{
  "type": "Domain",
  "indicator": "accutesting.com",
  "general": {
    "sections": [
      "general",
      "geo",
      "url_list",
      "passive_dns",
      "malware",
      "whois",
      "http_scans"
    ],
    "whois": "http://whois.domaintools.com/accutesting.com",
    "alexa": "http://www.alexa.com/siteinfo/accutesting.com",
    "indicator": "accutesting.com",
    "type": "domain",
    "type_title": "Domain",
    "validation": [],
    "base_indicator": {
      "id": 3777236419,
      "indicator": "accutesting.com",
      "type": "domain",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 13,
      "pulses": [
        {
          "id": "65c7b86fa120d19bbc88f367",
          "name": "Hijacker",
          "description": "Hackers hired to humiliate, threaten,steal data, evidence, recordings , spy and intimidate.",
          "modified": "2024-03-11T17:01:59.026000",
          "created": "2024-02-10T17:54:55.243000",
          "tags": [
            "ssl certificate",
            "whois record",
            "contacted",
            "tsara brashears",
            "referrer",
            "communicating",
            "resolutions",
            "historical ssl",
            "high level",
            "hackers",
            "hacktool",
            "download",
            "malware",
            "crypto",
            "hijacker",
            "monitoring",
            "installer",
            "tofsee",
            "domains domains",
            "domains files",
            "files files",
            "script",
            "kgs0",
            "kls0",
            "relic",
            "iframe",
            "pe32 executable",
            "ms windows",
            "intel",
            "win16 ne",
            "os2 executable",
            "generic windos",
            "executable",
            "dos executable",
            "generic",
            "rticon neutral",
            "info compiler",
            "products id",
            "header intel",
            "name md5",
            "contained",
            "type",
            "language",
            "ico rtgroupicon",
            "neutral",
            "first",
            "utc submissions",
            "submitters",
            "company limited",
            "computer",
            "amazonaes",
            "china telecom",
            "group",
            "csc corporate",
            "domains",
            "malware spreading evader",
            "cnc",
            "malvertizing",
            "milehighmedia",
            "trojandropper",
            "moved",
            "passive dns",
            "urls",
            "as14576",
            "backdoor",
            "scan endpoints",
            "all octoseek",
            "ipv4",
            "pulse pulses",
            "trojan",
            "encrypt",
            "body",
            "date",
            "date hash",
            "avast avg",
            "mtb may",
            "kratona",
            "threat",
            "paste",
            "iocs",
            "analyze",
            "hostnames",
            "urls https",
            "script urls",
            "united",
            "meta",
            "unknown",
            "emails",
            "name servers",
            "search",
            "as62597 nsone",
            "a domains",
            "as397241",
            "media",
            "next",
            "december",
            "unlocker",
            "threat round",
            "apple ios",
            "apple phone",
            "project",
            "blister",
            "agent tesla",
            "open",
            "execution",
            "videos",
            "strong",
            "porn videos",
            "watch",
            "daddy",
            "free",
            "top rated",
            "most viewed",
            "cancel anytime",
            "views",
            "play",
            "black",
            "enjoy",
            "czech",
            "hunk",
            "virtool",
            "cryp",
            "creation date",
            "otx telemetry",
            "expiration date",
            "servers",
            "status",
            "win32",
            "showing",
            "domain",
            "nxdomain",
            "as8075",
            "shell code",
            "threat",
            "cyber espionage",
            "cyber stalking",
            "danger",
            "critical",
            "attack",
            "treats",
            "as15169 google",
            "aaaa",
            "record value",
            "error",
            "entries",
            "hostname",
            "url http",
            "http",
            "files domain",
            "files related",
            "shinjiru msc",
            "sdn bhd",
            "dnssec",
            "protect",
            "as54455 madeit",
            "phishing",
            "backdoor",
            "contextualizing",
            "elevated exposure",
            "malvertizing",
            "ransom",
            "msil",
            "hackers for hire",
            "hashes",
            "http method",
            "get http",
            "http requests",
            "get dns",
            "ip traffic",
            "memory pattern",
            "pattern ips",
            "@emreimer",
            "iextract2",
            "cp cyber",
            "denver",
            "security",
            "siem compliance",
            "skip",
            "cybersecurity",
            "larimer st",
            "suite",
            "resources cyber",
            "risk assessment",
            "bill",
            "mind",
            "delaware",
            "pa",
            "arizona",
            "colorado",
            "stalkers",
            "deuteronomy 28:7",
            "hitmen"
          ],
          "references": [
            "honey.exe",
            "0001c8afa9ca148752e1439140fadb6571b27f455ad1474d85625bcddfb63550",
            "CS Sigma Rules: Suspicious Remote Thread Created by Perez Diego (@darkquassar), oscd.community",
            "CS Sigma Rules: Python Initiated Connection by frack113",
            "CS Sigma Rules: Use Remove-Item to Delete File by frack113",
            "CS Sigma Rules: Suspicious Userinit Child Process by Florian Roth (rule), Samir Bousseaden (idea)",
            "Relationship: http://www.cpmfun.com/go.php?i=Zml0sXNlQhR0gRzjdXpLNlz4&p=71408&s=1&m=1&ua=mozilla/5.0+(linux;+android+4.4.2;+ast21+build/kvt49l)+",
            "api.login.live.com",
            "http://appleid.icloud.com-website33.org/",
            "https://www.milehighmedia.com/legal/2257 [phishing \u2022 Brazzers porn]",
            "FileHash-SHA256 c030b0a1be8745d192f45.159.189.105743b3c4f4094f33507a5904c184c8db0bde1a91efccb5  [tracking]",
            "http://45.159.189.105/bot/regex [Tracking Tsara Brashears involves in person following and or harassment as well]",
            "message.htm.com",
            "http://pornhub.com/gay/video/search",
            "CnC IP's: 206.189.61.126 \u2022 217.74.65.23 \u2022 46.8.8.100 \u2022 64.190.63.111",
            "stop following, stalking, hacking, talking, modifying, hijacking, threatening, contacting, sending people to harass target, threats",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "W32.Sality.PE",
              "display_name": "W32.Sality.PE",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "Relic",
              "display_name": "Relic",
              "target": null
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "Virus.Win32.Virut.q",
              "display_name": "Virus.Win32.Virut.q",
              "target": null
            },
            {
              "id": "VirTool",
              "display_name": "VirTool",
              "target": null
            },
            {
              "id": "TrojanDropper:Win32",
              "display_name": "TrojanDropper:Win32",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "TA0001",
              "name": "Initial Access",
              "display_name": "TA0001 - Initial Access"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "TA0002",
              "name": "Execution",
              "display_name": "TA0002 - Execution"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "TA0005",
              "name": "Defense Evasion",
              "display_name": "TA0005 - Defense Evasion"
            },
            {
              "id": "TA0006",
              "name": "Credential Access",
              "display_name": "TA0006 - Credential Access"
            },
            {
              "id": "TA0007",
              "name": "Discovery",
              "display_name": "TA0007 - Discovery"
            },
            {
              "id": "TA0008",
              "name": "Lateral Movement",
              "display_name": "TA0008 - Lateral Movement"
            },
            {
              "id": "TA0009",
              "name": "Collection",
              "display_name": "TA0009 - Collection"
            },
            {
              "id": "TA0010",
              "name": "Exfiltration",
              "display_name": "TA0010 - Exfiltration"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "TA0034",
              "name": "Impact",
              "display_name": "TA0034 - Impact"
            },
            {
              "id": "TA0040",
              "name": "Impact",
              "display_name": "TA0040 - Impact"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.002",
              "name": "File Transfer Protocols",
              "display_name": "T1071.002 - File Transfer Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1036.004",
              "name": "Masquerade Task or Service",
              "display_name": "T1036.004 - Masquerade Task or Service"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1415",
              "name": "URL Scheme Hijacking",
              "display_name": "T1415 - URL Scheme Hijacking"
            },
            {
              "id": "T1122",
              "name": "Component Object Model Hijacking",
              "display_name": "T1122 - Component Object Model Hijacking"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 54,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 6303,
            "FileHash-MD5": 215,
            "FileHash-SHA1": 192,
            "FileHash-SHA256": 2663,
            "domain": 2673,
            "hostname": 2686,
            "CVE": 2,
            "email": 16
          },
          "indicator_count": 14750,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "770 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65401d5ee5a7359a5e815a6a",
          "name": "Darkside 2020 Ecosystem  .BEware | BGP.tools | Target Tsara Brashears",
          "description": "I don't want to be dramatic but...Main source of cyber attacks. Includes - governmentattic.org, tulach.cc, malvertizing, monitoring. remote attacks, endangered Tsara Brashears attack, BotNet, CNC, telephone service, Apple hacking. https://bgp.tools/prefix/167.203.96.0, adult content, moo.com, afraid.org.  I'm assuming accessed by attorneys and insurance companies to silence people forever. Death references. I can't verify if government complicity is accurate or spoofed. Stranger was owned by American International Group, found in an STSH domain (AIG.com). Last night Ben Cartwright became the sole owner of  domain after being a verified AIG domain. Terrifying.  Looks like the main target is the same.  Tsara Brashears. \nFound in an attack against a device 'malicious sorry index' that caused research effort. \n[auto populated: BGP.TOOLS - bgp.tools - has published its full list of historical records for BGP, which are based on its current IP address address and routing system (PGP).]",
          "modified": "2023-11-29T14:03:31.663000",
          "created": "2023-10-30T21:17:18.712000",
          "tags": [
            "ssl certificate",
            "whois record",
            "contacted",
            "referrer",
            "communicating",
            "resolutions",
            "historical ssl",
            "whois whois",
            "http",
            "critical risk",
            "dark power",
            "cobalt strike",
            "malware",
            "core",
            "critical",
            "copy",
            "formbook",
            "submission",
            "sophos sophos",
            "xcitium verdict",
            "cloud xcitium",
            "verdict cloud",
            "history first",
            "analysis",
            "utc http",
            "response final",
            "url https",
            "march",
            "execution",
            "falcon sandbox",
            "pattern match",
            "changelog",
            "header",
            "layer",
            "data",
            "ipv4",
            "function",
            "file",
            "et tor",
            "known tor",
            "meta",
            "monitoring",
            "date",
            "body",
            "form",
            "august",
            "june",
            "friendly",
            "main",
            "footer",
            "unknown",
            "hybrid",
            "general",
            "click",
            "strings",
            "class",
            "generator",
            "error",
            "pe resource",
            "redline stealer",
            "april",
            "lockbit",
            "emotet",
            "hacktool",
            "apple",
            "tsara brashears",
            "tmobile",
            "pyinstaller",
            "password",
            "dns poisoning",
            "domains",
            "abuse",
            "kiannas law",
            "cyber security",
            "cisco umbrella",
            "site",
            "malware site",
            "malicious site",
            "safe site",
            "alexa top",
            "million",
            "phishing site",
            "team phishing",
            "exploit",
            "download",
            "unruy",
            "alexa",
            "riskware",
            "back",
            "azorult",
            "phishing",
            "service",
            "runescape",
            "facebook",
            "bank",
            "team",
            "cutwail",
            "adload",
            "maltiverse",
            "kryptik",
            "united",
            "cyber threat",
            "engineering",
            "bambernek",
            "strike",
            "zbot",
            "suppobox",
            "malicious",
            "ransomware",
            "virut",
            "bandoo",
            "matsnu",
            "iframe",
            "zeus",
            "agent",
            "steam",
            "nymaim",
            "citadel",
            "heur",
            "covid19",
            "simda",
            "artemis",
            "bradesco",
            "pony",
            "pykspa",
            "sodinokibi",
            "betabot",
            "virustotal",
            "tinba",
            "domaiq",
            "ave maria",
            "revil",
            "downloader",
            "tofsee",
            "vawtrak",
            "hotmail",
            "dnspionage",
            "nexus",
            "generic",
            "andromeda",
            "dropper",
            "crypt",
            "outbreak",
            "wacatac",
            "mimikatz",
            "trojanx",
            "astaroth",
            "keybase",
            "stealer",
            "radamant",
            "kovter",
            "unsafe",
            "win64",
            "conduit",
            "presenoker",
            "opencandy",
            "remcos",
            "miner",
            "agenttesla",
            "trojan",
            "detplock",
            "networm",
            "fusioncore",
            "acint",
            "installpack",
            "xtrat",
            "nircmd",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "fakealert",
            "filetour",
            "installcore",
            "floxif",
            "cleaner",
            "patcher",
            "kgs0",
            "kls0",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "urls",
            "detection list",
            "blacklist http",
            "samples",
            "blacklist"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Kryptik",
              "display_name": "Kryptik",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            }
          ],
          "industries": [
            "Health"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 82,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 518,
            "FileHash-SHA1": 507,
            "FileHash-SHA256": 10945,
            "URL": 19764,
            "domain": 5110,
            "hostname": 8668,
            "CIDR": 2,
            "CVE": 24
          },
          "indicator_count": 45538,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "873 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65401d73e96dd70037ed22a7",
          "name": "Darkside 2020 Ecosystem  .BEware | BGP.tools | Target Tsara Brashears",
          "description": "I don't want to be dramatic but...Main source of cyber attacks. Includes - governmentattic.org, tulach.cc, malvertizing, monitoring. remote attacks, endangered Tsara Brashears attack, BotNet, CNC, telephone service, Apple hacking. https://bgp.tools/prefix/167.203.96.0, adult content, moo.com, afraid.org.  I'm assuming accessed by attorneys and insurance companies to silence people forever. Death references. I can't verify if government complicity is accurate or spoofed. Stranger was owned by American International Group, found in an STSH domain (AIG.com). Last night Ben Cartwright became the sole owner of  domain after being a verified AIG domain. Terrifying.  Looks like the main target is the same.  Tsara Brashears. \nFound in an attack against a device 'malicious sorry index' that caused research effort. \n[auto populated: BGP.TOOLS - bgp.tools - has published its full list of historical records for BGP, which are based on its current IP address address and routing system (PGP).]",
