{
  "type": "Domain",
  "indicator": "amazon.com",
  "general": {
    "sections": [
      "general",
      "geo",
      "url_list",
      "passive_dns",
      "malware",
      "whois",
      "http_scans"
    ],
    "whois": "http://whois.domaintools.com/amazon.com",
    "alexa": "http://www.alexa.com/siteinfo/amazon.com",
    "indicator": "amazon.com",
    "type": "domain",
    "type_title": "Domain",
    "validation": [
      {
        "source": "akamai",
        "message": "Akamai rank: #29",
        "name": "Akamai Popular Domain"
      },
      {
        "source": "alexa",
        "message": "Alexa rank: #10",
        "name": "Listed on Alexa"
      },
      {
        "source": "majestic",
        "message": "Whitelisted domain amazon.com",
        "name": "Whitelisted domain"
      },
      {
        "source": "whitelist",
        "message": "Whitelisted domain amazon.com",
        "name": "Whitelisted domain"
      }
    ],
    "base_indicator": {
      "id": 971831,
      "indicator": "amazon.com",
      "type": "domain",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 50,
      "pulses": [
        {
          "id": "69a02837827feb0b78fa3ad2",
          "name": "The Belasco Chain",
          "description": "The adversary delivers a masterclass in \"Regular Belasco\" stagecraft, utilizing authentic Adobe PIDs to construct a \"living library\" of legitimacy where mundane metadata like SOPHIA.json acts as Gatsby\u2019s \"real but uncut\" volumes to mask a hollowed-out interior. This is a triumph of performative evasion; while researchers marvel at the realism of the set-dressing, MSI50B8.tmp and MSI4F2F.tmp wait in the wings of the Windows\\Installer directory, invisible to the human eye and using NGEN hijacking to bake illicit scripts directly into the OS framework. By employing Cryptnet certificates as \"stage lighting\" to mask C2 handshakes, the malware doesn't just attend the system\u2019s party\u2014it rewrites the invitation to own the house. Unlike the tragic end at West Egg, this Belasco chain is a play that refuses to end; it simply resets the stage, ensuring the performance continues as long as the \"green light\" of the C2 remains active.",
          "modified": "2026-04-19T09:34:35.173000",
          "created": "2026-02-26T11:02:15.932000",
          "tags": [
            "file size",
            "mwdb",
            "bazaar",
            "sha3384",
            "ssdeep",
            "file type",
            "sha1",
            "sha256",
            "crc32",
            "filenames c"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 2,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2319,
            "FileHash-SHA1": 2376,
            "FileHash-SHA256": 6772,
            "domain": 1789,
            "hostname": 1234,
            "URL": 922,
            "email": 45,
            "CVE": 46,
            "CIDR": 3,
            "YARA": 7,
            "IPv4": 3,
            "JA3": 1
          },
          "indicator_count": 15517,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 53,
          "modified_text": "10 minutes ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69d967590f40c612c90ce84f",
          "name": "TTB-Chained (Tehran-Transversal Belasco Chain) - Clone of My Own Post. Updated",
          "description": "TTB-Chained executes a systemic collapse of the cryptographic chain of trust. Exploiting DNSSEC-unsigned protocols and .net edge nodes, it injects C++ payloads into the resolution chain prior to verification. Remediating via certificate expiration is ineffective; the architecture leverages systemic flaws in DMARC/SPF/DKIM and cryptographic handshake protocols to lock \"Hollow Library\" assets into the environment pre-enforcement, ensuring total detection evasion. The conduit utilizes a multi-umbrella transit strategy: Lumen (AS3356) + RIPE (37.97.254.27) + Fastly (151.101.130.159). These 63.16 KB \"hollowed\" assets masquerade as signed updates for total penetration. TTB-chained executes high-speed wipers targeting firmware/boot sectors, triggering complete corruption of hardware beyond restore. Once the root hosted in IP {53.xxx] is compromised and the pre-verified environment is saturated, the hardware is physically neutralized. -msudosos. See Belasco Chain for more.",
          "modified": "2026-04-19T09:05:10.432000",
          "created": "2026-04-10T21:10:49.749000",
          "tags": [
            "malicious",
            "Microsoft",
            "intent: reckless",
            "wiper",
            "Transip",
            "bankers document gone rogue",
            "Tehran",
            "pdfkit.net",
            "United",
            "broken Docusign seal",
            "esign violation",
            "us lawyers",
            "Iran",
            "IP Abuse US",
            "Spreader",
            "corruption that spread",
            "52.123.250.180",
            "Mass Data Loss and exfiltration",
            "Docusign exploited by insecure workflows",
            "Adobe exploited by insecure workflows",
            "threat map",
            "Infra / healthcare / more at risk from this negligence",
            "remediation: long. expire the certs. block 53..",
            "accountability, NOW.",
            "Burned",
            "Kitplay",
            "iOS",
            "Watering hole",
            "Webkit",
            "Religious Regime",
            "MS Office",
            "Compliance Hold Purgatory",
            "WIN EXE.32",
            "Firmware neutral",
            "Trusted Insider",
            "DKIM, SPF, DMARC Failures",
            "APKmirror",
            "ILOVEYOUBABY",
            "No Problems",
            "Christmas Tree EXEC Code Red worm Computer virus Nimda",
            "Wanna Cry",
            "APK",
            "DC RAT",
            "Emotnet",
            "Redline Swiper",
            "Open Door",
            "Bankers Document",
            "Y2K",
            "wsscript.exe, VBE",
            "Compliance Lock Trap",
            "Globalsign 2020 (potentially exploited)",
            "Heuristic Smear",
            "Gatsby Library Loader DLL",
            "w31999",
            "UofA"
          ],
          "references": [
            "The source of corruption stems from a US wiper/trust bypass doc resting an in Iranian node for C+C. Prelim Data supports this 'may' be misused by [some US lawyer, lower gov]  for suppression and sale to Iran. I want to be explicit in saying, this is a few bad apples, not the majority.",
            "People who exploit this put the US at risk. Bottom line.",
            "Further threat mapping indicates the root of this lies at 52.123.250.[180]. The",
            "For Record: This is not singular blame, while the origin of this root is the problem. It is not isolated.",
            "This is reckless. This is dangerous. Us actors should be ashamed of themselves. #spreader",
            "",
            "IMPACT: https://www.virustotal.com/graph/g92989765f2d44094a4f25307e33fdef026650fe364c640f894bef43f2646a815",
            "This document might expose someone, more than another.",
            "Remediation: Long. Expire the certs. Block the IP for exfiltration 53. Audit 'badge' usage, ASAP.",
            "Other Recs: Pull every Micro Compliance Hold Email. This is a trap. The problem likely resides there.",
            "Micro - Dates to look for specific: April/May/June 2025",
            "Sectigo- Check abnormal patterns Sept 8, 2025 and ADT check alarms that went off",
            "Amazon- Check new cert subscribers on or around Sept 15 2025",
            "Entrust to Sectigo- Review vendors",
            "Apple: Look at Devs around Aug 20-sept 15 2025 abnormalities",
            "CA DMV- 2020 exploits, if even exist in your records, may be related.",
            "Digi/Global Sign - audit 2020 digital intersect",
            "Proton.me/Zenbox: Audit July 2025",
            "Google- look at 202 to Icloud docs likely feb 2025 but possible Dec 24, jan 25 up until June 2025",
            "APKMirror https://www.apkmirror.com",
            "Google Docs 1.25.202.02 APK Download by Google LLC",
            "The ILOVEYOU virus, released on May 4, 2000, - PDKIT.net May 4, 2025.",
