",
        "marriott-datacenter-prd.accenture.cn",
        "accenture.cn",
        "c.j.location.host \u2022 videodata.video \u2022 referrer.search",
        "target.id  \u2022 tostring.call  \u2022 title.search",
        "https://hybrid-analysis.com/sample/2f05feed2065b7385b156ebf3a7c6c19def3d412227cee0d46e8a53fb3e9ac41/697bc423b6e7a4dc46010737",
        "https://hybrid-analysis.com/sample/430c376c1754f1f160e3d68bafc970eba37811bdb08d73a86bf6f4be1e7267b3/69a1ea603a3303fa120dad19",
        "https://hybrid-analysis.com/sample/c8e97fd85003de128ef716093cc1ec68f676c737b614f4a55c75c5c0f837de70/69a19551cb5537805706bca9",
        "https://hybrid-analysis.com/sample/c8e97fd85003de128ef716093cc1ec68f676c737b614f4a55c75c5c0f837de70",
        "https://hybrid-analysis.com/sample/c8e97fd85003de128ef716093cc1ec68f676c737b614f4a55c75c5c0f837de70",
        "calathea-containers.palantirfedstart.com \u2018 BYE ALREADY\u2019",
        "http://truefoundry.prodigaltech.com/",
        "Attacker being used by several legal entities attacking a target\u2019s family",
        "Clyde &Co | Chris Ahmann | Brian Sabey /Hall & Evans & Hall Render",
        "Luxury Apartments and Townhome communities do use Foundry Palantir",
        "Some Colorado communities have been taken over by the State Government",
        "Quasi Government: Specifically Pinnacol and Commerce & Industry ( AIG)",
        "Denver Justice System. Palantir allegedly moved  potato Headquarters to Miami",
        "Foundry Foot Soldiers are still in Colorado targeting innocents",
        "Foundry Palantir still has a presence in Colorado",
        "I need some help.",
        "Accurately tipped about air travel safety. In past. Proven true.",
        "Tipped of new looming airline threats",
        "Tipped on hits and other savage plans  to be executed against targets. Targets can be any (1) person.",
        "Sound crazy. We know Palantir commits ALL manner of crime. They are money motivated.",
        "FBI files opened up on a targeted phone, Iunseel, only in search history.",
        "Air Safety: it\u2019s important to have  passengers or hackers unable  to communicate via airline networks /",
        "No phones or circuit board tech. Smart watches.You can\u2019t bring large bottles of hygiene products. Deal with a new reality!",
        "Hours after files were deemed malicious. We powered on targeted Smart TV",
        "You have to go through a series of steps to change themes and wallpapers , including powering off TV",
        "Significant? The screen once had a floral theme. Now a black background with a single fish as Wallpaper .",
        "A man claiming to have the name Sebastian is communicating with targets love one",
        "Uses code, no phone calls. Connected via instagram.",
        "I\u2019m not sure what brings man to from NY to Denver today. I consider him malicious",
        "By remote view of NEW targeys view, all key calls are routed through him.",
        "Targets associated warned. Not very open to advice.",
        "I would post his public information. It may be unwise.",
        "Connects to all NEW targets key contacts main targets contacts.",
        "We have foot soldiers. Be aware",
        "https://www.justice.gov/opa/pr/departmen.t",
        "https://api.manus.im/api/oauth2_callback/apple",
        "https://apple.btprmjo.cc/",
        "https://creative.miqdigital.com/.well-known/apple-app-site-association",
        "internationalfrontier.com",
        "http://www.internationalfrontier.com/i/pdf/2017-04-03-IFR-2017.pdf",
        "http://www.internationalfrontier.com",
        "http://www.internationalfrontier.com/i/pdf/Montana-Presentation-2011.pdf",
        "https://tylerjoycedenver.followupboss.com/unsubscribe/T6pEHkEaLZAN5Jxflvspix0zKbJZwfY9pjBpUTk7q06azxItZ7aiRb7brQhy1NNFqrcrUe4cKmI455MBqcwK9_it6dqx6QWdANshp0om1Bv-5ezKkyVJDphCHvPQNvMupI1owe03rtqYAyu8Cj3cWw~~",
        "Related to: https://otx.alienvault.com/pulse/69a1a73eb0578b92962dae97"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Node Traffic",
          "display_name": "Node Traffic",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1048",
          "name": "Exfiltration Over Alternative Protocol",
          "display_name": "T1048 - Exfiltration Over Alternative Protocol"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1568.002",
          "name": "Domain Generation Algorithms",
          "display_name": "T1568.002 - Domain Generation Algorithms"
        },
        {
          "id": "T1048.003",
          "name": "Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol",
          "display_name": "T1048.003 - Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol"
        },
        {
          "id": "T1090",
          "name": "Proxy",
          "display_name": "T1090 - Proxy"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1003",
          "name": "OS Credential Dumping",
          "display_name": "T1003 - OS Credential Dumping"
        },
        {
          "id": "T1007",
          "name": "System Service Discovery",
          "display_name": "T1007 - System Service Discovery"
        },
        {
          "id": "T1010",
          "name": "Application Window Discovery",
          "display_name": "T1010 - Application Window Discovery"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1546",
          "name": "Event Triggered Execution",
          "display_name": "T1546 - Event Triggered Execution"
        },
        {
          "id": "T1555",
          "name": "Credentials from Password Stores",
          "display_name": "T1555 - Credentials from Password Stores"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1564",
          "name": "Hide Artifacts",
          "display_name": "T1564 - Hide Artifacts"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1614",
          "name": "System Location Discovery",
          "display_name": "T1614 - System Location Discovery"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1583.001",
          "name": "Domains",
          "display_name": "T1583.001 - Domains"
        },
        {
          "id": "T1553.002",
          "name": "Code Signing",
          "display_name": "T1553.002 - Code Signing"
        },
        {
          "id": "T1055.011",
          "name": "Extra Window Memory Injection",
          "display_name": "T1055.011 - Extra Window Memory Injection"
        },
        {
          "id": "T1055.001",
          "name": "Dynamic-link Library Injection",
          "display_name": "T1055.001 - Dynamic-link Library Injection"
        },
        {
          "id": "T1055.004",
          "name": "Asynchronous Procedure Call",
          "display_name": "T1055.004 - Asynchronous Procedure Call"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1069.002",
          "name": "Domain Groups",
          "display_name": "T1069.002 - Domain Groups"
        },
        {
          "id": "T1055.014",
          "name": "VDSO Hijacking",
          "display_name": "T1055.014 - VDSO Hijacking"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "69a2127d12dce12538b57d72",
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 5644,
        "domain": 701,
        "hostname": 1920,
        "FileHash-SHA256": 1161,
        "FileHash-MD5": 235,
        "email": 4,
        "FileHash-SHA1": 200,
        "CVE": 1,
        "CIDR": 2,
        "SSLCertFingerprint": 9
      },
      "indicator_count": 9877,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 49,
      "modified_text": "21 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "a.data",
    "type": "Domain"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "a.data",
    "found": false,
    "verdict": "clean",
    "urls": [],
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776631151.0703757
}