          "modified": "2023-11-29T14:03:31.663000",
          "created": "2023-10-30T21:17:39.802000",
          "tags": [
            "ssl certificate",
            "whois record",
            "contacted",
            "referrer",
            "communicating",
            "resolutions",
            "historical ssl",
            "whois whois",
            "http",
            "critical risk",
            "dark power",
            "cobalt strike",
            "malware",
            "core",
            "critical",
            "copy",
            "formbook",
            "submission",
            "sophos sophos",
            "xcitium verdict",
            "cloud xcitium",
            "verdict cloud",
            "history first",
            "analysis",
            "utc http",
            "response final",
            "url https",
            "march",
            "execution",
            "falcon sandbox",
            "pattern match",
            "changelog",
            "header",
            "layer",
            "data",
            "ipv4",
            "function",
            "file",
            "et tor",
            "known tor",
            "meta",
            "monitoring",
            "date",
            "body",
            "form",
            "august",
            "june",
            "friendly",
            "main",
            "footer",
            "unknown",
            "hybrid",
            "general",
            "click",
            "strings",
            "class",
            "generator",
            "error",
            "pe resource",
            "redline stealer",
            "april",
            "lockbit",
            "emotet",
            "hacktool",
            "apple",
            "tsara brashears",
            "tmobile",
            "pyinstaller",
            "password",
            "dns poisoning",
            "domains",
            "abuse",
            "kiannas law",
            "cyber security",
            "cisco umbrella",
            "site",
            "malware site",
            "malicious site",
            "safe site",
            "alexa top",
            "million",
            "phishing site",
            "team phishing",
            "exploit",
            "download",
            "unruy",
            "alexa",
            "riskware",
            "back",
            "azorult",
            "phishing",
            "service",
            "runescape",
            "facebook",
            "bank",
            "team",
            "cutwail",
            "adload",
            "maltiverse",
            "kryptik",
            "united",
            "cyber threat",
            "engineering",
            "bambernek",
            "strike",
            "zbot",
            "suppobox",
            "malicious",
            "ransomware",
            "virut",
            "bandoo",
            "matsnu",
            "iframe",
            "zeus",
            "agent",
            "steam",
            "nymaim",
            "citadel",
            "heur",
            "covid19",
            "simda",
            "artemis",
            "bradesco",
            "pony",
            "pykspa",
            "sodinokibi",
            "betabot",
            "virustotal",
            "tinba",
            "domaiq",
            "ave maria",
            "revil",
            "downloader",
            "tofsee",
            "vawtrak",
            "hotmail",
            "dnspionage",
            "nexus",
            "generic",
            "andromeda",
            "dropper",
            "crypt",
            "outbreak",
            "wacatac",
            "mimikatz",
            "trojanx",
            "astaroth",
            "keybase",
            "stealer",
            "radamant",
            "kovter",
            "unsafe",
            "win64",
            "conduit",
            "presenoker",
            "opencandy",
            "remcos",
            "miner",
            "agenttesla",
            "trojan",
            "detplock",
            "networm",
            "fusioncore",
            "acint",
            "installpack",
            "xtrat",
            "nircmd",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "fakealert",
            "filetour",
            "installcore",
            "floxif",
            "cleaner",
            "patcher",
            "kgs0",
            "kls0",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "urls",
            "detection list",
            "blacklist http",
            "samples",
            "blacklist"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Kryptik",
              "display_name": "Kryptik",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            }
          ],
          "industries": [
            "Health"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 82,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 518,
            "FileHash-SHA1": 507,
            "FileHash-SHA256": 10945,
            "URL": 19764,
            "domain": 5110,
            "hostname": 8668,
            "CIDR": 2,
            "CVE": 24
          },
          "indicator_count": 45538,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "873 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65401d76b057b79aaf7ba4a7",
          "name": "Darkside 2020 Ecosystem  .BEware | BGP.tools | Target Tsara Brashears",
          "description": "I don't want to be dramatic but...Main source of cyber attacks. Includes - governmentattic.org, tulach.cc, malvertizing, monitoring. remote attacks, endangered Tsara Brashears attack, BotNet, CNC, telephone service, Apple hacking. https://bgp.tools/prefix/167.203.96.0, adult content, moo.com, afraid.org.  I'm assuming accessed by attorneys and insurance companies to silence people forever. Death references. I can't verify if government complicity is accurate or spoofed. Stranger was owned by American International Group, found in an STSH domain (AIG.com). Last night Ben Cartwright became the sole owner of  domain after being a verified AIG domain. Terrifying.  Looks like the main target is the same.  Tsara Brashears. \nFound in an attack against a device 'malicious sorry index' that caused research effort. \n[auto populated: BGP.TOOLS - bgp.tools - has published its full list of historical records for BGP, which are based on its current IP address address and routing system (PGP).]",
          "modified": "2023-11-29T14:03:31.663000",
          "created": "2023-10-30T21:17:40.239000",
          "tags": [
            "ssl certificate",
            "whois record",
            "contacted",
            "referrer",
            "communicating",
            "resolutions",
            "historical ssl",
            "whois whois",
            "http",
            "critical risk",
            "dark power",
            "cobalt strike",
            "malware",
            "core",
            "critical",
            "copy",
            "formbook",
            "submission",
            "sophos sophos",
            "xcitium verdict",
            "cloud xcitium",
            "verdict cloud",
            "history first",
            "analysis",
            "utc http",
            "response final",
            "url https",
            "march",
            "execution",
            "falcon sandbox",
            "pattern match",
            "changelog",
            "header",
            "layer",
            "data",
            "ipv4",
            "function",
            "file",
            "et tor",
            "known tor",
            "meta",
            "monitoring",
            "date",
            "body",
            "form",
            "august",
            "june",
            "friendly",
            "main",
            "footer",
            "unknown",
            "hybrid",
            "general",
            "click",
            "strings",
            "class",
            "generator",
            "error",
            "pe resource",
            "redline stealer",
            "april",
            "lockbit",
            "emotet",
            "hacktool",
            "apple",
            "tsara brashears",
            "tmobile",
            "pyinstaller",
            "password",
            "dns poisoning",
            "domains",
            "abuse",
            "kiannas law",
            "cyber security",
            "cisco umbrella",
            "site",
            "malware site",
            "malicious site",
            "safe site",
            "alexa top",
            "million",
            "phishing site",
            "team phishing",
            "exploit",
            "download",
            "unruy",
            "alexa",
            "riskware",
            "back",
            "azorult",
            "phishing",
            "service",
            "runescape",
            "facebook",
            "bank",
            "team",
            "cutwail",
            "adload",
            "maltiverse",
            "kryptik",
            "united",
            "cyber threat",
            "engineering",
            "bambernek",
            "strike",
            "zbot",
            "suppobox",
            "malicious",
            "ransomware",
            "virut",
            "bandoo",
            "matsnu",
            "iframe",
            "zeus",
            "agent",
            "steam",
            "nymaim",
            "citadel",
            "heur",
            "covid19",
            "simda",
            "artemis",
            "bradesco",
            "pony",
            "pykspa",
            "sodinokibi",
            "betabot",
            "virustotal",
            "tinba",
            "domaiq",
            "ave maria",
            "revil",
            "downloader",
            "tofsee",
            "vawtrak",
            "hotmail",
            "dnspionage",
            "nexus",
            "generic",
            "andromeda",
            "dropper",
            "crypt",
            "outbreak",
            "wacatac",
            "mimikatz",
            "trojanx",
            "astaroth",
            "keybase",
            "stealer",
            "radamant",
            "kovter",
            "unsafe",
            "win64",
            "conduit",
            "presenoker",
            "opencandy",
            "remcos",
            "miner",
            "agenttesla",
            "trojan",
            "detplock",
            "networm",
            "fusioncore",
            "acint",
            "installpack",
            "xtrat",
            "nircmd",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "fakealert",
            "filetour",
            "installcore",
            "floxif",
            "cleaner",
            "patcher",
            "kgs0",
            "kls0",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "urls",
            "detection list",
            "blacklist http",
            "samples",
            "blacklist"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Kryptik",
              "display_name": "Kryptik",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            }
          ],
          "industries": [
            "Health"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 84,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 518,
            "FileHash-SHA1": 507,
            "FileHash-SHA256": 10945,
            "URL": 19764,
            "domain": 5110,
            "hostname": 8668,
            "CIDR": 2,
            "CVE": 24
          },
          "indicator_count": 45538,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "873 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65401d8480e4a9ed725f6458",
          "name": "Darkside 2020 Ecosystem  .BEware | BGP.tools | Target Tsara Brashears",
          "description": "I don't want to be dramatic but...Main source of cyber attacks. Includes - governmentattic.org, tulach.cc, malvertizing, monitoring. remote attacks, endangered Tsara Brashears attack, BotNet, CNC, telephone service, Apple hacking. https://bgp.tools/prefix/167.203.96.0, adult content, moo.com, afraid.org.  I'm assuming accessed by attorneys and insurance companies to silence people forever. Death references. I can't verify if government complicity is accurate or spoofed. Stranger was owned by American International Group, found in an STSH domain (AIG.com). Last night Ben Cartwright became the sole owner of  domain after being a verified AIG domain. Terrifying.  Looks like the main target is the same.  Tsara Brashears. \nFound in an attack against a device 'malicious sorry index' that caused research effort. \n[auto populated: BGP.TOOLS - bgp.tools - has published its full list of historical records for BGP, which are based on its current IP address address and routing system (PGP).]",
          "modified": "2023-11-29T14:03:31.663000",
          "created": "2023-10-30T21:17:56.820000",
          "tags": [
            "ssl certificate",
            "whois record",
            "contacted",
            "referrer",
            "communicating",
            "resolutions",
            "historical ssl",
            "whois whois",
            "http",
            "critical risk",
            "dark power",
            "cobalt strike",
            "malware",
            "core",
            "critical",
            "copy",
            "formbook",
            "submission",
            "sophos sophos",
            "xcitium verdict",
            "cloud xcitium",
            "verdict cloud",
            "history first",
            "analysis",
            "utc http",
            "response final",
            "url https",
            "march",
            "execution",
            "falcon sandbox",
            "pattern match",
            "changelog",
            "header",
            "layer",
            "data",
            "ipv4",
            "function",
            "file",
            "et tor",
            "known tor",
            "meta",
            "monitoring",
            "date",
            "body",
            "form",
            "august",
            "june",
            "friendly",
            "main",
            "footer",
            "unknown",
            "hybrid",
            "general",
            "click",
            "strings",
            "class",
            "generator",
            "error",
            "pe resource",
            "redline stealer",
            "april",
            "lockbit",
            "emotet",
            "hacktool",
            "apple",
            "tsara brashears",
            "tmobile",
            "pyinstaller",
            "password",
            "dns poisoning",
            "domains",
            "abuse",
            "kiannas law",
            "cyber security",
            "cisco umbrella",
            "site",
            "malware site",
            "malicious site",
            "safe site",
            "alexa top",
            "million",
            "phishing site",
            "team phishing",
            "exploit",
            "download",
            "unruy",
            "alexa",
            "riskware",
            "back",
            "azorult",
            "phishing",
            "service",
            "runescape",
            "facebook",
            "bank",
            "team",
            "cutwail",
            "adload",
            "maltiverse",
            "kryptik",
            "united",
            "cyber threat",
            "engineering",
            "bambernek",
            "strike",
            "zbot",
            "suppobox",
            "malicious",
            "ransomware",
            "virut",
            "bandoo",
            "matsnu",
            "iframe",
            "zeus",
            "agent",
            "steam",
            "nymaim",
            "citadel",
            "heur",
            "covid19",
            "simda",
            "artemis",
            "bradesco",
            "pony",
            "pykspa",
            "sodinokibi",
            "betabot",
            "virustotal",
            "tinba",
            "domaiq",
            "ave maria",
            "revil",
            "downloader",
            "tofsee",
            "vawtrak",
            "hotmail",
            "dnspionage",
            "nexus",
            "generic",
            "andromeda",
            "dropper",
            "crypt",
            "outbreak",
            "wacatac",
            "mimikatz",
            "trojanx",
            "astaroth",
            "keybase",
            "stealer",
            "radamant",
            "kovter",
            "unsafe",
            "win64",
            "conduit",
            "presenoker",
            "opencandy",
            "remcos",
            "miner",
            "agenttesla",
            "trojan",
            "detplock",
            "networm",
            "fusioncore",
            "acint",
            "installpack",
            "xtrat",
            "nircmd",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "fakealert",
            "filetour",
            "installcore",
            "floxif",
            "cleaner",
            "patcher",
            "kgs0",
            "kls0",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "urls",
            "detection list",
            "blacklist http",
            "samples",
            "blacklist"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Kryptik",
              "display_name": "Kryptik",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            }
          ],
          "industries": [
            "Health"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 83,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 518,