            "Y2K",
            "US, Philippines, Ukraine, Iran, China. Alberta.",
            "France",
            "Germany, Austria, and Switzerland GmbH",
            "Gatsby Library Loader, DLL",
            "Spellbinding! Indeed. SpellEditor.exe"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [
            "Government",
            "Telecommunications"
          ],
          "TLP": "green",
          "cloned_from": "69a82c54067ca1d502b1eb6c",
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 3516,
            "hostname": 1614,
            "CVE": 7,
            "URL": 1806,
            "domain": 1416,
            "IPv4": 888,
            "FileHash-MD5": 731,
            "FileHash-SHA1": 787,
            "CIDR": 6,
            "email": 27,
            "IPv6": 10,
            "JA3": 2
          },
          "indicator_count": 10810,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "39 minutes ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "698e93e1ab02db8c49e8c3ed",
          "name": "\u201cBroken Seal\u201d DocuSign-themed Delivery with Fileless Process Hollowing (Zeppelin/Bloat-A)",
          "description": "Forensic analysis indicates a DocuSign-themed phishing campaign using a deliberately invalid X.509 PKI seal (\u201cBroken Seal\u201d) to trigger fail-open verification logic in automated handlers. The delivery mechanism bypasses Secure Email Gateway (SEG) reputation checks by using encrypted channels and human-gated infrastructure. The payload is a fileless Process Hollowing (RunPE) malware that injects into RWX memory of legitimate processes to evade disk-based EDR.",
          "modified": "2026-04-19T08:11:41.130000",
          "created": "2026-02-13T03:00:49.872000",
          "tags": [
            "Zeppelin, Bloat-A, W32.Bloat-A, Zero-Day-Delivery, Protocol-Devi",
            "9698f46495ce9401c8bcaf9a2afe1598",
            "Imphash: 9698f46495ce9401c8bcaf9a2afe1598 | Imports (additional)",
            "MD5: b47266fef17ad4b2e4ca6ee1d06c39a7 SHA-1: cb92796715c799d7e71",
            "Filename: b47266fef17ad4b2e4ca6ee1d06c39a7.virus File Type: Win3",
            "Compilation / Toolchain Compiler: Microsoft Visual C++ 2017 Link",
            "DocuSign-themed phishing lure Invalid X.509 seal (\u201cBroken Seal\u201d)"
          ],
          "references": [
            "Conversely, Port 443 remains accessible, serving a WordPress-based interface backed by a freshly issued Google Trust Services certificate (Feb 4, 2026). This asymmetric configuration ensures that the structurally invalid X.509 \"Broken Seal\" is only delivered via encrypted channels, while the gated Port 80 tier prevents the discovery of the underlying Zeppelin/Bloat-A redirection logic by non-human-interacted sessions.",
            "Imphash: 9698f46495ce9401c8bcaf9a2afe1598 | Imports (additional): GdipSetSmoothingMode, I_UuidCreate, RpcStringFreeW, UuidCreate, UuidToStringW, InternetCheckConnectionW | Resource: RT_MANIFEST (1, ENGLISH US, SHA-256 4bb79dcea0a901f7d9eac5aa05728ae92acb42e0cb22e5dd14134f4421a3d8df, XML, entropy 4.91)",
            "Observed hosting and routing telemetry indicates the delivery infrastructure is operating through AS209242 (Cloudflare London LLC), suggesting the actor is leveraging Cloudflare\u2019s transit layer for resilience and to reduce direct exposure of origin infrastructure.",
            "Research into the gogetlife.co telemetry confirms a dual-port obfuscation strategy designed to bypass multi-layer security indexing. Forensic HTTP scans identify a Port 80 \"Fail-Closed\" state, where standard web traffic is gated by a Cloudflare-managed 403 Forbidden challenge, effectively neutralizing automated crawlers. Conversely, Port 443 remains accessible, serving a WordPress-based interface backed by a freshly issued Google Trust Services certificate (Feb 4, 2026). This asymmetric configuration ensure",
            "Compilation / Toolchain Compiler: Microsoft Visual C++ 2017 Linker: Microsoft Linker 14.16.27032 IDE: Visual Studio 2017 (15.9) Classification: PEBIN TrID: Win64 EXE (32.2%) / Win32 DLL (20.1%) / Win16 NE (15.4%) PE Section Entropy (Suspicion): .data 7.36 \u2192 high (suggests packing/encryption), .reloc 6.66 \u2192 possible runtime modification, .text 6.01, .rdata 5.88, .rsrc 4.72 Imports (Capabilities): CreateRemoteThread, CreateThread, ExitProcess",
            "Broken Seal exploitation: The invalid X.509 seal appears engineered to exploit verification logic gaps, forcing fail-open behavior and allowing SEG bypass under certain configurations. Human-gated delivery posture: Cloudflare 403 challenges suggest the actor enforces human interaction before payload delivery, reducing automated discovery and sandbox analysis. Industrialized infrastructure: Correlation across thousands of domains and URLs indicates a highly automated, rotating delivery ecosystem.",
            "MITRE ATT&CK: Process Hollowing (T1055.012): Documentation on the RunPE injection method used by the payload to achieve a fileless state in RWX memory. RFC 5652 - Cryptographic Message Syntax (CMS): This standard defines the structure of the digital signatures that this campaign's \"Broken Seal\" exploit bypasses.",
            "As of Feb 13 (early AM) \u2014 Indicators of Compromise: 17K | Types: Email (30), FileHash-SHA256 (2,146), URL (8,070), Hostname (2,755), Domain (3,528), Other (1,110) | Geo: US (233), Canada (15), China (10), Japan (2), Spain (2), Other (13)",
            "Verification failure observed in automated verification handlers during sandbox replay.",
            "The payload (SHA256: dfff54...4af) achieves a fileless execution state via Process Hollowing (RunPE), injecting into RWX memory regions of legitimate system processes to evade disk-based EDR telemetry. Anti-analysis controls\u2014including Bochs artifact checks, geofencing logic, and direct CPU clock interrogation\u2014are implemented to validate a high-interaction user environment prior to execution.",
            "Multiple antivirus engines flagged the sample with generic heuristic names (e.g., Trojan:Win32/Vigorf.A, Win32:Malware-gen, Trojan.Generic), consistent with multi-engine heuristic detection on VirusTotal.",
            "Malicious sample (SHA256: fa8e2ddfe42e77a9771a7c4d6421c7a808cf4508f8cd6dc6f4cf8bd4e2ae7f8f) detected as TrojanDownloader:Win32/Tugspay.A with YARA hits for Win32_PUA_Domaiq, aPLib, PECompact_2xx and IDS alerts including TLS Handshake Failure + 403 Forbidden, contacting 36 domains (e.g., api.123mediaplayer.com, static.sslsecure1.com) and IPs such as 104.18.23.19 and 193.166.255.171.",
            "SHA256 3d10374b55a18a2dd90d35d28472600496c680a7efab4e772595f735cb062343 identified as Win.Malware.Vtflooder-9783271-0 / Trojan:Win32/Vflooder.B with UPX/Nrv2x packing YARA hits, IDS detections for Win32/Vflooder.B check-in and DOS behavior, and network C2 indicators including 172.66.0.227 and 34.54.88.138.",
            "SHA-256: fc1fedce1419d4e2009828aad8644deca78b4eeed176e5b009797e0eb0d7d3ff \u2014 Detected as Win.Malware.Vtflooder / Trojan:Win32/Vflooder; UPX-packed PE32 executable, with 812 IDS hits (including C2 checkin + HTTP EXE upload).",
            "nationalgrid.com \u2014 Whitelisted domain (US, AS13335 Cloudflare) with 500+ passive DNS entries, 692 URLs, 195 subdomains, and 2 malicious files hosted on IP 104.17.1.192, which is concerning given the infrastructure and trust level.",
            "eversource.com (IP: 159.108.5.46, ASN: AS2024) has 2 flagged malicious files within its infrastructure, despite being whitelisted. The domain hosts 95 subdomains and maintains an active SPF record, indicating potential security risks under an otherwise trusted facade.",
            "Whitelisted IP Address 204.79.197.212 Location  United States ASN AS8068 microsoft corporation Nameservers ns4-205.azure-dns.info. ,  ns1-205.azure-dns.com. More WHOIS Registrar: MarkMonitor, Inc.,   Creation Date: Mar 26, 1996 Related Pulses OTX User-Created Pulses (50) Related Tags 2025 Related Tags 4328 ,  5943 ,  80211 ,  #supportsitewebsiteabuse #rootcertificatefailure #cryptographicf ,  The dynamics of the mudoSOSIntersectalign with sophisticated adv More Indicator Facts 982 malicious files communicat",
            "",
            "The AlienVault OTX report for flypdx.com documents 11 related tags, including ids detections and av detections, across 4 active AWS IP addresses (3.175.34.30\u2013.106). These indicators confirm the airport's network has been flagged for unauthorized activity, specifically pointing to a bridge between their web infrastructure and internal passenger tracking. The display of PII on aviation hardware during my June flight matches a known data-bleeding pattern where Personally Identifiable Information (PII) leaks fr"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "China",
            "United States of America",
            "Spain",
            "Japan",
            "Canada"
          ],
          "malware_families": [],
          "attack_ids": [],
          "industries": [
            "Legal, Financial, Healthcare, Government, Municipal, Real-Estate, Enterprise-Technology, Critical-In"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 27678,
            "FileHash-SHA256": 47676,
            "FileHash-MD5": 42534,
            "FileHash-SHA1": 23213,
            "hostname": 33703,
            "URL": 75433,
            "SSLCertFingerprint": 30,
            "CVE": 7582,
            "email": 313,
            "FileHash-IMPHASH": 8,
            "CIDR": 26205,
            "JA3": 1,
            "IPv4": 80,
            "URI": 5
          },
          "indicator_count": 284461,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 68,
          "modified_text": "1 hour ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69e434769e2a43c088066ca2",
          "name": "Kraddare \u2022 Agent Tesla \u2022 CVE Jar clone credit octoseek",
          "description": "",
          "modified": "2026-04-19T07:36:41.138000",
          "created": "2026-04-19T01:48:38.335000",
          "tags": [
            "heur",
            "cisco umbrella",
            "site",
            "alexa top",
            "malware",
            "million",
            "xcnfe",
            "maltiverse",
            "malware site",
            "safe site",
            "malicious",
            "trojan",
            "artemis",
            "vidar",
            "redline stealer",
            "raccoon",
            "keylogger",
            "riskware",
            "agent tesla",
            "remcos",
            "stealer",
            "miner",
            "hacktool",
            "bank",
            "agenttesla",
            "agent",
            "unknown",
            "downloader",
            "unsafe",
            "detplock",
            "networm",
            "win64",
            "service",
            "smokeloader",
            "dropper",
            "crack",
            "alexa",
            "trojanspy",
            "detection list",
            "blacklist https",
            "kyriazhs1975",
            "noname057",
            "tag count",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "blacklist",
            "cyber threat",
            "united",
            "engineering",
            "phishing",
            "covid19",
            "facebook",
            "phishing site",
            "paypal",
            "njrat",
            "emotet",
            "nanocore rat",
            "meterpreter",
            "azorult",
            "download",
            "msil",
            "bladabindi",
            "mirai",
            "pony",
            "nanocore",
            "bradesco",
            "cobalt strike",
            "cve201711882",
            "redline",
            "ssl certificate",
            "tsara brashears",
            "cyberstalking",
            "spyware",
            "apple ios",
            "quasar",
            "ransomware",
            "malware norad",
            "cry kill",
            "attack",
            "installer",
            "formbook",
            "lockbit",
            "open",
            "banker",
            "bazarloader",
            "core",
            "ransomexx",
            "name verdict",
            "pattern match",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "misc attack",
            "script",
            "beginstring",
            "ascii text",
            "null",
            "date",
            "error",
            "span",
            "refresh",
            "class",
            "generator",
            "critical",
            "body",
            "look",
            "verify",
            "restart",
            "meta",
            "hybrid",
            "general",
            "click",
            "strings",
            "tools",
            "as141773",
            "as63932",
            "moved",
            "passive dns",
            "search",
            "entries",
            "gmt content",
            "type",
            "keep alive",
            "scan endpoints",
            "all octoseek",
            "pulse pulses",
            "as17806 mango",
            "blacklist http",
            "phishtank",
            "malicious site",
            "apple",
            "blockchain",
            "runescape",
            "twitter",
            "qakbot",
            "asyncrat",
            "team",
            "internet storm",
            "generic",
            "union",
            "bazaloader",
            "media",
            "generic malware",
            "hostname",
            "suppobox",
            "netwire rc",
            "installcore",
            "conduit",
            "iobit",
            "mediaget",
            "outbreak",
            "acint",
            "installpack",
            "phish",
            "rostpay",
            "fakeinstaller",
            "spyrixkeylogger",
            "bitminer",
            "loadmoney",
            "filetour",
            "wacatac",
            "fusioncore",
            "dapato",
            "cleaner",
            "softonic",
            "encpk",
            "qbot",
            "predator",
            "swrort",
            "kraddare",
            "systweak",
            "dllinject",
            "driverpack",
            "iframe",
            "downldr",
            "presenoker",
            "as61317",
            "asnone united",
            "urls",
            "files",
            "next",
            "as15169 google",
            "japan unknown",
            "as17506 arteria",
            "as32244 liquid",
            "as49505",
            "russia unknown",
            "expired",
            "domain",
            "falcon",
            "as19969",
            "ipv4",
            "ransom",
            "encrypt",
            "file",
            "windows nt",
            "indicator",
            "response",
            "appdata",
            "gmt contenttype",
            "png image",
            "local",
            "contacted",
            "fali malicious",
            "dropped",
            "communicating",
            "referrer",
            "fali contacted",
            "silk road",
            "immediate",
            "cymulate2",
            "tsara brashears",
            "malvertizing"
          ],
          "references": [
            "https://wallpapers-nature.com/tsara-brashears/urlscan-io",
            "alohatube.xyz",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "http://alohatube.xyz/search/tsara-brashears",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "ww.google.com.uy",
            "https://alohatube.xyz/search/tsara-brashears",
            "https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
            "https://polling.portal.gov.bd/js/npc.script.js",
            "polling.portal.gov.bd",
            "https://polling.portal.gov.bd/js/npop.script.js",
            "http://watchhers.net/index.php",
            "https://brandyallen.com/2022/11/23/sexy",
            "m.pornsexer.xxx.3.1.adiosfil.roksit.net",
            "http://park.above.com/jr.php?gz=DjDNgvDQ0WlpBALxevxSvkF3jBH95b5riUvmgFjb1tbPDV06suYFlRcPA34ufLE5UZ8spiM7ya7tRXR8nLUgk920DSaIXniiR5hkoveznG%20mez7OU5R%20HKIczV475LuRwxm3J1pcRSpQcePtF/4aD%20frLO%205mYc0Maj8Z1IwBeAMESc9Gk3BzCkGUHNVeCAZ9vZrQhEeVvN%20QVBAu1boZNJTnvCAP0lB5ebMSP92bFHD/ItyL53LoVDSYWMd64KTNMMJaXE0kZVqQn/%20STriQbrA6cmW3Xj4sAJ3XXEbNNJzTbIvgsy00PlKWInEUK/iXzVecaBsXg3vkUcvkeM3HPPIajaBexXO7ATYz/qTeKAksI9l2IoDAsn0S9BYCTuP8uTYdgJAv0LO%20MkNBOrSqJnFQzTlNxG4NRSP6K4VDWklVPpCwQc/s/AfrwIdLcdrV6CQDLaluG1naOjXDc",