            "FileHash-SHA1": 507,
            "FileHash-SHA256": 10945,
            "URL": 19764,
            "domain": 5110,
            "hostname": 8668,
            "CIDR": 2,
            "CVE": 24
          },
          "indicator_count": 45538,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "873 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65401da888067e7f6379d23e",
          "name": "Darkside 2020 Ecosystem  .BEware | BGP.tools | Target Tsara Brashears",
          "description": "I'm actually uncomfortable finding this.",
          "modified": "2023-11-29T14:03:31.663000",
          "created": "2023-10-30T21:18:32.141000",
          "tags": [
            "ssl certificate",
            "whois record",
            "contacted",
            "referrer",
            "communicating",
            "resolutions",
            "historical ssl",
            "whois whois",
            "http",
            "critical risk",
            "dark power",
            "cobalt strike",
            "malware",
            "core",
            "critical",
            "copy",
            "formbook",
            "submission",
            "sophos sophos",
            "xcitium verdict",
            "cloud xcitium",
            "verdict cloud",
            "history first",
            "analysis",
            "utc http",
            "response final",
            "url https",
            "march",
            "execution",
            "falcon sandbox",
            "pattern match",
            "changelog",
            "header",
            "layer",
            "data",
            "ipv4",
            "function",
            "file",
            "et tor",
            "known tor",
            "meta",
            "monitoring",
            "date",
            "body",
            "form",
            "august",
            "june",
            "friendly",
            "main",
            "footer",
            "unknown",
            "hybrid",
            "general",
            "click",
            "strings",
            "class",
            "generator",
            "error",
            "pe resource",
            "redline stealer",
            "april",
            "lockbit",
            "emotet",
            "hacktool",
            "apple",
            "tsara brashears",
            "tmobile",
            "pyinstaller",
            "password",
            "dns poisoning",
            "domains",
            "abuse",
            "kiannas law",
            "cyber security",
            "cisco umbrella",
            "site",
            "malware site",
            "malicious site",
            "safe site",
            "alexa top",
            "million",
            "phishing site",
            "team phishing",
            "exploit",
            "download",
            "unruy",
            "alexa",
            "riskware",
            "back",
            "azorult",
            "phishing",
            "service",
            "runescape",
            "facebook",
            "bank",
            "team",
            "cutwail",
            "adload",
            "maltiverse",
            "kryptik",
            "united",
            "cyber threat",
            "engineering",
            "bambernek",
            "strike",
            "zbot",
            "suppobox",
            "malicious",
            "ransomware",
            "virut",
            "bandoo",
            "matsnu",
            "iframe",
            "zeus",
            "agent",
            "steam",
            "nymaim",
            "citadel",
            "heur",
            "covid19",
            "simda",
            "artemis",
            "bradesco",
            "pony",
            "pykspa",
            "sodinokibi",
            "betabot",
            "virustotal",
            "tinba",
            "domaiq",
            "ave maria",
            "revil",
            "downloader",
            "tofsee",
            "vawtrak",
            "hotmail",
            "dnspionage",
            "nexus",
            "generic",
            "andromeda",
            "dropper",
            "crypt",
            "outbreak",
            "wacatac",
            "mimikatz",
            "trojanx",
            "astaroth",
            "keybase",
            "stealer",
            "radamant",
            "kovter",
            "unsafe",
            "win64",
            "conduit",
            "presenoker",
            "opencandy",
            "remcos",
            "miner",
            "agenttesla",
            "trojan",
            "detplock",
            "networm",
            "fusioncore",
            "acint",
            "installpack",
            "xtrat",
            "nircmd",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "fakealert",
            "filetour",
            "installcore",
            "floxif",
            "cleaner",
            "patcher",
            "kgs0",
            "kls0",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "urls",
            "detection list",
            "blacklist http",
            "samples",
            "blacklist"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Kryptik",
              "display_name": "Kryptik",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            }
          ],
          "industries": [
            "Health"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 84,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 518,
            "FileHash-SHA1": 507,
            "FileHash-SHA256": 8601,
            "URL": 7499,
            "domain": 4603,
            "hostname": 4187,
            "CIDR": 2,
            "CVE": 23
          },
          "indicator_count": 25940,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "873 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65401dbe47ce126e7468a2dc",
          "name": "Darkside 2020 Ecosystem  .BEware | BGP.tools | Target Tsara Brashears",
          "description": "I'm actually uncomfortable finding this.",
          "modified": "2023-11-29T14:03:31.663000",
          "created": "2023-10-30T21:18:54.411000",
          "tags": [
            "ssl certificate",
            "whois record",
            "contacted",
            "referrer",
            "communicating",
            "resolutions",
            "historical ssl",
            "whois whois",
            "http",
            "critical risk",
            "dark power",
            "cobalt strike",
            "malware",
            "core",
            "critical",
            "copy",
            "formbook",
            "submission",
            "sophos sophos",
            "xcitium verdict",
            "cloud xcitium",
            "verdict cloud",
            "history first",
            "analysis",
            "utc http",
            "response final",
            "url https",
            "march",
            "execution",
            "falcon sandbox",
            "pattern match",
            "changelog",
            "header",
            "layer",
            "data",
            "ipv4",
            "function",
            "file",
            "et tor",
            "known tor",
            "meta",
            "monitoring",
            "date",
            "body",
            "form",
            "august",
            "june",
            "friendly",
            "main",
            "footer",
            "unknown",
            "hybrid",
            "general",
            "click",
            "strings",
            "class",
            "generator",
            "error",
            "pe resource",
            "redline stealer",
            "april",
            "lockbit",
            "emotet",
            "hacktool",
            "apple",
            "tsara brashears",
            "tmobile",
            "pyinstaller",
            "password",
            "dns poisoning",
            "domains",
            "abuse",
            "kiannas law",
            "cyber security",
            "cisco umbrella",
            "site",
            "malware site",
            "malicious site",
            "safe site",
            "alexa top",
            "million",
            "phishing site",
            "team phishing",
            "exploit",
            "download",
            "unruy",
            "alexa",
            "riskware",
            "back",
            "azorult",
            "phishing",
            "service",
            "runescape",
            "facebook",
            "bank",
            "team",
            "cutwail",
            "adload",
            "maltiverse",
            "kryptik",
            "united",
            "cyber threat",
            "engineering",
            "bambernek",
            "strike",
            "zbot",
            "suppobox",
            "malicious",
            "ransomware",
            "virut",
            "bandoo",
            "matsnu",
            "iframe",
            "zeus",
            "agent",
            "steam",
            "nymaim",
            "citadel",
            "heur",
            "covid19",
            "simda",
            "artemis",
            "bradesco",
            "pony",
            "pykspa",
            "sodinokibi",
            "betabot",
            "virustotal",
            "tinba",
            "domaiq",
            "ave maria",
            "revil",
            "downloader",
            "tofsee",
            "vawtrak",
            "hotmail",
            "dnspionage",
            "nexus",
            "generic",
            "andromeda",
            "dropper",
            "crypt",
            "outbreak",
            "wacatac",
            "mimikatz",
            "trojanx",
            "astaroth",
            "keybase",
            "stealer",
            "radamant",
            "kovter",
            "unsafe",
            "win64",
            "conduit",
            "presenoker",
            "opencandy",
            "remcos",
            "miner",
            "agenttesla",
            "trojan",
            "detplock",
            "networm",
            "fusioncore",
            "acint",
            "installpack",
            "xtrat",
            "nircmd",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "fakealert",
            "filetour",
            "installcore",
            "floxif",
            "cleaner",
            "patcher",
            "kgs0",
            "kls0",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "urls",
            "detection list",
            "blacklist http",
            "samples",
            "blacklist"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Kryptik",
              "display_name": "Kryptik",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            }
          ],
          "industries": [
            "Health"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 85,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 518,
            "FileHash-SHA1": 507,
            "FileHash-SHA256": 8601,
            "URL": 7499,
            "domain": 4603,
            "hostname": 4187,
            "CIDR": 2,
            "CVE": 23
          },
          "indicator_count": 25940,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "873 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65401fcb063a0a34fa323603",
          "name": "Darkside 2020 Ecosystem  .BEware | BGP.tools | Target Tsara Brashears",
          "description": "Law Enforcement? DOJ? ACLU? Help? This is CRAZY.\nSilencing.\nI like her song clicked on link but it was malicious. I was redirected to an Indian link that looked like YouTube.\nI am a professional, awarded researcher in many areas, parent, security researcher, graphic designer, supplier, music lover ,  disabled. overly curious and hacked. HELP. SCARED",
          "modified": "2023-11-29T14:03:31.663000",
          "created": "2023-10-30T21:27:39.980000",
          "tags": [
            "ssl certificate",
            "whois record",
            "contacted",
            "referrer",
            "communicating",
            "resolutions",
            "historical ssl",
            "whois whois",
            "http",
            "critical risk",
            "dark power",
            "cobalt strike",
            "malware",
            "core",
            "critical",
            "copy",
            "formbook",
            "submission",
            "sophos sophos",
            "xcitium verdict",
            "cloud xcitium",
            "verdict cloud",
            "history first",
            "analysis",
            "utc http",
            "response final",
            "url https",
            "march",
            "execution",
            "falcon sandbox",
            "pattern match",
            "changelog",
            "header",
            "layer",
            "data",
            "ipv4",
            "function",
            "file",
            "et tor",
            "known tor",
            "meta",
            "monitoring",
            "date",
            "body",
            "form",
            "august",
            "june",
            "friendly",
            "main",
            "footer",
            "unknown",
            "hybrid",
            "general",
            "click",
            "strings",
            "class",
            "generator",
            "error",
            "pe resource",
            "redline stealer",
            "april",
            "lockbit",
            "emotet",
            "hacktool",
            "apple",
            "tsara brashears",
            "tmobile",
            "pyinstaller",
            "password",
            "dns poisoning",
            "domains",
            "abuse",
            "kiannas law",
            "cyber security",
            "cisco umbrella",
            "site",
            "malware site",
            "malicious site",
            "safe site",
            "alexa top",
            "million",
            "phishing site",
            "team phishing",
            "exploit",
            "download",
            "unruy",
            "alexa",
            "riskware",
            "back",
            "azorult",
            "phishing",
            "service",
            "runescape",
            "facebook",
            "bank",
            "team",
            "cutwail",
            "adload",
            "maltiverse",
            "kryptik",
            "united",
            "cyber threat",
            "engineering",
            "bambernek",
            "strike",
            "zbot",
            "suppobox",
            "malicious",
            "ransomware",
            "virut",
            "bandoo",
            "matsnu",
            "iframe",
            "zeus",
            "agent",
            "steam",
            "nymaim",
            "citadel",
            "heur",
            "covid19",
            "simda",
            "artemis",
            "bradesco",
            "pony",
            "pykspa",
            "sodinokibi",
            "betabot",
            "virustotal",
            "tinba",
            "domaiq",
            "ave maria",
            "revil",
            "downloader",
            "tofsee",
            "vawtrak",
            "hotmail",
            "dnspionage",
            "nexus",
            "generic",
            "andromeda",
            "dropper",
            "crypt",
            "outbreak",
            "wacatac",
            "mimikatz",
            "trojanx",
            "astaroth",
            "keybase",
            "stealer",
            "radamant",
            "kovter",
            "unsafe",
            "win64",
            "conduit",
            "presenoker",
            "opencandy",
            "remcos",
            "miner",
            "agenttesla",
            "trojan",
            "detplock",
            "networm",
            "fusioncore",
            "acint",
            "installpack",
            "xtrat",
            "nircmd",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "fakealert",
            "filetour",
            "installcore",
            "floxif",
            "cleaner",
            "patcher",
            "kgs0",
            "kls0",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "urls",
            "detection list",
            "blacklist http",
            "samples",
            "blacklist"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Kryptik",
              "display_name": "Kryptik",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            }
          ],
          "industries": [
            "Health"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 87,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 518,
            "FileHash-SHA1": 507,
            "FileHash-SHA256": 8601,
            "URL": 7499,
            "domain": 4603,
            "hostname": 4187,
            "CIDR": 2,
            "CVE": 23
          },
          "indicator_count": 25940,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "873 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65401fddb74fe1ea8506132d",
          "name": "Darkside 2020 Ecosystem  .BEware | BGP.tools | Target Tsara Brashears",
          "description": "Law Enforcement? DOJ? ACLU? Help? This is CRAZY.\nSilencing.\nI like her song clicked on link but it was malicious. I was redirected to an Indian link that looked like YouTube.\nI am a professional, awarded researcher in many areas, parent, security researcher, graphic designer, supplier, music lover ,  disabled. overly curious and hacked. HELP. SCARED",
          "modified": "2023-11-29T14:03:31.663000",
          "created": "2023-10-30T21:27:57.026000",
          "tags": [
            "ssl certificate",
            "whois record",
            "contacted",
            "referrer",
            "communicating",
            "resolutions",
            "historical ssl",
            "whois whois",
            "http",
            "critical risk",
            "dark power",
            "cobalt strike",