            "http://nhrc.portal.gov.bd/sites/default/files/files/nhrc.portal.gov.bd/page/348ec5eb_22f8_4754_bb62_6a0d15ba1513/Study-Report-on-Sexual-Offences_Final.pdf",
            "https://twitter.com/PORNO_SEXYBABES",
            "https://alohatube.xyz/search/sex-mom-dog-animal",
            "https://www.colorfulbox.jp/",
            "Hybrid Analysis",
            "Any.run",
            "OTX AlienVault",
            "Urlscan",
            "UrlVoid",
            "http://emrd.gov.bd/dead.php",
            "http://titasgas.portal.gov.bd/dead.php",
            "http://mincom.gov.bd/dead.php",
            "http://cabinet.gov.bd/dead.php"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Malaysia",
            "Bangladesh"
          ],
          "malware_families": [
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Racoon Stealer",
              "display_name": "Racoon Stealer",
              "target": null
            },
            {
              "id": "Ransomexx",
              "display_name": "Ransomexx",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "njRAT - S0385",
              "display_name": "njRAT - S0385",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Bazaar Loader",
              "display_name": "Bazaar Loader",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Detplock",
              "display_name": "Detplock",
              "target": null
            },
            {
              "id": "WannaCry Kill Switch",
              "display_name": "WannaCry Kill Switch",
              "target": null
            },
            {
              "id": "Ghandi",
              "display_name": "Ghandi",
              "target": null
            },
            {
              "id": "Systweak",
              "display_name": "Systweak",
              "target": null
            },
            {
              "id": "Swort",
              "display_name": "Swort",
              "target": null
            },
            {
              "id": "Silk Road",
              "display_name": "Silk Road",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:PUA:Win32/SpyrixKeylogger",
              "display_name": "ALF:HeraklezEval:PUA:Win32/SpyrixKeylogger",
              "target": null
            },
            {
              "id": "Trojan:Win32/Wacatac",
              "display_name": "Trojan:Win32/Wacatac",
              "target": "/malware/Trojan:Win32/Wacatac"
            },
            {
              "id": "RansomEXX",
              "display_name": "RansomEXX",
              "target": null
            },
            {
              "id": "noname057",
              "display_name": "noname057",
              "target": null
            },
            {
              "id": "Nanocore RAT",
              "display_name": "Nanocore RAT",
              "target": null
            },
            {
              "id": "Worm:VBS/Dapato",
              "display_name": "Worm:VBS/Dapato",
              "target": "/malware/Worm:VBS/Dapato"
            },
            {
              "id": "Kraddare",
              "display_name": "Kraddare",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1110",
              "name": "Brute Force",
              "display_name": "T1110 - Brute Force"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1571",
              "name": "Non-Standard Port",
              "display_name": "T1571 - Non-Standard Port"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1491",
              "name": "Defacement",
              "display_name": "T1491 - Defacement"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "654a7a53317c717d1f4fee7f",
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2522,
            "FileHash-SHA1": 862,
            "FileHash-SHA256": 2855,
            "URL": 7963,
            "domain": 1168,
            "hostname": 3181,
            "CVE": 13,
            "email": 2
          },
          "indicator_count": 18566,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 47,
          "modified_text": "2 hours ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69bdecb269c9d6fad107de1f",
          "name": "Google - BOT Beacon | Ransomware present | Active phishing campaigns",
          "description": "",
          "modified": "2026-04-19T00:22:55.777000",
          "created": "2026-03-21T00:56:18.458000",
          "tags": [
            "dynamicloader",
            "get na",
            "high",
            "request",
            "google",
            "write c",
            "explorer",
            "malware",
            "virus",
            "polyransom",
            "ransom",
            "phishing",
            "cnc",
            "virlock",
            "system impact",
            "encrypts user",
            "slows",
            "ransom",
            "4 detection",
            "removal modern",
            "kaspersky",
            "3 prevention",
            "tips",
            "modifies itself",
            "polymorphic ransomware",
            "encrypts files",
            "\"parasitic\" virus",
            "modifies existing files",
            "spreader",
            "google llc",
            "file Infection",
            "algorithm",
            "ouno sni",
            "key usage",
            "data",
            "v3 serial",
            "number",
            "public key",
            "info",
            "key algorithm",
            "subject key",
            "self-signed",
            "mitre att",
            "defense evasion",
            "ta0005",
            "software",
            "evasion",
            "artifacts v",
            "full reports",
            "v help",
            "dns resolutions",
            "traffic udp",
            "hashes",
            "trojan",
            "redirects",
            "ms windows",
            "pe32",
            "users",
            "medium",
            "yara rule",
            "cache",
            "search",
            "intel",
            "music",
            "write",
            "unknown",
            "virtool",
            "copy",
            "guard",
            "suspicious",
            "defender",
            "launch",
            "tracker",
            "media",
            "next"
          ],
          "references": [
            "External Hosts: COUNTRY ASN 142.251.33.206\tgoogle.com |google.comUnited StatesAS15169 google llc",
            "IDS Detections: SUSPICIOUS Possible automated connectivity check (www.google.com)",
            "IDS Detections: Terse Unencrypted Request for Google - Likely Connectivity Check",
            "Yara Detections: UPX",
            "Alerts: antisandbox_sleep hardware_id_profiling physical_drive_access suspicious_iocontrol_codes",
            "Alerts: process_creation_suspicious_location infostealer_browser apc_injection persistence_autorun",
            "Alerts: persistence_autorun_tasks binary_yara procmem_yara suricata_alert antivm_bochs_keys",
            "Alerts: antivm_generic_disk deletes_executed_files disables_uac folder_enumeration",
            "Alerts: stealth_hidden_extension stealth_hiddenreg suspicious_command",
            "142.250.147.101 \u2022 142.251.33.206 command_and_control",
            "http://142.251.33.206/ phishing",
            "http://www.forensickb.com/2013/03/file-entropy-explained.html  phishing",
            "invalid2.invalid   4259517cd4e48a289d332ab3f0ab52a366322824",
            "System Impact: Once active, it typically: Encrypts user data and locks the screen.",
            "System Impact: Slows down system performance.",
            "System Impact: Attempts to spread to network shares and cloud storage",
            "Ransom Demands: Like other ransomware, it demands payment (often in cryptocurrency) to restore access to files or the system.",
            "Matches rule MALWARE-CNC Win.Trojan.Ramnit variant outbound detected",
            "Matches rule MALWARE-CNC Win.Malware.Ramnit outbound REGISTER_BOT beacon",
            "Matches rule ET MALWARE Win32/Ramnit Checkin Unique rule identifier: This rule belongs to a private collection."