            "malware",
            "core",
            "critical",
            "copy",
            "formbook",
            "submission",
            "sophos sophos",
            "xcitium verdict",
            "cloud xcitium",
            "verdict cloud",
            "history first",
            "analysis",
            "utc http",
            "response final",
            "url https",
            "march",
            "execution",
            "falcon sandbox",
            "pattern match",
            "changelog",
            "header",
            "layer",
            "data",
            "ipv4",
            "function",
            "file",
            "et tor",
            "known tor",
            "meta",
            "monitoring",
            "date",
            "body",
            "form",
            "august",
            "june",
            "friendly",
            "main",
            "footer",
            "unknown",
            "hybrid",
            "general",
            "click",
            "strings",
            "class",
            "generator",
            "error",
            "pe resource",
            "redline stealer",
            "april",
            "lockbit",
            "emotet",
            "hacktool",
            "apple",
            "tsara brashears",
            "tmobile",
            "pyinstaller",
            "password",
            "dns poisoning",
            "domains",
            "abuse",
            "kiannas law",
            "cyber security",
            "cisco umbrella",
            "site",
            "malware site",
            "malicious site",
            "safe site",
            "alexa top",
            "million",
            "phishing site",
            "team phishing",
            "exploit",
            "download",
            "unruy",
            "alexa",
            "riskware",
            "back",
            "azorult",
            "phishing",
            "service",
            "runescape",
            "facebook",
            "bank",
            "team",
            "cutwail",
            "adload",
            "maltiverse",
            "kryptik",
            "united",
            "cyber threat",
            "engineering",
            "bambernek",
            "strike",
            "zbot",
            "suppobox",
            "malicious",
            "ransomware",
            "virut",
            "bandoo",
            "matsnu",
            "iframe",
            "zeus",
            "agent",
            "steam",
            "nymaim",
            "citadel",
            "heur",
            "covid19",
            "simda",
            "artemis",
            "bradesco",
            "pony",
            "pykspa",
            "sodinokibi",
            "betabot",
            "virustotal",
            "tinba",
            "domaiq",
            "ave maria",
            "revil",
            "downloader",
            "tofsee",
            "vawtrak",
            "hotmail",
            "dnspionage",
            "nexus",
            "generic",
            "andromeda",
            "dropper",
            "crypt",
            "outbreak",
            "wacatac",
            "mimikatz",
            "trojanx",
            "astaroth",
            "keybase",
            "stealer",
            "radamant",
            "kovter",
            "unsafe",
            "win64",
            "conduit",
            "presenoker",
            "opencandy",
            "remcos",
            "miner",
            "agenttesla",
            "trojan",
            "detplock",
            "networm",
            "fusioncore",
            "acint",
            "installpack",
            "xtrat",
            "nircmd",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "fakealert",
            "filetour",
            "installcore",
            "floxif",
            "cleaner",
            "patcher",
            "kgs0",
            "kls0",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "urls",
            "detection list",
            "blacklist http",
            "samples",
            "blacklist"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Kryptik",
              "display_name": "Kryptik",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            }
          ],
          "industries": [
            "Health"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 92,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 518,
            "FileHash-SHA1": 507,
            "FileHash-SHA256": 8601,
            "URL": 7499,
            "domain": 4603,
            "hostname": 4187,
            "CIDR": 2,
            "CVE": 23
          },
          "indicator_count": 25940,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "873 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65402a8dec948bec8b0a0372",
          "name": "24 CVE's | Health Liability bDarkside 2020 Ecosystem .BEware",
          "description": "Matrix of cyber crime attacks appears to involved legal entities and a division of Workers Compensation Colorado, possibly used nationally. Targeting, monitoring, tracking, malvertizing, cyber attacks, CNC. Critical.\nCould probably be disputed $$$$ though undisputable. \nEd Said. \nhttp://1.116.132.182/weblogic_CVE_2020_2551.jar\t\t\t\nCVE-2020-0601\t\t\t\t\t\nCVE-2018-8174\t\t\t\nCVE-2018-4893\t\t\t\nCVE-2018-0802\t\t\t\nCVE-2017-8759\t\t\t\t\t\t\nCVE-2017-8464\t\t\t\nCVE-2017-1188\t\t\t\t\nCVE-2017-0143\t\t\t\nCVE-2016-7262\t\t\t\nCVE-2014-6352\t\t\t\nCVE-2013-2465\t\t\t\nCVE-2011-2110\t\t\t\nCVE-2011-0609\t\t\t\nCVE-2010-2568\t\t\t\nCVE-2018-8453\t\t\t\nCVE-2013-1331\nCVE-2012-1856\t\t\t\t\nCVE-2012-0158\t\t\t\t\t\t\nCVE-2017-8570\t\t\t\nCVE-2017-11882\t\t\t\nCVE-2017-0199\t\t\t\t\t\t\nCVE-2017-0147\t\t\t\t\t\t\nCVE-2014-3153",
          "modified": "2023-11-29T14:03:31.663000",
          "created": "2023-10-30T22:13:33.427000",
          "tags": [
            "ssl certificate",
            "whois record",
            "contacted",
            "referrer",
            "communicating",
            "resolutions",
            "historical ssl",
            "whois whois",
            "http",
            "critical risk",
            "dark power",
            "cobalt strike",
            "malware",
            "core",
            "critical",
            "copy",
            "formbook",
            "submission",
            "sophos sophos",
            "xcitium verdict",
            "cloud xcitium",
            "verdict cloud",
            "history first",
            "analysis",
            "utc http",
            "response final",
            "url https",
            "march",
            "execution",
            "falcon sandbox",
            "pattern match",
            "changelog",
            "header",
            "layer",
            "data",
            "ipv4",
            "function",
            "file",
            "et tor",
            "known tor",
            "meta",
            "monitoring",
            "date",
            "body",
            "form",
            "august",
            "june",
            "friendly",
            "main",
            "footer",
            "unknown",
            "hybrid",
            "general",
            "click",
            "strings",
            "class",
            "generator",
            "error",
            "pe resource",
            "redline stealer",
            "april",
            "lockbit",
            "emotet",
            "hacktool",
            "apple",
            "tsara brashears",
            "tmobile",
            "pyinstaller",
            "password",
            "dns poisoning",
            "domains",
            "abuse",
            "kiannas law",
            "cyber security",
            "cisco umbrella",
            "site",
            "malware site",
            "malicious site",
            "safe site",
            "alexa top",
            "million",
            "phishing site",
            "team phishing",
            "exploit",
            "download",
            "unruy",
            "alexa",
            "riskware",
            "back",
            "azorult",
            "phishing",
            "service",
            "runescape",
            "facebook",
            "bank",
            "team",
            "cutwail",
            "adload",
            "maltiverse",
            "kryptik",
            "united",
            "cyber threat",
            "engineering",
            "bambernek",
            "strike",
            "zbot",
            "suppobox",
            "malicious",
            "ransomware",
            "virut",
            "bandoo",
            "matsnu",
            "iframe",
            "zeus",
            "agent",
            "steam",
            "nymaim",
            "citadel",
            "heur",
            "covid19",
            "simda",
            "artemis",
            "bradesco",
            "pony",
            "pykspa",
            "sodinokibi",
            "betabot",
            "virustotal",
            "tinba",
            "domaiq",
            "ave maria",
            "revil",
            "downloader",
            "tofsee",
            "vawtrak",
            "hotmail",
            "dnspionage",
            "nexus",
            "generic",
            "andromeda",
            "dropper",
            "crypt",
            "outbreak",
            "wacatac",
            "mimikatz",
            "trojanx",
            "astaroth",
            "keybase",
            "stealer",
            "radamant",
            "kovter",
            "unsafe",
            "win64",
            "conduit",
            "presenoker",
            "opencandy",
            "remcos",
            "miner",
            "agenttesla",
            "trojan",
            "detplock",
            "networm",
            "fusioncore",
            "acint",
            "installpack",
            "xtrat",
            "nircmd",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "fakealert",
            "filetour",
            "installcore",
            "floxif",
            "cleaner",
            "patcher",
            "kgs0",
            "kls0",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "urls",
            "detection list",
            "blacklist http",
            "samples",
            "blacklist"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Kryptik",
              "display_name": "Kryptik",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            }
          ],
          "industries": [
            "Health"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 92,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 518,
            "FileHash-SHA1": 507,
            "FileHash-SHA256": 8601,
            "URL": 7499,
            "domain": 4603,
            "hostname": 4187,
            "CIDR": 2,
            "CVE": 23
          },
          "indicator_count": 25940,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "873 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65403022038832e42175601f",
          "name": "CRITICAL!!! | Health Insurance Cyber threat Matrix - Darkside 2020 Ecosystem .BEware ",
          "description": "",
          "modified": "2023-11-29T14:03:31.663000",
          "created": "2023-10-30T22:37:22.425000",
          "tags": [
            "ssl certificate",
            "whois record",
            "contacted",
            "referrer",
            "communicating",
            "resolutions",
            "historical ssl",
            "whois whois",
            "http",
            "critical risk",
            "dark power",
            "cobalt strike",
            "malware",
            "core",
            "critical",
            "copy",
            "formbook",
            "submission",
            "sophos sophos",
            "xcitium verdict",
            "cloud xcitium",
            "verdict cloud",
            "history first",
            "analysis",
            "utc http",
            "response final",
            "url https",
            "march",
            "execution",
            "falcon sandbox",
            "pattern match",
            "changelog",
            "header",
            "layer",
            "data",
            "ipv4",
            "function",
            "file",
            "et tor",
            "known tor",
            "meta",
            "monitoring",
            "date",
            "body",
            "form",
            "august",
            "june",
            "friendly",
            "main",
            "footer",
            "unknown",
            "hybrid",
            "general",
            "click",
            "strings",
            "class",
            "generator",
            "error",
            "pe resource",
            "redline stealer",
            "april",
            "lockbit",
            "emotet",
            "hacktool",
            "apple",
            "tsara brashears",
            "tmobile",
            "pyinstaller",
            "password",
            "dns poisoning",
            "domains",
            "abuse",
            "kiannas law",
            "cyber security",
            "cisco umbrella",
            "site",
            "malware site",
            "malicious site",
            "safe site",
            "alexa top",
            "million",
            "phishing site",
            "team phishing",
            "exploit",
            "download",
            "unruy",
            "alexa",
            "riskware",
            "back",
            "azorult",
            "phishing",
            "service",
            "runescape",
            "facebook",
            "bank",
            "team",
            "cutwail",
            "adload",
            "maltiverse",
            "kryptik",
            "united",
            "cyber threat",
            "engineering",
            "bambernek",
            "strike",
            "zbot",
            "suppobox",
            "malicious",
            "ransomware",
            "virut",
            "bandoo",
            "matsnu",
            "iframe",
            "zeus",
            "agent",
            "steam",
            "nymaim",
            "citadel",
            "heur",
            "covid19",
            "simda",
            "artemis",
            "bradesco",
            "pony",
            "pykspa",
            "sodinokibi",
            "betabot",
            "virustotal",
            "tinba",
            "domaiq",
            "ave maria",
            "revil",
            "downloader",
            "tofsee",
            "vawtrak",
            "hotmail",
            "dnspionage",
            "nexus",
            "generic",
            "andromeda",
            "dropper",
            "crypt",
            "outbreak",
            "wacatac",
            "mimikatz",
            "trojanx",
            "astaroth",
            "keybase",
            "stealer",
            "radamant",
            "kovter",
            "unsafe",
            "win64",
            "conduit",
            "presenoker",
            "opencandy",
            "remcos",
            "miner",
            "agenttesla",
            "trojan",
            "detplock",
            "networm",
            "fusioncore",
            "acint",
            "installpack",
            "xtrat",
            "nircmd",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "fakealert",
            "filetour",
            "installcore",
            "floxif",
            "cleaner",
            "patcher",
            "kgs0",
            "kls0",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "urls",
            "detection list",
            "blacklist http",
            "samples",
            "blacklist"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Kryptik",
              "display_name": "Kryptik",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            }
          ],
          "industries": [
            "Health"
          ],
          "TLP": "green",
          "cloned_from": "65402a8dec948bec8b0a0372",
          "export_count": 95,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 518,
            "FileHash-SHA1": 507,
            "FileHash-SHA256": 8601,
            "URL": 7499,
            "domain": 4604,
            "hostname": 4187,
            "CIDR": 2,
            "CVE": 23,
            "URI": 1
          },
          "indicator_count": 25942,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 227,
          "modified_text": "873 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "654140bae73f795aa914e8de",
          "name": "Darkside 2020 Ecosystem .BEware | BGP.tools | Target Tsara Brashears",
          "description": "",
          "modified": "2023-11-29T14:03:31.663000",
          "created": "2023-10-31T18:00:26.439000",
          "tags": [
            "ssl certificate",
            "whois record",
            "contacted",
            "referrer",
            "communicating",
            "resolutions",
            "historical ssl",
            "whois whois",
            "http",
            "critical risk",
            "dark power",
            "cobalt strike",
            "malware",
            "core",
            "critical",
            "copy",
            "formbook",
            "submission",
            "sophos sophos",
            "xcitium verdict",
            "cloud xcitium",
            "verdict cloud",
            "history first",
            "analysis",
            "utc http",
            "response final",
            "url https",
            "march",
            "execution",
            "falcon sandbox",
            "pattern match",
            "changelog",
            "header",
            "layer",
            "data",
            "ipv4",
            "function",
            "file",
            "et tor",
            "known tor",
            "meta",
            "monitoring",
            "date",
            "body",
            "form",
            "august",
            "june",
            "friendly",
            "main",
            "footer",
            "unknown",
            "hybrid",
            "general",
            "click",
            "strings",
            "class",
            "generator",
            "error",
            "pe resource",
            "redline stealer",
            "april",
            "lockbit",
            "emotet",
            "hacktool",
            "apple",
            "tsara brashears",
            "tmobile",
            "pyinstaller",
            "password",
            "dns poisoning",
            "domains",
            "abuse",
            "kiannas law",
            "cyber security",
            "cisco umbrella",
            "site",
            "malware site",
            "malicious site",
            "safe site",
            "alexa top",
            "million",
            "phishing site",
            "team phishing",
            "exploit",
            "download",
            "unruy",
            "alexa",
            "riskware",
            "back",
            "azorult",
            "phishing",
            "service",
            "runescape",
            "facebook",
            "bank",
            "team",
            "cutwail",
            "adload",
            "maltiverse",
            "kryptik",
            "united",
            "cyber threat",
            "engineering",
            "bambernek",
            "strike",
            "zbot",
            "suppobox",
            "malicious",
            "ransomware",
            "virut",
            "bandoo",
            "matsnu",
            "iframe",
            "zeus",
            "agent",
            "steam",
            "nymaim",
            "citadel",
            "heur",
            "covid19",
            "simda",
            "artemis",
            "bradesco",
            "pony",
            "pykspa",
            "sodinokibi",
            "betabot",
            "virustotal",
            "tinba",
            "domaiq",
            "ave maria",
            "revil",
            "downloader",
            "tofsee",
            "vawtrak",
            "hotmail",
            "dnspionage",
            "nexus",
            "generic",
            "andromeda",
            "dropper",
            "crypt",
            "outbreak",
            "wacatac",
            "mimikatz",
            "trojanx",
            "astaroth",
            "keybase",
            "stealer",
            "radamant",
            "kovter",
            "unsafe",
            "win64",
            "conduit",
            "presenoker",
            "opencandy",
            "remcos",
            "miner",
            "agenttesla",
            "trojan",
            "detplock",
            "networm",
            "fusioncore",
            "acint",
            "installpack",
            "xtrat",
            "nircmd",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "fakealert",
            "filetour",
            "installcore",
            "floxif",
            "cleaner",
            "patcher",
            "kgs0",
            "kls0",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "urls",
            "detection list",
            "blacklist http",
            "samples",
            "blacklist"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Kryptik",
              "display_name": "Kryptik",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            }
          ],
          "industries": [
            "Health"
          ],
          "TLP": "green",
          "cloned_from": "65401d73e96dd70037ed22a7",
          "export_count": 98,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 518,
            "FileHash-SHA1": 507,
            "FileHash-SHA256": 10945,
            "URL": 19764,
            "domain": 5110,
            "hostname": 8668,
            "CIDR": 2,
            "CVE": 24
          },
          "indicator_count": 45538,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 223,
          "modified_text": "873 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6544cbbca7610e92e4262c47",
          "name": "Darkside 2020 Ecosystem .BEware | BGP.tools | Targeting",
          "description": "",
          "modified": "2023-11-29T14:03:31.663000",
          "created": "2023-11-03T10:30:20.965000",
          "tags": [
            "ssl certificate",
            "whois record",
            "contacted",
            "referrer",
            "communicating",
            "resolutions",
            "historical ssl",
            "whois whois",
            "http",
            "critical risk",
            "dark power",
            "cobalt strike",
            "malware",
            "core",
            "critical",
            "copy",
            "formbook",
            "submission",
            "sophos sophos",
            "xcitium verdict",
            "cloud xcitium",
            "verdict cloud",
            "history first",
            "analysis",
            "utc http",
            "response final",
            "url https",
            "march",
            "execution",
            "falcon sandbox",
            "pattern match",
            "changelog",
            "header",
            "layer",
            "data",
            "ipv4",
            "function",
            "file",
            "et tor",
            "known tor",
            "meta",
            "monitoring",
            "date",
            "body",
            "form",
            "august",
            "june",
            "friendly",
            "main",
            "footer",
            "unknown",
            "hybrid",
            "general",
            "click",
            "strings",
            "class",
            "generator",
            "error",
            "pe resource",
            "redline stealer",
            "april",
            "lockbit",
            "emotet",
            "hacktool",
            "apple",
            "tsara brashears",
            "tmobile",
            "pyinstaller",
            "password",
            "dns poisoning",
            "domains",
            "abuse",
            "kiannas law",
            "cyber security",
            "cisco umbrella",
            "site",
            "malware site",
            "malicious site",
            "safe site",
            "alexa top",
            "million",
            "phishing site",
            "team phishing",
            "exploit",
            "download",
            "unruy",
            "alexa",
            "riskware",
            "back",
            "azorult",
            "phishing",
            "service",
            "runescape",
            "facebook",
            "bank",
            "team",
            "cutwail",
            "adload",
            "maltiverse",
            "kryptik",
            "united",
            "cyber threat",
            "engineering",
            "bambernek",
            "strike",
            "zbot",
            "suppobox",
            "malicious",
            "ransomware",
            "virut",
            "bandoo",
            "matsnu",
            "iframe",
            "zeus",
            "agent",
            "steam",
            "nymaim",
            "citadel",
            "heur",
            "covid19",
            "simda",
            "artemis",
            "bradesco",
            "pony",
            "pykspa",
            "sodinokibi",
            "betabot",
            "virustotal",
            "tinba",
            "domaiq",
            "ave maria",
            "revil",
            "downloader",
            "tofsee",
            "vawtrak",
            "hotmail",
            "dnspionage",
            "nexus",
            "generic",
            "andromeda",
            "dropper",
            "crypt",
            "outbreak",
            "wacatac",
            "mimikatz",
            "trojanx",
            "astaroth",
            "keybase",
            "stealer",
            "radamant",
            "kovter",
            "unsafe",
            "win64",
            "conduit",
            "presenoker",
            "opencandy",
            "remcos",
            "miner",
            "agenttesla",
            "trojan",
            "detplock",
            "networm",
            "fusioncore",
            "acint",
            "installpack",
            "xtrat",
            "nircmd",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "fakealert",
            "filetour",
            "installcore",
            "floxif",
            "cleaner",
            "patcher",
            "kgs0",
            "kls0",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "urls",
            "detection list",
            "blacklist http",
            "samples",
            "blacklist"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Kryptik",
              "display_name": "Kryptik",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            }
          ],
          "industries": [
            "Health"
          ],
          "TLP": "green",
          "cloned_from": "654140bae73f795aa914e8de",
          "export_count": 108,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 518,
            "FileHash-SHA1": 507,
            "FileHash-SHA256": 10945,
            "URL": 19764,
            "domain": 5110,
            "hostname": 8668,
            "CIDR": 2,
            "CVE": 24
          },
          "indicator_count": 45538,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "873 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "https://www.milehighmedia.com/legal/2257 [phishing \u2022 Brazzers porn]",
        "honey.exe",
        "message.htm.com",
        "CnC IP's: 206.189.61.126 \u2022 217.74.65.23 \u2022 46.8.8.100 \u2022 64.190.63.111",
        "Relationship: http://www.cpmfun.com/go.php?i=Zml0sXNlQhR0gRzjdXpLNlz4&p=71408&s=1&m=1&ua=mozilla/5.0+(linux;+android+4.4.2;+ast21+build/kvt49l)+",
        "api.login.live.com",
        "stop following, stalking, hacking, talking, modifying, hijacking, threatening, contacting, sending people to harass target, threats",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "0001c8afa9ca148752e1439140fadb6571b27f455ad1474d85625bcddfb63550",
        "CS Sigma Rules: Suspicious Remote Thread Created by Perez Diego (@darkquassar), oscd.community",
        "FileHash-SHA256 c030b0a1be8745d192f45.159.189.105743b3c4f4094f33507a5904c184c8db0bde1a91efccb5  [tracking]",
        "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
        "http://appleid.icloud.com-website33.org/",
        "CS Sigma Rules: Use Remove-Item to Delete File by frack113",
        "http://pornhub.com/gay/video/search",
        "CS Sigma Rules: Python Initiated Connection by frack113",
        "CS Sigma Rules: Suspicious Userinit Child Process by Florian Roth (rule), Samir Bousseaden (idea)",
        "http://45.159.189.105/bot/regex [Tracking Tsara Brashears involves in person following and or harassment as well]"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": []
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Virtool",
            "Trojanspy",
            "Trojandropper:win32",
            "Hacktool",
            "W32.sality.pe",
            "Kryptik",
            "Maltiverse",
            "Tofsee",
            "Virus.win32.virut.q",
            "Relic"
          ],
          "industries": [
            "Health"
          ]
        }
      }
    },
    "false_positive": []
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 13,
  "pulses": [
    {
      "id": "65c7b86fa120d19bbc88f367",
      "name": "Hijacker",
      "description": "Hackers hired to humiliate, threaten,steal data, evidence, recordings , spy and intimidate.",
      "modified": "2024-03-11T17:01:59.026000",
      "created": "2024-02-10T17:54:55.243000",
      "tags": [
        "ssl certificate",
        "whois record",
        "contacted",
        "tsara brashears",
        "referrer",
        "communicating",
        "resolutions",
        "historical ssl",
        "high level",
        "hackers",
        "hacktool",
        "download",
        "malware",
        "crypto",
        "hijacker",
        "monitoring",
        "installer",
        "tofsee",
        "domains domains",
        "domains files",
        "files files",
        "script",
        "kgs0",
        "kls0",
        "relic",
        "iframe",
        "pe32 executable",
        "ms windows",
        "intel",
        "win16 ne",
        "os2 executable",
        "generic windos",
        "executable",
        "dos executable",
        "generic",
        "rticon neutral",
        "info compiler",
        "products id",
        "header intel",
        "name md5",
        "contained",
        "type",
        "language",
        "ico rtgroupicon",
        "neutral",
        "first",
        "utc submissions",
        "submitters",
        "company limited",
        "computer",
        "amazonaes",
        "china telecom",
        "group",
        "csc corporate",
        "domains",
        "malware spreading evader",
        "cnc",
        "malvertizing",
        "milehighmedia",
        "trojandropper",
        "moved",
        "passive dns",
        "urls",
        "as14576",
        "backdoor",
        "scan endpoints",
        "all octoseek",
        "ipv4",
        "pulse pulses",
        "trojan",
        "encrypt",
        "body",
        "date",
        "date hash",
        "avast avg",
        "mtb may",
        "kratona",
        "threat",
        "paste",
        "iocs",
        "analyze",
        "hostnames",
        "urls https",
        "script urls",
        "united",
        "meta",
        "unknown",
        "emails",
        "name servers",
        "search",
        "as62597 nsone",
        "a domains",
        "as397241",
        "media",
        "next",
        "december",
        "unlocker",
        "threat round",
        "apple ios",
        "apple phone",
        "project",
        "blister",
        "agent tesla",
        "open",
        "execution",
        "videos",
        "strong",
        "porn videos",
        "watch",
        "daddy",
        "free",
        "top rated",
        "most viewed",
        "cancel anytime",
        "views",
        "play",
        "black",
        "enjoy",
        "czech",
        "hunk",
        "virtool",
        "cryp",
        "creation date",
        "otx telemetry",
        "expiration date",
        "servers",
        "status",
        "win32",
        "showing",
        "domain",
        "nxdomain",
        "as8075",
        "shell code",
        "threat",
        "cyber espionage",
        "cyber stalking",
        "danger",
        "critical",
        "attack",
        "treats",
        "as15169 google",
        "aaaa",
        "record value",
        "error",
        "entries",
        "hostname",
        "url http",
        "http",
        "files domain",
        "files related",
        "shinjiru msc",
        "sdn bhd",
        "dnssec",
        "protect",
        "as54455 madeit",
        "phishing",
        "backdoor",
        "contextualizing",
        "elevated exposure",
        "malvertizing",
        "ransom",
        "msil",
        "hackers for hire",
        "hashes",
        "http method",
        "get http",
        "http requests",
        "get dns",
        "ip traffic",
        "memory pattern",
        "pattern ips",
        "@emreimer",
        "iextract2",
        "cp cyber",
        "denver",
        "security",
        "siem compliance",
        "skip",
        "cybersecurity",
        "larimer st",
        "suite",
        "resources cyber",
        "risk assessment",
        "bill",
        "mind",
        "delaware",
        "pa",
        "arizona",
        "colorado",
        "stalkers",
        "deuteronomy 28:7",
        "hitmen"
      ],
      "references": [
        "honey.exe",
        "0001c8afa9ca148752e1439140fadb6571b27f455ad1474d85625bcddfb63550",
        "CS Sigma Rules: Suspicious Remote Thread Created by Perez Diego (@darkquassar), oscd.community",
        "CS Sigma Rules: Python Initiated Connection by frack113",
        "CS Sigma Rules: Use Remove-Item to Delete File by frack113",
        "CS Sigma Rules: Suspicious Userinit Child Process by Florian Roth (rule), Samir Bousseaden (idea)",
        "Relationship: http://www.cpmfun.com/go.php?i=Zml0sXNlQhR0gRzjdXpLNlz4&p=71408&s=1&m=1&ua=mozilla/5.0+(linux;+android+4.4.2;+ast21+build/kvt49l)+",
        "api.login.live.com",
        "http://appleid.icloud.com-website33.org/",
        "https://www.milehighmedia.com/legal/2257 [phishing \u2022 Brazzers porn]",
        "FileHash-SHA256 c030b0a1be8745d192f45.159.189.105743b3c4f4094f33507a5904c184c8db0bde1a91efccb5  [tracking]",
        "http://45.159.189.105/bot/regex [Tracking Tsara Brashears involves in person following and or harassment as well]",
        "message.htm.com",
        "http://pornhub.com/gay/video/search",
        "CnC IP's: 206.189.61.126 \u2022 217.74.65.23 \u2022 46.8.8.100 \u2022 64.190.63.111",
        "stop following, stalking, hacking, talking, modifying, hijacking, threatening, contacting, sending people to harass target, threats",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "W32.Sality.PE",
          "display_name": "W32.Sality.PE",
          "target": null
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        },
        {
          "id": "Relic",
          "display_name": "Relic",
          "target": null
        },
        {
          "id": "Tofsee",
          "display_name": "Tofsee",
          "target": null
        },
        {
          "id": "Virus.Win32.Virut.q",
          "display_name": "Virus.Win32.Virut.q",
          "target": null
        },
        {
          "id": "VirTool",
          "display_name": "VirTool",
          "target": null