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Win.Virus.PolyRansom-5704625-0",
              "display_name": "Win.Virus.PolyRansom-5704625-0",
              "target": null
            },
            {
              "id": "Other Malware",
              "display_name": "Other Malware",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1587.001",
              "name": "Malware",
              "display_name": "T1587.001 - Malware"
            },
            {
              "id": "T1044",
              "name": "File System Permissions Weakness",
              "display_name": "T1044 - File System Permissions Weakness"
            },
            {
              "id": "T1222.001",
              "name": "Windows File and Directory Permissions Modification",
              "display_name": "T1222.001 - Windows File and Directory Permissions Modification"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "IPv4": 14,
            "URL": 431,
            "FileHash-MD5": 123,
            "FileHash-SHA1": 33,
            "FileHash-SHA256": 478,
            "domain": 141,
            "hostname": 199,
            "email": 1,
            "CIDR": 1
          },
          "indicator_count": 1421,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "9 hours ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69bb8ed03ea0d872b77025ef",
          "name": "VerizonBusiness- Telecom",
          "description": "Trojans are found under a Verizon business account as a general consumer. SOS has been blocked multiple times as well as outbound calls. Lifesafety Event.",
          "modified": "2026-04-18T06:00:28.363000",
          "created": "2026-03-19T05:51:12.687000",
          "tags": [
            "united",
            "as701",
            "aaaa",
            "as7046",
            "as3378",
            "as6984 verizon",
            "tollnumcc1",
            "tollfreenumcc1",
            "cname",
            "as703"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 113,
            "FileHash-MD5": 58,
            "FileHash-SHA1": 46,
            "FileHash-SHA256": 458,
            "domain": 5,
            "email": 1,
            "hostname": 91,
            "JA3": 1
          },
          "indicator_count": 773,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 49,
          "modified_text": "1 day ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "699c3b796fcaed878ca94c5c",
          "name": "https://m.vzw.com/wIvzrd8",
          "description": "the wizard",
          "modified": "2026-04-18T05:30:18.690000",
          "created": "2026-02-23T11:35:21.673000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1818,
            "hostname": 575,
            "URL": 200,
            "FileHash-SHA1": 450,
            "CIDR": 11,
            "domain": 887,
            "email": 7,
            "FileHash-MD5": 402,
            "CVE": 21
          },
          "indicator_count": 4371,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "1 day ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69ba1037c60cb420bf66b46c",
          "name": "docaccess",
          "description": "",
          "modified": "2026-04-18T05:15:12.381000",
          "created": "2026-03-18T02:38:47.338000",
          "tags": [
            "html document",
            "unicode text",
            "utf8 text",
            "crlf",
            "lf line"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 309,
            "FileHash-SHA1": 288,
            "FileHash-SHA256": 545,
            "URL": 117,
            "domain": 108,
            "email": 7,
            "hostname": 44,
            "CVE": 1
          },
          "indicator_count": 1419,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "1 day ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69e2f11d6c64ebb73108a718",
          "name": "Clone from 1 mo ago by me \"motherless.com\"",
          "description": "",
          "modified": "2026-04-18T04:01:08.013000",
          "created": "2026-04-18T02:49:01.477000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": "69b75475235f55af134a852e",
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 130,
            "hostname": 386,
            "URL": 893,
            "FileHash-MD5": 855,
            "FileHash-SHA1": 320,
            "FileHash-SHA256": 320,
            "SSLCertFingerprint": 129
          },
          "indicator_count": 3033,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 47,
          "modified_text": "1 day ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69e1c911b11a4216f3f8ab83",
          "name": "ReaQta - Hive Behavioral Analysis www.discord.com www.cdn.discord.die-with-a-smile.pdf",
          "description": "<<Here is the full list of details on the VenusEye Sandbox.  \u00c2\u00a31.5m ($2.3m)  -  it was created in the 1990s.>>>\nwww.discord.com www.cdn.discord.die-with-a-smile.pdf.com.com - HIVE",
          "modified": "2026-04-18T00:51:16.315000",
          "created": "2026-04-17T05:45:53.543000",
          "tags": [
            "reaqta",
            "files",
            "registry",
            "basic",
            "file name",
            "file type",
            "pe32 executable",
            "ms windows",
            "intel",
            "file size",
            "utc8 network",
            "pe file",
            "extra info",
            "aslr",
            "downloads",
            "urls",
            "attack network",
            "info processes",
            "zenbox verdict",
            "guest system",
            "ultimate file",
            "code",
            "next",
            "default",
            "settingswpad",
            "registry keys",
            "inprocserver32",
            "mutexes nothing",
            "parent pid",
            "full path",
            "command line",
            "files c",
            "read registry",
            "windows sandbox",
            "calls process"
          ],
          "references": [
            "https://vtbehaviour.commondatastorage.googleapis.com/1af55649a731abb95d71e2e49693a7bcf87270eb4f8712b747f7e04a0a2a3031_ReaQta-Hive.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1776404544&Signature=LCRNjms1qthotVXcKmffBD10Y7DKisr7k%2BlVYrTjCank6HB3%2ByH%2F1sAynrAczQNJMFvSCN5berXjisgbRQS12Ua0xWRr9S8WNELQIpaix5s1ZmT%2F20DZy3aPTFnkYjLEAbwCqct2rNETUFlznOBprz2NuaYDQTMU%2BBIuWQmPBconTM%2Bl3i3R2ijpm8NB74T2%2FHObuJDy9Q6nZLrypCtVXWXhM%2FFXBVbGbSnv8YuAN1knzyCy7",
            "https://vtbehaviour.commondatastorage.googleapis.com/1af55649a731abb95d71e2e49693a7bcf87270eb4f8712b747f7e04a0a2a3031_VenusEye%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1776404740&Signature=UTWPNbGAoA9TgTHQiId%2B2IX5vXvrJW9JEMICUB8TIsjB%2F%2FqCyeDRc4kvJNYPqQxTrStjGw64eO9p5qPWO6VtkqSnCJfMhO67pVlA8pr2ftHKAGXBV5zwKVkKMUZEs45BhHkY1DLOe0o69EkrN5SlNTblrAVGT5Q6ZG54BbmLetpACp804v%2F9sfa7RgSTZBnItoA9xHcNnivoqRtyhreowE%2FTLFAXboIqs9cti95uwbKKhqzb",
            "https://vtbehaviour.commondatastorage.googleapis.com/1af55649a731abb95d71e2e49693a7bcf87270eb4f8712b747f7e04a0a2a3031_Zenbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1776404830&Signature=xTx%2BpDgPVcC%2F9bas7r9zOD2cjhR8moW2kepUI6Dfmz5WrCrWqUpFCtn3pgbDYZqdfFa8HCluzOBpUA8ULheNBisUcHil3cplF57DdYR1C1d9uPgSqqOrjpYXoL3OtlzZFv8X00%2Ft7xwGwRgS9BohRtLi8EFvJTAJ7RC7EOm9FpG49dFxcnvjNDFSixUo2g9P0f4m0li3fkcR9onjdL2WmM1vSmAJBiaVxCMHhG8K49Ro3AwUrT9AV2uG9CnH%2Bu",
            "https://vtbehaviour.commondatastorage.googleapis.com/1af55649a731abb95d71e2e49693a7bcf87270eb4f8712b747f7e04a0a2a3031_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1776404848&Signature=WmTL2fYm%2FkDYVa9Qo9Nz9RPF1sK%2BSfCJJtstGHcUos0pBsz0gehytubNXzwSckZACwulvt8Ye%2BDV3Q82C9WedSfmtisHhwbJuUC69xdfCcBiGcZjiEl%2FCDYoT5bQr16cZP7weWAn%2Beg8YFq4S5VWlVp3M7vNlHJSPy%2Bt4RNKiO6O5wHc74tX7b5Hvl08W9i%2F6vQ8iTmB0OFx21UK%2FG4wdLMIrBbhaxVD3zWi81iu0vgOU9",
            "https://vtbehaviour.commondatastorage.googleapis.com/1af55649a731abb95d71e2e49693a7bcf87270eb4f8712b747f7e04a0a2a3031_VirusTotal%20Jujubox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1776404928&Signature=tWjsWqqnoY%2FioSmCeqIaZY4021%2Bm6UFV%2BEiTdTHnMx6FcCgc4YRDjhGLoV24Vk%2Bq8%2Fz0qx1OAHNDq3adCrUxmP%2BTR0vYWjYEiuy%2F6hg7oSF9eiX%2BAEgRS7vQzZdiOy7%2BoKaLRFGet0HWmKoQkMYLyrY9Yu4k5mnQmOG4oecchl9baESpYfESVVfol0t7Xn%2FZCVd%2FH5gn%2BCysfY7lTC07sxIs0Cc6%2F%"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1018",
              "name": "Remote System Discovery",
              "display_name": "T1018 - Remote System Discovery"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 122,
            "FileHash-SHA1": 139,
            "FileHash-SHA256": 177,
            "IPv4": 79,
            "URL": 213,
            "domain": 226,
            "hostname": 197,