        },
        {
          "id": "TrojanDropper:Win32",
          "display_name": "TrojanDropper:Win32",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "TA0001",
          "name": "Initial Access",
          "display_name": "TA0001 - Initial Access"
        },
        {
          "id": "TA0003",
          "name": "Persistence",
          "display_name": "TA0003 - Persistence"
        },
        {
          "id": "TA0002",
          "name": "Execution",
          "display_name": "TA0002 - Execution"
        },
        {
          "id": "TA0004",
          "name": "Privilege Escalation",
          "display_name": "TA0004 - Privilege Escalation"
        },
        {
          "id": "TA0005",
          "name": "Defense Evasion",
          "display_name": "TA0005 - Defense Evasion"
        },
        {
          "id": "TA0006",
          "name": "Credential Access",
          "display_name": "TA0006 - Credential Access"
        },
        {
          "id": "TA0007",
          "name": "Discovery",
          "display_name": "TA0007 - Discovery"
        },
        {
          "id": "TA0008",
          "name": "Lateral Movement",
          "display_name": "TA0008 - Lateral Movement"
        },
        {
          "id": "TA0009",
          "name": "Collection",
          "display_name": "TA0009 - Collection"
        },
        {
          "id": "TA0010",
          "name": "Exfiltration",
          "display_name": "TA0010 - Exfiltration"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "TA0034",
          "name": "Impact",
          "display_name": "TA0034 - Impact"
        },
        {
          "id": "TA0040",
          "name": "Impact",
          "display_name": "TA0040 - Impact"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.002",
          "name": "File Transfer Protocols",
          "display_name": "T1071.002 - File Transfer Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1041",
          "name": "Exfiltration Over C2 Channel",
          "display_name": "T1041 - Exfiltration Over C2 Channel"
        },
        {
          "id": "T1036.004",
          "name": "Masquerade Task or Service",
          "display_name": "T1036.004 - Masquerade Task or Service"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1415",
          "name": "URL Scheme Hijacking",
          "display_name": "T1415 - URL Scheme Hijacking"
        },
        {
          "id": "T1122",
          "name": "Component Object Model Hijacking",
          "display_name": "T1122 - Component Object Model Hijacking"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 54,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 6303,
        "FileHash-MD5": 215,
        "FileHash-SHA1": 192,
        "FileHash-SHA256": 2663,
        "domain": 2673,
        "hostname": 2686,
        "CVE": 2,
        "email": 16
      },
      "indicator_count": 14750,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 221,
      "modified_text": "770 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65401d5ee5a7359a5e815a6a",
      "name": "Darkside 2020 Ecosystem  .BEware | BGP.tools | Target Tsara Brashears",
      "description": "I don't want to be dramatic but...Main source of cyber attacks. Includes - governmentattic.org, tulach.cc, malvertizing, monitoring. remote attacks, endangered Tsara Brashears attack, BotNet, CNC, telephone service, Apple hacking. https://bgp.tools/prefix/167.203.96.0, adult content, moo.com, afraid.org.  I'm assuming accessed by attorneys and insurance companies to silence people forever. Death references. I can't verify if government complicity is accurate or spoofed. Stranger was owned by American International Group, found in an STSH domain (AIG.com). Last night Ben Cartwright became the sole owner of  domain after being a verified AIG domain. Terrifying.  Looks like the main target is the same.  Tsara Brashears. \nFound in an attack against a device 'malicious sorry index' that caused research effort. \n[auto populated: BGP.TOOLS - bgp.tools - has published its full list of historical records for BGP, which are based on its current IP address address and routing system (PGP).]",
      "modified": "2023-11-29T14:03:31.663000",
      "created": "2023-10-30T21:17:18.712000",
      "tags": [
        "ssl certificate",
        "whois record",
        "contacted",
        "referrer",
        "communicating",
        "resolutions",
        "historical ssl",
        "whois whois",
        "http",
        "critical risk",
        "dark power",
        "cobalt strike",
        "malware",
        "core",
        "critical",
        "copy",
        "formbook",
        "submission",
        "sophos sophos",
        "xcitium verdict",
        "cloud xcitium",
        "verdict cloud",
        "history first",
        "analysis",
        "utc http",
        "response final",
        "url https",
        "march",
        "execution",
        "falcon sandbox",
        "pattern match",
        "changelog",
        "header",
        "layer",
        "data",
        "ipv4",
        "function",
        "file",
        "et tor",
        "known tor",
        "meta",
        "monitoring",
        "date",
        "body",
        "form",
        "august",
        "june",
        "friendly",
        "main",
        "footer",
        "unknown",
        "hybrid",
        "general",
        "click",
        "strings",
        "class",
        "generator",
        "error",
        "pe resource",
        "redline stealer",
        "april",
        "lockbit",
        "emotet",
        "hacktool",
        "apple",
        "tsara brashears",
        "tmobile",
        "pyinstaller",
        "password",
        "dns poisoning",
        "domains",
        "abuse",
        "kiannas law",
        "cyber security",
        "cisco umbrella",
        "site",
        "malware site",
        "malicious site",
        "safe site",
        "alexa top",
        "million",
        "phishing site",
        "team phishing",
        "exploit",
        "download",
        "unruy",
        "alexa",
        "riskware",
        "back",
        "azorult",
        "phishing",
        "service",
        "runescape",
        "facebook",
        "bank",
        "team",
        "cutwail",
        "adload",
        "maltiverse",
        "kryptik",
        "united",
        "cyber threat",
        "engineering",
        "bambernek",
        "strike",
        "zbot",
        "suppobox",
        "malicious",
        "ransomware",
        "virut",
        "bandoo",
        "matsnu",
        "iframe",
        "zeus",
        "agent",
        "steam",
        "nymaim",
        "citadel",
        "heur",
        "covid19",
        "simda",
        "artemis",
        "bradesco",
        "pony",
        "pykspa",
        "sodinokibi",
        "betabot",
        "virustotal",
        "tinba",
        "domaiq",
        "ave maria",
        "revil",
        "downloader",
        "tofsee",
        "vawtrak",
        "hotmail",
        "dnspionage",
        "nexus",
        "generic",
        "andromeda",
        "dropper",
        "crypt",
        "outbreak",
        "wacatac",
        "mimikatz",
        "trojanx",
        "astaroth",
        "keybase",
        "stealer",
        "radamant",
        "kovter",
        "unsafe",
        "win64",
        "conduit",
        "presenoker",
        "opencandy",
        "remcos",
        "miner",
        "agenttesla",
        "trojan",
        "detplock",
        "networm",
        "fusioncore",
        "acint",
        "installpack",
        "xtrat",
        "nircmd",
        "psexec",
        "occamy",
        "brontok",
        "zpevdo",
        "startpage",
        "nanocore",
        "keygen",
        "fareit",
        "secrisk",
        "fakealert",
        "filetour",
        "installcore",
        "floxif",
        "cleaner",
        "patcher",
        "kgs0",
        "kls0",
        "threat report",
        "ip summary",
        "url summary",
        "summary",
        "urls",
        "detection list",
        "blacklist http",
        "samples",
        "blacklist"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        },
        {
          "id": "Kryptik",
          "display_name": "Kryptik",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        },
        {
          "id": "T1496",
          "name": "Resource Hijacking",
          "display_name": "T1496 - Resource Hijacking"
        }
      ],
      "industries": [
        "Health"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 82,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 518,
        "FileHash-SHA1": 507,
        "FileHash-SHA256": 10945,
        "URL": 19764,
        "domain": 5110,
        "hostname": 8668,
        "CIDR": 2,
        "CVE": 24
      },
      "indicator_count": 45538,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 221,
      "modified_text": "873 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65401d73e96dd70037ed22a7",
      "name": "Darkside 2020 Ecosystem  .BEware | BGP.tools | Target Tsara Brashears",
      "description": "I don't want to be dramatic but...Main source of cyber attacks. Includes - governmentattic.org, tulach.cc, malvertizing, monitoring. remote attacks, endangered Tsara Brashears attack, BotNet, CNC, telephone service, Apple hacking. https://bgp.tools/prefix/167.203.96.0, adult content, moo.com, afraid.org.  I'm assuming accessed by attorneys and insurance companies to silence people forever. Death references. I can't verify if government complicity is accurate or spoofed. Stranger was owned by American International Group, found in an STSH domain (AIG.com). Last night Ben Cartwright became the sole owner of  domain after being a verified AIG domain. Terrifying.  Looks like the main target is the same.  Tsara Brashears. \nFound in an attack against a device 'malicious sorry index' that caused research effort. \n[auto populated: BGP.TOOLS - bgp.tools - has published its full list of historical records for BGP, which are based on its current IP address address and routing system (PGP).]",
      "modified": "2023-11-29T14:03:31.663000",
      "created": "2023-10-30T21:17:39.802000",
      "tags": [
        "ssl certificate",
        "whois record",
        "contacted",
        "referrer",
        "communicating",
        "resolutions",
        "historical ssl",
        "whois whois",
        "http",
        "critical risk",
        "dark power",
        "cobalt strike",
        "malware",
        "core",
        "critical",
        "copy",
        "formbook",
        "submission",
        "sophos sophos",
        "xcitium verdict",
        "cloud xcitium",
        "verdict cloud",
        "history first",
        "analysis",
        "utc http",
        "response final",
        "url https",
        "march",
        "execution",
        "falcon sandbox",
        "pattern match",
        "changelog",
        "header",
        "layer",
        "data",
        "ipv4",
        "function",
        "file",
        "et tor",
        "known tor",
        "meta",
        "monitoring",
        "date",
        "body",
        "form",
        "august",
        "june",
        "friendly",
        "main",
        "footer",
        "unknown",
        "hybrid",
        "general",
        "click",
        "strings",
        "class",
        "generator",
        "error",
        "pe resource",
        "redline stealer",
        "april",
        "lockbit",
        "emotet",
        "hacktool",
        "apple",
        "tsara brashears",
        "tmobile",
        "pyinstaller",
        "password",
        "dns poisoning",
        "domains",
        "abuse",
        "kiannas law",
        "cyber security",
        "cisco umbrella",
        "site",
        "malware site",
        "malicious site",
        "safe site",
        "alexa top",
        "million",
        "phishing site",
        "team phishing",
        "exploit",
        "download",
        "unruy",
        "alexa",
        "riskware",
        "back",
        "azorult",
        "phishing",
        "service",
        "runescape",
        "facebook",
        "bank",
        "team",
        "cutwail",
        "adload",
        "maltiverse",
        "kryptik",
        "united",
        "cyber threat",
        "engineering",
        "bambernek",
        "strike",
        "zbot",
        "suppobox",
        "malicious",
        "ransomware",
        "virut",
        "bandoo",
        "matsnu",
        "iframe",
        "zeus",
        "agent",
        "steam",
        "nymaim",
        "citadel",
        "heur",
        "covid19",
        "simda",
        "artemis",
        "bradesco",
        "pony",
        "pykspa",
        "sodinokibi",
        "betabot",
        "virustotal",
        "tinba",
        "domaiq",
        "ave maria",
        "revil",
        "downloader",
        "tofsee",
        "vawtrak",
        "hotmail",
        "dnspionage",
        "nexus",
        "generic",
        "andromeda",
        "dropper",
        "crypt",
        "outbreak",
        "wacatac",
        "mimikatz",
        "trojanx",
        "astaroth",
        "keybase",
        "stealer",
        "radamant",
        "kovter",
        "unsafe",
        "win64",
        "conduit",
        "presenoker",
        "opencandy",
        "remcos",
        "miner",
        "agenttesla",
        "trojan",
        "detplock",
        "networm",
        "fusioncore",
        "acint",
        "installpack",
        "xtrat",
        "nircmd",
        "psexec",
        "occamy",
        "brontok",
        "zpevdo",
        "startpage",
        "nanocore",
        "keygen",
        "fareit",
        "secrisk",
        "fakealert",
        "filetour",
        "installcore",
        "floxif",
        "cleaner",
        "patcher",
        "kgs0",
        "kls0",
        "threat report",
        "ip summary",
        "url summary",
        "summary",
        "urls",
        "detection list",
        "blacklist http",
        "samples",
        "blacklist"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        },
        {
          "id": "Kryptik",
          "display_name": "Kryptik",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        },
        {
          "id": "T1496",
          "name": "Resource Hijacking",
          "display_name": "T1496 - Resource Hijacking"
        }
      ],
      "industries": [
        "Health"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 82,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 518,
        "FileHash-SHA1": 507,
        "FileHash-SHA256": 10945,
        "URL": 19764,
        "domain": 5110,
        "hostname": 8668,
        "CIDR": 2,
        "CVE": 24
      },
      "indicator_count": 45538,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 221,
      "modified_text": "873 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65401d76b057b79aaf7ba4a7",
      "name": "Darkside 2020 Ecosystem  .BEware | BGP.tools | Target Tsara Brashears",
      "description": "I don't want to be dramatic but...Main source of cyber attacks. Includes - governmentattic.org, tulach.cc, malvertizing, monitoring. remote attacks, endangered Tsara Brashears attack, BotNet, CNC, telephone service, Apple hacking. https://bgp.tools/prefix/167.203.96.0, adult content, moo.com, afraid.org.  I'm assuming accessed by attorneys and insurance companies to silence people forever. Death references. I can't verify if government complicity is accurate or spoofed. Stranger was owned by American International Group, found in an STSH domain (AIG.com). Last night Ben Cartwright became the sole owner of  domain after being a verified AIG domain. Terrifying.  Looks like the main target is the same.  Tsara Brashears. \nFound in an attack against a device 'malicious sorry index' that caused research effort. \n[auto populated: BGP.TOOLS - bgp.tools - has published its full list of historical records for BGP, which are based on its current IP address address and routing system (PGP).]",
      "modified": "2023-11-29T14:03:31.663000",
      "created": "2023-10-30T21:17:40.239000",
      "tags": [
        "ssl certificate",
        "whois record",
        "contacted",
        "referrer",
        "communicating",
        "resolutions",
        "historical ssl",
        "whois whois",
        "http",
        "critical risk",
        "dark power",
        "cobalt strike",
        "malware",
        "core",
        "critical",
        "copy",
        "formbook",
        "submission",
        "sophos sophos",
        "xcitium verdict",
        "cloud xcitium",
        "verdict cloud",
        "history first",
        "analysis",
        "utc http",
        "response final",
        "url https",
        "march",
        "execution",
        "falcon sandbox",
        "pattern match",
        "changelog",
        "header",
        "layer",
        "data",
        "ipv4",
        "function",
        "file",
        "et tor",
        "known tor",
        "meta",
        "monitoring",
        "date",
        "body",
        "form",
        "august",
        "june",
        "friendly",
        "main",
        "footer",
        "unknown",
        "hybrid",
        "general",
        "click",
        "strings",
        "class",
        "generator",
        "error",
        "pe resource",
        "redline stealer",
        "april",
        "lockbit",
        "emotet",
        "hacktool",
        "apple",
        "tsara brashears",
        "tmobile",
        "pyinstaller",
        "password",
        "dns poisoning",
        "domains",
        "abuse",
        "kiannas law",
        "cyber security",
        "cisco umbrella",
        "site",
        "malware site",
        "malicious site",
        "safe site",