            "FilePath": 1,
            "CVE": 8
          },
          "indicator_count": 1162,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "1 day ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69e1cc70fcbd3f613502e1f7",
          "name": "order  clone by aclause21 Public",
          "description": "",
          "modified": "2026-04-17T09:28:38.049000",
          "created": "2026-04-17T06:00:16.867000",
          "tags": [
            "access ta0001",
            "defense evasion",
            "access ta0006",
            "command",
            "control ta0011",
            "impact ta0040",
            "catalog tree",
            "ob0005 defense",
            "evasion ob0006",
            "impact ob0008",
            "hashes cape",
            "sandbox",
            "docguard",
            "yomi hunter",
            "zenbox",
            "ip traffic",
            "pattern domains",
            "memory pattern",
            "urls https",
            "adversaries",
            "mitre att",
            "t1189 found",
            "clickable urls",
            "pdf execution",
            "t1036",
            "creates",
            "hide artifacts",
            "exploitation",
            "e1564 hidden",
            "files",
            "discovery e1082",
            "e1203 data",
            "vhash",
            "ssdeep",
            "file type",
            "pdf document",
            "magic pdf",
            "trid adobe",
            "format",
            "file size",
            "united",
            "as32934",
            "passive dns",
            "unknown",
            "scan endpoints",
            "all scoreblue",
            "ipv4",
            "pulse pulses",
            "urls",
            "status",
            "search",
            "showing",
            "server error",
            "certificate",
            "creation date",
            "high assurance",
            "server ca",
            "date",
            "body",
            "win32",
            "ransom",
            "entries",
            "icmp traffic",
            "packing t1045",
            "t1045",
            "pdb path",
            "pe resource",
            "show",
            "malware",
            "copy",
            "push",
            "write",
            "aaaa",
            "nxdomain",
            "united kingdom",
            "thailand",
            "vietnam",
            "as45430",
            "honduras",
            "indonesia",
            "mexico",
            "slovakia",
            "dynamicloader",
            "yara rule",
            "high",
            "ekyxe",
            "xe e",
            "eofae",
            "ee edcje4j",
            "tofsee",
            "windows",
            "medium",
            "stream",
            "grum",
            "as15169 google",
            "pulses",
            "record value",
            "error",
            "cname",
            "name servers",
            "ireland",
            "next",
            "federation asn",
            "as49505",
            "labs pulses",
            "trojan",
            "trojandropper",
            "related pulses",
            "file samples",
            "files matching",
            "date hash",
            "copyright",
            "all search",
            "reverse dns",
            "location united",
            "emails info",
            "expiration date",
            "as51167 contabo",
            "germany unknown",
            "a nxdomain",
            "as40021 contabo",
            "encrypt",
            "url http",
            "http",
            "ip address",
            "related nids",
            "files location",
            "ddos",
            "activity",
            "checkin",
            "win64",
            "mirai",
            "hosting",
            "files ip",
            "address",
            "czechia unknown",
            "as174 cogent",
            "asnone germany",
            "as15598",
            "as16625 akamai",
            "asnone united",
            "as20940",
            "as35994 akamai",
            "as12337 noris",
            "pulse submit",
            "url analysis",
            "backdoor",
            "gmt cache",
            "sameorigin",
            "443 ma2592000",
            "suspicious",
            "virtool",
            "emails",
            "domain name",
            "code",
            "brazil",
            "poland",
            "domain",
            "msie",
            "windows nt",
            "tcp syn",
            "resolverror",
            "exploit",
            "externalport",
            "internalport",
            "http headers",
            "home network",
            "demonbot",
            "andariel",
            "yara detections",
            "malware traffic",
            "nids",
            "dns query",
            "google safe",
            "browsing",
            "whois",
            "virustotal",
            "mtb apr",
            "asnone related",
            "open",
            "hash avast",
            "avg clamav",
            "msdefender apr",
            "as8075",
            "content type",
            "access",
            "cp bus",
            "cur cono",
            "fin ivdo",
            "onl our",
            "phy samo",
            "overview ip",
            "flag united",
            "hostname",
            "files domain",
            "as8068",
            "trojan features",
            "rsa tls",
            "issuing ca",
            "mirai variant",
            "useragent",
            "inbound",
            "realtek sdk",
            "miniigd upnp",
            "soap command",
            "activity mirai",
            "helloworld",
            "users",
            "alerts",
            "anomalous file",
            "recycle bin",
            "filehash",
            "av detections",
            "memcommit",
            "read c",
            "memreserve",
            "for privacy",
            "china unknown",
            "ag alberto",
            "pedraz",
            "holidaycheck ag",
            "project pi",
            "immobilien ag",
            "puma se",
            "kurt walther",
            "ag ingo",
            "kraupa",
            "timo salzsieder",
            "record type",
            "ttl value",
            "msms57295540",
            "subdomains",
            "ireland unknown",
            "analyzer paste",
            "iocs",
            "samples",
            "regsetvalueexa",
            "default",
            "regdword",
            "module load",
            "t1129",
            "http request",
            "process32nextw",
            "regbinary",
            "oxypumper",
            "tools",
            "dock",
            "april",
            "persistence",
            "execution",
            "download",
            "as62597 nsone",
            "echo request",
            "sweep",
            "payload hello",
            "world",
            "total",
            "please",
            "xport",
            "main",
            "look",
            "install",
            "servers",
            "found",
            "cnapple public",
            "accept",
            "chrome",
            "moved",
            "ssl certificate",
            "write c",
            "installcore",
            "june",
            "delphi",
            "as47846",
            "cookie",
            "as32787 akamai",
            "as714 apple",
            "m1",
            "onelouder",
            "brian sabey",
            "denver colorado",
            "fakedout threat",
            "gmt content",
            "x cache",
            "div div",
            "as8972 host",
            "france unknown",
            "registrar",
            "otx scoreblue",
            "address domain",
            "as24940 hetzner",
            "as44273 host",
            "asn as15598",
            "trojanspy",
            "mail spammer",
            "germany mail",
            "spammer",
            "hichina",
            "data redacted",
            "a domains",
            "wow64",
            "slcc2",
            "media center",
            "port",
            "powershell",
            "urls http",
            "tptjsw",
            "virus",
            "ids detections",
            "germany",
            "as8560",
            "austria",
            "as1921",
            "as14061",
            "whitelisted",
            "as16276",
            "script urls",
            "as16552 tiggee",
            "as9009 m247",
            "meta",
            "as29789",
            "detected m1",
            "mtb aug",
            "server",
            "as397241",
            "cryp",
            "hostmaster",
            "networks",
            "as19024",