        "alexa top",
        "million",
        "phishing site",
        "team phishing",
        "exploit",
        "download",
        "unruy",
        "alexa",
        "riskware",
        "back",
        "azorult",
        "phishing",
        "service",
        "runescape",
        "facebook",
        "bank",
        "team",
        "cutwail",
        "adload",
        "maltiverse",
        "kryptik",
        "united",
        "cyber threat",
        "engineering",
        "bambernek",
        "strike",
        "zbot",
        "suppobox",
        "malicious",
        "ransomware",
        "virut",
        "bandoo",
        "matsnu",
        "iframe",
        "zeus",
        "agent",
        "steam",
        "nymaim",
        "citadel",
        "heur",
        "covid19",
        "simda",
        "artemis",
        "bradesco",
        "pony",
        "pykspa",
        "sodinokibi",
        "betabot",
        "virustotal",
        "tinba",
        "domaiq",
        "ave maria",
        "revil",
        "downloader",
        "tofsee",
        "vawtrak",
        "hotmail",
        "dnspionage",
        "nexus",
        "generic",
        "andromeda",
        "dropper",
        "crypt",
        "outbreak",
        "wacatac",
        "mimikatz",
        "trojanx",
        "astaroth",
        "keybase",
        "stealer",
        "radamant",
        "kovter",
        "unsafe",
        "win64",
        "conduit",
        "presenoker",
        "opencandy",
        "remcos",
        "miner",
        "agenttesla",
        "trojan",
        "detplock",
        "networm",
        "fusioncore",
        "acint",
        "installpack",
        "xtrat",
        "nircmd",
        "psexec",
        "occamy",
        "brontok",
        "zpevdo",
        "startpage",
        "nanocore",
        "keygen",
        "fareit",
        "secrisk",
        "fakealert",
        "filetour",
        "installcore",
        "floxif",
        "cleaner",
        "patcher",
        "kgs0",
        "kls0",
        "threat report",
        "ip summary",
        "url summary",
        "summary",
        "urls",
        "detection list",
        "blacklist http",
        "samples",
        "blacklist"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        },
        {
          "id": "Kryptik",
          "display_name": "Kryptik",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        },
        {
          "id": "T1496",
          "name": "Resource Hijacking",
          "display_name": "T1496 - Resource Hijacking"
        }
      ],
      "industries": [
        "Health"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 84,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 518,
        "FileHash-SHA1": 507,
        "FileHash-SHA256": 10945,
        "URL": 19764,
        "domain": 5110,
        "hostname": 8668,
        "CIDR": 2,
        "CVE": 24
      },
      "indicator_count": 45538,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 221,
      "modified_text": "873 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65401d8480e4a9ed725f6458",
      "name": "Darkside 2020 Ecosystem  .BEware | BGP.tools | Target Tsara Brashears",
      "description": "I don't want to be dramatic but...Main source of cyber attacks. Includes - governmentattic.org, tulach.cc, malvertizing, monitoring. remote attacks, endangered Tsara Brashears attack, BotNet, CNC, telephone service, Apple hacking. https://bgp.tools/prefix/167.203.96.0, adult content, moo.com, afraid.org.  I'm assuming accessed by attorneys and insurance companies to silence people forever. Death references. I can't verify if government complicity is accurate or spoofed. Stranger was owned by American International Group, found in an STSH domain (AIG.com). Last night Ben Cartwright became the sole owner of  domain after being a verified AIG domain. Terrifying.  Looks like the main target is the same.  Tsara Brashears. \nFound in an attack against a device 'malicious sorry index' that caused research effort. \n[auto populated: BGP.TOOLS - bgp.tools - has published its full list of historical records for BGP, which are based on its current IP address address and routing system (PGP).]",
      "modified": "2023-11-29T14:03:31.663000",
      "created": "2023-10-30T21:17:56.820000",
      "tags": [
        "ssl certificate",
        "whois record",
        "contacted",
        "referrer",
        "communicating",
        "resolutions",
        "historical ssl",
        "whois whois",
        "http",
        "critical risk",
        "dark power",
        "cobalt strike",
        "malware",
        "core",
        "critical",
        "copy",
        "formbook",
        "submission",
        "sophos sophos",
        "xcitium verdict",
        "cloud xcitium",
        "verdict cloud",
        "history first",
        "analysis",
        "utc http",
        "response final",
        "url https",
        "march",
        "execution",
        "falcon sandbox",
        "pattern match",
        "changelog",
        "header",
        "layer",
        "data",
        "ipv4",
        "function",
        "file",
        "et tor",
        "known tor",
        "meta",
        "monitoring",
        "date",
        "body",
        "form",
        "august",
        "june",
        "friendly",
        "main",
        "footer",
        "unknown",
        "hybrid",
        "general",
        "click",
        "strings",
        "class",
        "generator",
        "error",
        "pe resource",
        "redline stealer",
        "april",
        "lockbit",
        "emotet",
        "hacktool",
        "apple",
        "tsara brashears",
        "tmobile",
        "pyinstaller",
        "password",
        "dns poisoning",
        "domains",
        "abuse",
        "kiannas law",
        "cyber security",
        "cisco umbrella",
        "site",
        "malware site",
        "malicious site",
        "safe site",
        "alexa top",
        "million",
        "phishing site",
        "team phishing",
        "exploit",
        "download",
        "unruy",
        "alexa",
        "riskware",
        "back",
        "azorult",
        "phishing",
        "service",
        "runescape",
        "facebook",
        "bank",
        "team",
        "cutwail",
        "adload",
        "maltiverse",
        "kryptik",
        "united",
        "cyber threat",
        "engineering",
        "bambernek",
        "strike",
        "zbot",
        "suppobox",
        "malicious",
        "ransomware",
        "virut",
        "bandoo",
        "matsnu",
        "iframe",
        "zeus",
        "agent",
        "steam",
        "nymaim",
        "citadel",
        "heur",
        "covid19",
        "simda",
        "artemis",
        "bradesco",
        "pony",
        "pykspa",
        "sodinokibi",
        "betabot",
        "virustotal",
        "tinba",
        "domaiq",
        "ave maria",
        "revil",
        "downloader",
        "tofsee",
        "vawtrak",
        "hotmail",
        "dnspionage",
        "nexus",
        "generic",
        "andromeda",
        "dropper",
        "crypt",
        "outbreak",
        "wacatac",
        "mimikatz",
        "trojanx",
        "astaroth",
        "keybase",
        "stealer",
        "radamant",
        "kovter",
        "unsafe",
        "win64",
        "conduit",
        "presenoker",
        "opencandy",
        "remcos",
        "miner",
        "agenttesla",
        "trojan",
        "detplock",
        "networm",
        "fusioncore",
        "acint",
        "installpack",
        "xtrat",
        "nircmd",
        "psexec",
        "occamy",
        "brontok",
        "zpevdo",
        "startpage",
        "nanocore",
        "keygen",
        "fareit",
        "secrisk",
        "fakealert",
        "filetour",
        "installcore",
        "floxif",
        "cleaner",
        "patcher",
        "kgs0",
        "kls0",
        "threat report",
        "ip summary",
        "url summary",
        "summary",
        "urls",
        "detection list",
        "blacklist http",
        "samples",
        "blacklist"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        },
        {
          "id": "Kryptik",
          "display_name": "Kryptik",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        },
        {
          "id": "T1496",
          "name": "Resource Hijacking",
          "display_name": "T1496 - Resource Hijacking"
        }
      ],
      "industries": [
        "Health"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 83,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 518,
        "FileHash-SHA1": 507,
        "FileHash-SHA256": 10945,
        "URL": 19764,
        "domain": 5110,
        "hostname": 8668,
        "CIDR": 2,
        "CVE": 24
      },
      "indicator_count": 45538,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 220,
      "modified_text": "873 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65401da888067e7f6379d23e",
      "name": "Darkside 2020 Ecosystem  .BEware | BGP.tools | Target Tsara Brashears",
      "description": "I'm actually uncomfortable finding this.",
      "modified": "2023-11-29T14:03:31.663000",
      "created": "2023-10-30T21:18:32.141000",
      "tags": [
        "ssl certificate",
        "whois record",
        "contacted",
        "referrer",
        "communicating",
        "resolutions",
        "historical ssl",
        "whois whois",
        "http",
        "critical risk",
        "dark power",
        "cobalt strike",
        "malware",
        "core",
        "critical",
        "copy",
        "formbook",
        "submission",
        "sophos sophos",
        "xcitium verdict",
        "cloud xcitium",
        "verdict cloud",
        "history first",
        "analysis",
        "utc http",
        "response final",
        "url https",
        "march",
        "execution",
        "falcon sandbox",
        "pattern match",
        "changelog",
        "header",
        "layer",
        "data",
        "ipv4",
        "function",
        "file",
        "et tor",
        "known tor",
        "meta",
        "monitoring",
        "date",
        "body",
        "form",
        "august",
        "june",
        "friendly",
        "main",
        "footer",
        "unknown",
        "hybrid",
        "general",
        "click",
        "strings",
        "class",
        "generator",
        "error",
        "pe resource",
        "redline stealer",
        "april",
        "lockbit",
        "emotet",
        "hacktool",
        "apple",
        "tsara brashears",
        "tmobile",
        "pyinstaller",
        "password",
        "dns poisoning",
        "domains",
        "abuse",
        "kiannas law",
        "cyber security",
        "cisco umbrella",
        "site",
        "malware site",
        "malicious site",
        "safe site",
        "alexa top",
        "million",
        "phishing site",
        "team phishing",
        "exploit",
        "download",
        "unruy",
        "alexa",
        "riskware",
        "back",
        "azorult",
        "phishing",
        "service",
        "runescape",
        "facebook",
        "bank",
        "team",
        "cutwail",
        "adload",
        "maltiverse",
        "kryptik",
        "united",
        "cyber threat",
        "engineering",
        "bambernek",
        "strike",
        "zbot",
        "suppobox",
        "malicious",
        "ransomware",
        "virut",
        "bandoo",
        "matsnu",
        "iframe",
        "zeus",
        "agent",
        "steam",
        "nymaim",
        "citadel",
        "heur",
        "covid19",
        "simda",
        "artemis",
        "bradesco",
        "pony",
        "pykspa",
        "sodinokibi",
        "betabot",
        "virustotal",
        "tinba",
        "domaiq",
        "ave maria",
        "revil",
        "downloader",
        "tofsee",
        "vawtrak",
        "hotmail",
        "dnspionage",
        "nexus",
        "generic",
        "andromeda",
        "dropper",
        "crypt",
        "outbreak",
        "wacatac",
        "mimikatz",
        "trojanx",
        "astaroth",
        "keybase",
        "stealer",
        "radamant",
        "kovter",
        "unsafe",
        "win64",
        "conduit",
        "presenoker",
        "opencandy",
        "remcos",
        "miner",
        "agenttesla",
        "trojan",
        "detplock",
        "networm",
        "fusioncore",
        "acint",
        "installpack",
        "xtrat",
        "nircmd",
        "psexec",
        "occamy",
        "brontok",
        "zpevdo",
        "startpage",
        "nanocore",
        "keygen",
        "fareit",
        "secrisk",
        "fakealert",
        "filetour",
        "installcore",
        "floxif",
        "cleaner",
        "patcher",
        "kgs0",
        "kls0",
        "threat report",
        "ip summary",
        "url summary",
        "summary",
        "urls",
        "detection list",
        "blacklist http",
        "samples",
        "blacklist"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        },
        {
          "id": "Kryptik",
          "display_name": "Kryptik",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        },
        {
          "id": "T1496",
          "name": "Resource Hijacking",
          "display_name": "T1496 - Resource Hijacking"
        }
      ],
      "industries": [
        "Health"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 84,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 518,
        "FileHash-SHA1": 507,
        "FileHash-SHA256": 8601,
        "URL": 7499,
        "domain": 4603,
        "hostname": 4187,
        "CIDR": 2,
        "CVE": 23
      },
      "indicator_count": 25940,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 221,
      "modified_text": "873 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65401dbe47ce126e7468a2dc",
      "name": "Darkside 2020 Ecosystem  .BEware | BGP.tools | Target Tsara Brashears",
      "description": "I'm actually uncomfortable finding this.",
      "modified": "2023-11-29T14:03:31.663000",
      "created": "2023-10-30T21:18:54.411000",
      "tags": [
        "ssl certificate",
        "whois record",
        "contacted",
        "referrer",
        "communicating",
        "resolutions",
        "historical ssl",
        "whois whois",
        "http",
        "critical risk",
        "dark power",
        "cobalt strike",
        "malware",
        "core",
        "critical",
        "copy",
        "formbook",
        "submission",
        "sophos sophos",
        "xcitium verdict",
        "cloud xcitium",
        "verdict cloud",
        "history first",
        "analysis",
        "utc http",
        "response final",
        "url https",
        "march",
        "execution",
        "falcon sandbox",
        "pattern match",
        "changelog",
        "header",
        "layer",
        "data",
        "ipv4",
        "function",
        "file",
        "et tor",
        "known tor",
        "meta",
        "monitoring",
        "date",
        "body",
        "form",
        "august",
        "june",
        "friendly",
        "main",
        "footer",
        "unknown",
        "hybrid",
        "general",
        "click",
        "strings",
        "class",
        "generator",
        "error",
        "pe resource",
        "redline stealer",
        "april",
        "lockbit",
        "emotet",
        "hacktool",
        "apple",
        "tsara brashears",
        "tmobile",
        "pyinstaller",
        "password",
        "dns poisoning",
        "domains",
        "abuse",
        "kiannas law",
        "cyber security",
        "cisco umbrella",
        "site",
        "malware site",
        "malicious site",
        "safe site",
        "alexa top",
        "million",
        "phishing site",
        "team phishing",
        "exploit",
        "download",
        "unruy",
        "alexa",
        "riskware",
        "back",
        "azorult",
        "phishing",
        "service",
        "runescape",
        "facebook",
        "bank",
        "team",
        "cutwail",
        "adload",
        "maltiverse",
        "kryptik",
        "united",
        "cyber threat",
        "engineering",
        "bambernek",
        "strike",
        "zbot",
        "suppobox",
        "malicious",
        "ransomware",
        "virut",
        "bandoo",
        "matsnu",
        "iframe",
        "zeus",
        "agent",
        "steam",
        "nymaim",
        "citadel",
        "heur",
        "covid19",
        "simda",
        "artemis",
        "bradesco",
        "pony",
        "pykspa",
        "sodinokibi",
        "betabot",
        "virustotal",
        "tinba",
        "domaiq",
        "ave maria",
        "revil",
        "downloader",
        "tofsee",
        "vawtrak",
        "hotmail",
        "dnspionage",
        "nexus",
        "generic",
        "andromeda",
        "dropper",
        "crypt",
        "outbreak",
        "wacatac",
        "mimikatz",
        "trojanx",
        "astaroth",
        "keybase",
        "stealer",
        "radamant",
        "kovter",
        "unsafe",
        "win64",
        "conduit",
        "presenoker",
        "opencandy",
        "remcos",
        "miner",
        "agenttesla",
        "trojan",
        "detplock",
        "networm",
        "fusioncore",
        "acint",
        "installpack",
        "xtrat",
        "nircmd",
        "psexec",
        "occamy",
        "brontok",
        "zpevdo",
        "startpage",
        "nanocore",
        "keygen",
        "fareit",
        "secrisk",
        "fakealert",