            "gmt setcookie",
            "delete",
            "russia as49505",
            "sinkhole cookie",
            "value snkz",
            "pe32",
            "possible",
            "susp",
            "lnmp",
            "lnmp a",
            "licess",
            "shell",
            "as63949 linode",
            "as133618",
            "as21342",
            "cve201717215",
            "huawei remote",
            "huawei hg532",
            "malware worm",
            "gafgyt",
            "exploit none",
            "binbusybox",
            "delete c",
            "odigicert inc",
            "stwashington",
            "lredmond",
            "rsa ca",
            "cape",
            "nondns",
            "denver",
            "redacted for",
            "method status",
            "url hostname",
            "ip country",
            "type get",
            "date tue",
            "gmt contenttype",
            "connection",
            "cachecontrol",
            "expires thu",
            "gmt vary",
            "poland unknown",
            "title",
            "script domains",
            "updated date",
            "serce internetu",
            "cnc beacon",
            "javascript",
            "wsasend",
            "post",
            "delete shadows",
            "all quiet",
            "t1047",
            "instrumentation",
            "rpcs",
            "ms windows",
            "asnone dns",
            "http host",
            "ip check",
            "sha256",
            "bits",
            "adware malware",
            "etpro malware",
            "bios",
            "guard",
            "tulach",
            "spectrum",
            "cyber folks",
            "tsara brashears",
            ".pl",
            "contacted",
            "kryptikxp",
            "apple",
            "ios",
            "android",
            "sabey",
            "charter communications",
            "denvecolorado",
            "quantum fiber",
            "air force",
            "swipper",
            "masquerade",
            "hitmen",
            "mitm",
            "whitesky",
            "cyber warfare",
            "porn",
            "pornhub.software"
          ],
          "references": [
            "DISTINCTIO8.pdf",
            "FileHash - SHA256 001f0ebe975b5f5a7e5272f53455635cc938a5a0129417f7e79c39df6cf65657 | Yara Detections: stack_string",
            "IDS Detections: Win32/Tofsee.AX google.com connectivity check Non-DNS or Non-Compliant DNS traffic on DNS port Opcode 8 through 15 set",
            "Tofsee: 'google.com' |  https://www.gov50.icu |",
            "ET TROJAN Win32/DarkWatchman Checkin Activity (POST) ( This is true. They sit around watching, following...)",
            "Alerts: procmem_yara injection_inter_process creates_largekey network_bind persistence_autorun antivm_generic_disk",
            "Alerts: persistence_autorun_tasks spawns_dev_util cape_detected_threat injection_process_hollowing",
            "hubt.pornhub.com | www.pornhub.com | pornative.com",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian ||  pin.it || https://pin.it/",
            "www.sweetheartvideo.com || https://www.sweetheartvideo.com/tsara-brashears/",
            "Unix.Trojan.Mirai-6981169-0: FileHash - SHA256  fe00b364b6b8342e3ce0dd146902ac3330ab976e87aca6be666efde39ea485da",
            "IDS Detections: WGET Command Specifying Output in HTTP Headers",
            "IDS Detections: D-Link Devices Home Network Administration Protocol Command Execution",
            "Yara Detections: is__elf ,  DemonBot",
            "Alerts: dead_host network_icmp tcp_syn_scan nolookup_communication writes_to_stdout",
            "FileHash - SHA256  f32f6b229913d68daad937cc72a57aa45291a9d623109ed48938815aa7b6005c",
            "IDS Detections: Andariel Backdoor Activity (Checkin)",
            "Alerts: dead_host nids_malware_alert network_icmp nolookup_communication",
            "DDoS:Linux/Gafgyt : FileHash - SHA256  358c2bd5b9e925dc23894dec18ce486c03d743cde766ce298ac1e2f00d86f0b2",
            "IDS Detection: Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound",
            "IDS Detection: Mirai Variant User-Agent (Inbound) WebShell Generic - wget http - POST",
            "IDS Detection: Observed Suspicious UA (Hello-World) Suspicious Activity potential UPnProxy",
            "http://vortex-nlb-http2-fed-us-taut-purple.nr-data.net/",
            "https://tulach.cc/ || tulach.cc || www-temp.metrobyt-mobile.com",
            "apple-reactivate.com | appleweb-aem.apple.com | apple.com | revoked-aprtr1-tr1g1.apple.com | network-framework.apple.com",
            "autodiscover.webcompanion.com || avc-gft-dashboard.apple.com || cac1-wwfde-wave.apple.com || demo27.apple.com",
            "* https://github.com/MSUDenverSystemsEngineering/Salt-Instructional-18/tree/master/AppDeployToolkit",
            "https://tulach.cc/ | tulach.cc |",
            "http://hallrender.com/attorney/brian-sabey | www-temp.metrobyt-mobile.com",
            "google.pl | aplikacja.ceidg.gov.pl | imaginecup.pl | microsoft.pl",
            "18teen.net | teensnow.com | grannies-porn.net | pornmd.com",
            "www.pornhubselect.com | pornhub.software"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Chile",
            "Morocco",
            "Taiwan",
            "Guatemala",
            "United Kingdom of Great Britain and Northern Ireland",
            "Ireland",
            "Kenya",
            "Peru",
            "Singapore",
            "Mexico",
            "Brazil",
            "Slovakia",
            "Spain",
            "Australia",
            "Belgium",
            "Germany",
            "Hungary",
            "Netherlands",
            "Russian Federation",
            "Japan",
            "Poland"
          ],
          "malware_families": [
            {
              "id": "Ransom",
              "display_name": "Ransom",
              "target": null
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "TEL:CreateScheduledTask",
              "display_name": "TEL:CreateScheduledTask",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Unix.Trojan.Mirai-6981169-0",
              "display_name": "Unix.Trojan.Mirai-6981169-0",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Tofsee",
              "display_name": "Backdoor:Win32/Tofsee",
              "target": "/malware/Backdoor:Win32/Tofsee"
            },
            {
              "id": "Ransom:Win32/Haperlock",
              "display_name": "Ransom:Win32/Haperlock",
              "target": "/malware/Ransom:Win32/Haperlock"
            },
            {
              "id": "Trojan:Win32/Neurevt",
              "display_name": "Trojan:Win32/Neurevt",
              "target": "/malware/Trojan:Win32/Neurevt"
            },
            {
              "id": "DDoS:Linux/Gafgyt.YA!MTB",
              "display_name": "DDoS:Linux/Gafgyt.YA!MTB",
              "target": "/malware/DDoS:Linux/Gafgyt.YA!MTB"
            },
            {
              "id": "CVE-2017-17215",
              "display_name": "CVE-2017-17215",
              "target": null
            },
            {
              "id": "CVE-2023-27350",
              "display_name": "CVE-2023-27350",
              "target": null
            },
            {
              "id": "CVE-2014-8361",
              "display_name": "CVE-2014-8361",
              "target": null
            },
            {
              "id": "Trojan:Win32/Zombie.A",
              "display_name": "Trojan:Win32/Zombie.A",
              "target": "/malware/Trojan:Win32/Zombie.A"
            },
            {
              "id": "NIDS",
              "display_name": "NIDS",
              "target": null
            },
            {
              "id": "M1",
              "display_name": "M1",
              "target": null
            },
            {
              "id": "OneLouder",
              "display_name": "OneLouder",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Win.Trojan.Sarwent-10012602-0",
              "display_name": "Win.Trojan.Sarwent-10012602-0",
              "target": null
            },
            {
              "id": "Virus:Win32/Sivis.A",
              "display_name": "Virus:Win32/Sivis.A",
              "target": "/malware/Virus:Win32/Sivis.A"
            },
            {
              "id": "Win.Trojan.Installcore-1177",
              "display_name": "Win.Trojan.Installcore-1177",
              "target": null
            },
            {
              "id": "Win.Malware.Oxypumper-6900435-0",
              "display_name": "Win.Malware.Oxypumper-6900435-0",
              "target": null
            },
            {