        "filetour",
        "installcore",
        "floxif",
        "cleaner",
        "patcher",
        "kgs0",
        "kls0",
        "threat report",
        "ip summary",
        "url summary",
        "summary",
        "urls",
        "detection list",
        "blacklist http",
        "samples",
        "blacklist"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        },
        {
          "id": "Kryptik",
          "display_name": "Kryptik",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        },
        {
          "id": "T1496",
          "name": "Resource Hijacking",
          "display_name": "T1496 - Resource Hijacking"
        }
      ],
      "industries": [
        "Health"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 85,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 518,
        "FileHash-SHA1": 507,
        "FileHash-SHA256": 8601,
        "URL": 7499,
        "domain": 4603,
        "hostname": 4187,
        "CIDR": 2,
        "CVE": 23
      },
      "indicator_count": 25940,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 221,
      "modified_text": "873 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65401fcb063a0a34fa323603",
      "name": "Darkside 2020 Ecosystem  .BEware | BGP.tools | Target Tsara Brashears",
      "description": "Law Enforcement? DOJ? ACLU? Help? This is CRAZY.\nSilencing.\nI like her song clicked on link but it was malicious. I was redirected to an Indian link that looked like YouTube.\nI am a professional, awarded researcher in many areas, parent, security researcher, graphic designer, supplier, music lover ,  disabled. overly curious and hacked. HELP. SCARED",
      "modified": "2023-11-29T14:03:31.663000",
      "created": "2023-10-30T21:27:39.980000",
      "tags": [
        "ssl certificate",
        "whois record",
        "contacted",
        "referrer",
        "communicating",
        "resolutions",
        "historical ssl",
        "whois whois",
        "http",
        "critical risk",
        "dark power",
        "cobalt strike",
        "malware",
        "core",
        "critical",
        "copy",
        "formbook",
        "submission",
        "sophos sophos",
        "xcitium verdict",
        "cloud xcitium",
        "verdict cloud",
        "history first",
        "analysis",
        "utc http",
        "response final",
        "url https",
        "march",
        "execution",
        "falcon sandbox",
        "pattern match",
        "changelog",
        "header",
        "layer",
        "data",
        "ipv4",
        "function",
        "file",
        "et tor",
        "known tor",
        "meta",
        "monitoring",
        "date",
        "body",
        "form",
        "august",
        "june",
        "friendly",
        "main",
        "footer",
        "unknown",
        "hybrid",
        "general",
        "click",
        "strings",
        "class",
        "generator",
        "error",
        "pe resource",
        "redline stealer",
        "april",
        "lockbit",
        "emotet",
        "hacktool",
        "apple",
        "tsara brashears",
        "tmobile",
        "pyinstaller",
        "password",
        "dns poisoning",
        "domains",
        "abuse",
        "kiannas law",
        "cyber security",
        "cisco umbrella",
        "site",
        "malware site",
        "malicious site",
        "safe site",
        "alexa top",
        "million",
        "phishing site",
        "team phishing",
        "exploit",
        "download",
        "unruy",
        "alexa",
        "riskware",
        "back",
        "azorult",
        "phishing",
        "service",
        "runescape",
        "facebook",
        "bank",
        "team",
        "cutwail",
        "adload",
        "maltiverse",
        "kryptik",
        "united",
        "cyber threat",
        "engineering",
        "bambernek",
        "strike",
        "zbot",
        "suppobox",
        "malicious",
        "ransomware",
        "virut",
        "bandoo",
        "matsnu",
        "iframe",
        "zeus",
        "agent",
        "steam",
        "nymaim",
        "citadel",
        "heur",
        "covid19",
        "simda",
        "artemis",
        "bradesco",
        "pony",
        "pykspa",
        "sodinokibi",
        "betabot",
        "virustotal",
        "tinba",
        "domaiq",
        "ave maria",
        "revil",
        "downloader",
        "tofsee",
        "vawtrak",
        "hotmail",
        "dnspionage",
        "nexus",
        "generic",
        "andromeda",
        "dropper",
        "crypt",
        "outbreak",
        "wacatac",
        "mimikatz",
        "trojanx",
        "astaroth",
        "keybase",
        "stealer",
        "radamant",
        "kovter",
        "unsafe",
        "win64",
        "conduit",
        "presenoker",
        "opencandy",
        "remcos",
        "miner",
        "agenttesla",
        "trojan",
        "detplock",
        "networm",
        "fusioncore",
        "acint",
        "installpack",
        "xtrat",
        "nircmd",
        "psexec",
        "occamy",
        "brontok",
        "zpevdo",
        "startpage",
        "nanocore",
        "keygen",
        "fareit",
        "secrisk",
        "fakealert",
        "filetour",
        "installcore",
        "floxif",
        "cleaner",
        "patcher",
        "kgs0",
        "kls0",
        "threat report",
        "ip summary",
        "url summary",
        "summary",
        "urls",
        "detection list",
        "blacklist http",
        "samples",
        "blacklist"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        },
        {
          "id": "Kryptik",
          "display_name": "Kryptik",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        },
        {
          "id": "T1496",
          "name": "Resource Hijacking",
          "display_name": "T1496 - Resource Hijacking"
        }
      ],
      "industries": [
        "Health"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 87,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 518,
        "FileHash-SHA1": 507,
        "FileHash-SHA256": 8601,
        "URL": 7499,
        "domain": 4603,
        "hostname": 4187,
        "CIDR": 2,
        "CVE": 23
      },
      "indicator_count": 25940,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 222,
      "modified_text": "873 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65401fddb74fe1ea8506132d",
      "name": "Darkside 2020 Ecosystem  .BEware | BGP.tools | Target Tsara Brashears",
      "description": "Law Enforcement? DOJ? ACLU? Help? This is CRAZY.\nSilencing.\nI like her song clicked on link but it was malicious. I was redirected to an Indian link that looked like YouTube.\nI am a professional, awarded researcher in many areas, parent, security researcher, graphic designer, supplier, music lover ,  disabled. overly curious and hacked. HELP. SCARED",
      "modified": "2023-11-29T14:03:31.663000",
      "created": "2023-10-30T21:27:57.026000",
      "tags": [
        "ssl certificate",
        "whois record",
        "contacted",
        "referrer",
        "communicating",
        "resolutions",
        "historical ssl",
        "whois whois",
        "http",
        "critical risk",
        "dark power",
        "cobalt strike",
        "malware",
        "core",
        "critical",
        "copy",
        "formbook",
        "submission",
        "sophos sophos",
        "xcitium verdict",
        "cloud xcitium",
        "verdict cloud",
        "history first",
        "analysis",
        "utc http",
        "response final",
        "url https",
        "march",
        "execution",
        "falcon sandbox",
        "pattern match",
        "changelog",
        "header",
        "layer",
        "data",
        "ipv4",
        "function",
        "file",
        "et tor",
        "known tor",
        "meta",
        "monitoring",
        "date",
        "body",
        "form",
        "august",
        "june",
        "friendly",
        "main",
        "footer",
        "unknown",
        "hybrid",
        "general",
        "click",
        "strings",
        "class",
        "generator",
        "error",
        "pe resource",
        "redline stealer",
        "april",
        "lockbit",
        "emotet",
        "hacktool",
        "apple",
        "tsara brashears",
        "tmobile",
        "pyinstaller",
        "password",
        "dns poisoning",
        "domains",
        "abuse",
        "kiannas law",
        "cyber security",
        "cisco umbrella",
        "site",
        "malware site",
        "malicious site",
        "safe site",
        "alexa top",
        "million",
        "phishing site",
        "team phishing",
        "exploit",
        "download",
        "unruy",
        "alexa",
        "riskware",
        "back",
        "azorult",
        "phishing",
        "service",
        "runescape",
        "facebook",
        "bank",
        "team",
        "cutwail",
        "adload",
        "maltiverse",
        "kryptik",
        "united",
        "cyber threat",
        "engineering",
        "bambernek",
        "strike",
        "zbot",
        "suppobox",
        "malicious",
        "ransomware",
        "virut",
        "bandoo",
        "matsnu",
        "iframe",
        "zeus",
        "agent",
        "steam",
        "nymaim",
        "citadel",
        "heur",
        "covid19",
        "simda",
        "artemis",
        "bradesco",
        "pony",
        "pykspa",
        "sodinokibi",
        "betabot",
        "virustotal",
        "tinba",
        "domaiq",
        "ave maria",
        "revil",
        "downloader",
        "tofsee",
        "vawtrak",
        "hotmail",
        "dnspionage",
        "nexus",
        "generic",
        "andromeda",
        "dropper",
        "crypt",
        "outbreak",
        "wacatac",
        "mimikatz",
        "trojanx",
        "astaroth",
        "keybase",
        "stealer",
        "radamant",
        "kovter",
        "unsafe",
        "win64",
        "conduit",
        "presenoker",
        "opencandy",
        "remcos",
        "miner",
        "agenttesla",
        "trojan",
        "detplock",
        "networm",
        "fusioncore",
        "acint",
        "installpack",
        "xtrat",
        "nircmd",
        "psexec",
        "occamy",
        "brontok",
        "zpevdo",
        "startpage",
        "nanocore",
        "keygen",
        "fareit",
        "secrisk",
        "fakealert",
        "filetour",
        "installcore",
        "floxif",
        "cleaner",
        "patcher",
        "kgs0",
        "kls0",
        "threat report",
        "ip summary",
        "url summary",
        "summary",
        "urls",
        "detection list",
        "blacklist http",
        "samples",
        "blacklist"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        },
        {
          "id": "Kryptik",
          "display_name": "Kryptik",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        },
        {
          "id": "T1496",
          "name": "Resource Hijacking",
          "display_name": "T1496 - Resource Hijacking"
        }
      ],
      "industries": [
        "Health"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 92,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 518,
        "FileHash-SHA1": 507,
        "FileHash-SHA256": 8601,
        "URL": 7499,
        "domain": 4603,
        "hostname": 4187,
        "CIDR": 2,
        "CVE": 23
      },
      "indicator_count": 25940,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 221,
      "modified_text": "873 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65402a8dec948bec8b0a0372",
      "name": "24 CVE's | Health Liability bDarkside 2020 Ecosystem .BEware",
      "description": "Matrix of cyber crime attacks appears to involved legal entities and a division of Workers Compensation Colorado, possibly used nationally. Targeting, monitoring, tracking, malvertizing, cyber attacks, CNC. Critical.\nCould probably be disputed $$$$ though undisputable. \nEd Said. \nhttp://1.116.132.182/weblogic_CVE_2020_2551.jar\t\t\t\nCVE-2020-0601\t\t\t\t\t\nCVE-2018-8174\t\t\t\nCVE-2018-4893\t\t\t\nCVE-2018-0802\t\t\t\nCVE-2017-8759\t\t\t\t\t\t\nCVE-2017-8464\t\t\t\nCVE-2017-1188\t\t\t\t\nCVE-2017-0143\t\t\t\nCVE-2016-7262\t\t\t\nCVE-2014-6352\t\t\t\nCVE-2013-2465\t\t\t\nCVE-2011-2110\t\t\t\nCVE-2011-0609\t\t\t\nCVE-2010-2568\t\t\t\nCVE-2018-8453\t\t\t\nCVE-2013-1331\nCVE-2012-1856\t\t\t\t\nCVE-2012-0158\t\t\t\t\t\t\nCVE-2017-8570\t\t\t\nCVE-2017-11882\t\t\t\nCVE-2017-0199\t\t\t\t\t\t\nCVE-2017-0147\t\t\t\t\t\t\nCVE-2014-3153",
      "modified": "2023-11-29T14:03:31.663000",
      "created": "2023-10-30T22:13:33.427000",
      "tags": [
        "ssl certificate",
        "whois record",
        "contacted",
        "referrer",
        "communicating",
        "resolutions",
        "historical ssl",
        "whois whois",
        "http",
        "critical risk",
        "dark power",
        "cobalt strike",
        "malware",
        "core",
        "critical",
        "copy",
        "formbook",
        "submission",
        "sophos sophos",
        "xcitium verdict",
        "cloud xcitium",
        "verdict cloud",
        "history first",
        "analysis",
        "utc http",
        "response final",
        "url https",
        "march",
        "execution",
        "falcon sandbox",
        "pattern match",
        "changelog",
        "header",
        "layer",
        "data",
        "ipv4",
        "function",
        "file",
        "et tor",
        "known tor",
        "meta",
        "monitoring",
        "date",
        "body",
        "form",
        "august",
        "june",
        "friendly",
        "main",
        "footer",
        "unknown",
        "hybrid",
        "general",
        "click",
        "strings",
        "class",
        "generator",
        "error",
        "pe resource",
        "redline stealer",
        "april",
        "lockbit",
        "emotet",
        "hacktool",
        "apple",
        "tsara brashears",
        "tmobile",
        "pyinstaller",
        "password",
        "dns poisoning",
        "domains",
        "abuse",
        "kiannas law",
        "cyber security",
        "cisco umbrella",
        "site",
        "malware site",
        "malicious site",
        "safe site",
        "alexa top",
        "million",
        "phishing site",
        "team phishing",
        "exploit",
        "download",
        "unruy",
        "alexa",
        "riskware",
        "back",
        "azorult",
        "phishing",
        "service",
        "runescape",
        "facebook",
        "bank",
        "team",
        "cutwail",
        "adload",
        "maltiverse",
        "kryptik",
        "united",
        "cyber threat",
        "engineering",
        "bambernek",
        "strike",
        "zbot",
        "suppobox",
        "malicious",
        "ransomware",
        "virut",
        "bandoo",
        "matsnu",
        "iframe",
        "zeus",
        "agent",
        "steam",
        "nymaim",
        "citadel",
        "heur",
        "covid19",
        "simda",
        "artemis",
        "bradesco",
        "pony",
        "pykspa",
        "sodinokibi",
        "betabot",
        "virustotal",
        "tinba",
        "domaiq",
        "ave maria",
        "revil",
        "downloader",
        "tofsee",
        "vawtrak",
        "hotmail",
        "dnspionage",
        "nexus",
        "generic",
        "andromeda",
        "dropper",
        "crypt",
        "outbreak",
        "wacatac",
        "mimikatz",
        "trojanx",
        "astaroth",
        "keybase",
        "stealer",
        "radamant",
        "kovter",
        "unsafe",
        "win64",
        "conduit",
        "presenoker",
        "opencandy",
        "remcos",
        "miner",
        "agenttesla",
        "trojan",
        "detplock",
        "networm",
        "fusioncore",
        "acint",
        "installpack",
        "xtrat",
        "nircmd",
        "psexec",
        "occamy",
        "brontok",
        "zpevdo",
        "startpage",
        "nanocore",
        "keygen",
        "fareit",
        "secrisk",
        "fakealert",
        "filetour",
        "installcore",
        "floxif",
        "cleaner",
        "patcher",
        "kgs0",
        "kls0",
        "threat report",
        "ip summary",
        "url summary",
        "summary",
        "urls",
        "detection list",
        "blacklist http",
        "samples",
        "blacklist"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        },
        {
          "id": "Kryptik",
          "display_name": "Kryptik",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        },
        {
          "id": "T1496",
          "name": "Resource Hijacking",
          "display_name": "T1496 - Resource Hijacking"
        }
      ],
      "industries": [
        "Health"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 92,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 518,
        "FileHash-SHA1": 507,
        "FileHash-SHA256": 8601,
        "URL": 7499,
        "domain": 4603,
        "hostname": 4187,
        "CIDR": 2,
        "CVE": 23
      },
      "indicator_count": 25940,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 221,
      "modified_text": "873 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "accutesting.com",
    "type": "Domain"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "accutesting.com",
    "found": false,
    "verdict": "clean",
    "urls": [],
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776723320.8434398
}