              "id": "Win.Malware.Qshell-9875653-0",
              "display_name": "Win.Malware.Qshell-9875653-0",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1189",
              "name": "Drive-by Compromise",
              "display_name": "T1189 - Drive-by Compromise"
            },
            {
              "id": "T1203",
              "name": "Exploitation for Client Execution",
              "display_name": "T1203 - Exploitation for Client Execution"
            },
            {
              "id": "T1485",
              "name": "Data Destruction",
              "display_name": "T1485 - Data Destruction"
            },
            {
              "id": "T1564",
              "name": "Hide Artifacts",
              "display_name": "T1564 - Hide Artifacts"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1047",
              "name": "Windows Management Instrumentation",
              "display_name": "T1047 - Windows Management Instrumentation"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1089",
              "name": "Disabling Security Tools",
              "display_name": "T1089 - Disabling Security Tools"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1023",
              "name": "Shortcut Modification",
              "display_name": "T1023 - Shortcut Modification"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1428",
              "name": "Exploit Enterprise Resources",
              "display_name": "T1428 - Exploit Enterprise Resources"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1133",
              "name": "External Remote Services",
              "display_name": "T1133 - External Remote Services"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "678f0dbdbc59dd2ea5656dcf",
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 7589,
            "FileHash-SHA1": 3982,
            "FileHash-SHA256": 8280,
            "URL": 442,
            "domain": 2416,
            "hostname": 2155,
            "email": 37,
            "CVE": 4,
            "SSLCertFingerprint": 6
          },
          "indicator_count": 24911,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 47,
          "modified_text": "2 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69e1cc6fd3c4022e08db781d",
          "name": "order  clone by aclause21 Public",
          "description": "",
          "modified": "2026-04-17T06:51:33.372000",
          "created": "2026-04-17T06:00:15.760000",
          "tags": [
            "access ta0001",
            "defense evasion",
            "access ta0006",
            "command",
            "control ta0011",
            "impact ta0040",
            "catalog tree",
            "ob0005 defense",
            "evasion ob0006",
            "impact ob0008",
            "hashes cape",
            "sandbox",
            "docguard",
            "yomi hunter",
            "zenbox",
            "ip traffic",
            "pattern domains",
            "memory pattern",
            "urls https",
            "adversaries",
            "mitre att",
            "t1189 found",
            "clickable urls",
            "pdf execution",
            "t1036",
            "creates",
            "hide artifacts",
            "exploitation",
            "e1564 hidden",
            "files",
            "discovery e1082",
            "e1203 data",
            "vhash",
            "ssdeep",
            "file type",
            "pdf document",
            "magic pdf",
            "trid adobe",
            "format",
            "file size",
            "united",
            "as32934",
            "passive dns",
            "unknown",
            "scan endpoints",
            "all scoreblue",
            "ipv4",
            "pulse pulses",
            "urls",
            "status",
            "search",
            "showing",
            "server error",
            "certificate",
            "creation date",
            "high assurance",
            "server ca",
            "date",
            "body",
            "win32",
            "ransom",
            "entries",
            "icmp traffic",
            "packing t1045",
            "t1045",
            "pdb path",
            "pe resource",
            "show",
            "malware",
            "copy",
            "push",
            "write",
            "aaaa",
            "nxdomain",
            "united kingdom",
            "thailand",
            "vietnam",
            "as45430",
            "honduras",
            "indonesia",
            "mexico",
            "slovakia",
            "dynamicloader",
            "yara rule",
            "high",
            "ekyxe",
            "xe e",
            "eofae",
            "ee edcje4j",
            "tofsee",
            "windows",
            "medium",
            "stream",
            "grum",
            "as15169 google",
            "pulses",
            "record value",
            "error",
            "cname",
            "name servers",
            "ireland",
            "next",
            "federation asn",
            "as49505",
            "labs pulses",
            "trojan",
            "trojandropper",
            "related pulses",
            "file samples",
            "files matching",
            "date hash",
            "copyright",
            "all search",
            "reverse dns",
            "location united",
            "emails info",
            "expiration date",
            "as51167 contabo",
            "germany unknown",
            "a nxdomain",
            "as40021 contabo",
            "encrypt",
            "url http",
            "http",
            "ip address",
            "related nids",
            "files location",
            "ddos",
            "activity",
            "checkin",
            "win64",
            "mirai",
            "hosting",
            "files ip",
            "address",
            "czechia unknown",
            "as174 cogent",
            "asnone germany",
            "as15598",
            "as16625 akamai",
            "asnone united",
            "as20940",
            "as35994 akamai",
            "as12337 noris",
            "pulse submit",
            "url analysis",
            "backdoor",
            "gmt cache",
            "sameorigin",
            "443 ma2592000",
            "suspicious",
            "virtool",
            "emails",
            "domain name",
            "code",
            "brazil",
            "poland",
            "domain",
            "msie",
            "windows nt",
            "tcp syn",
            "resolverror",
            "exploit",
            "externalport",
            "internalport",
            "http headers",
            "home network",
            "demonbot",
            "andariel",
            "yara detections",
            "malware traffic",
            "nids",
            "dns query",
            "google safe",
            "browsing",
            "whois",
            "virustotal",
            "mtb apr",
            "asnone related",
            "open",
            "hash avast",
            "avg clamav",
            "msdefender apr",
            "as8075",
            "content type",
            "access",
            "cp bus",
            "cur cono",
            "fin ivdo",
            "onl our",
            "phy samo",
            "overview ip",
            "flag united",
            "hostname",
            "files domain",
            "as8068",
            "trojan features",
            "rsa tls",
            "issuing ca",
            "mirai variant",
            "useragent",
            "inbound",
            "realtek sdk",
            "miniigd upnp",
            "soap command",
            "activity mirai",
            "helloworld",
            "users",
            "alerts",
            "anomalous file",
            "recycle bin",
            "filehash",
            "av detections",
            "memcommit",
            "read c",
            "memreserve",
            "for privacy",
            "china unknown",
            "ag alberto",
            "pedraz",
            "holidaycheck ag",
            "project pi",
            "immobilien ag",
            "puma se",
            "kurt walther",
            "ag ingo",
            "kraupa",
            "timo salzsieder",
            "record type",
            "ttl value",
            "msms57295540",
            "subdomains",
            "ireland unknown",
            "analyzer paste",
            "iocs",
            "samples",
            "regsetvalueexa",
            "default",
            "regdword",
            "module load",
            "t1129",
            "http request",
            "process32nextw",
            "regbinary",
            "oxypumper",
            "tools",
            "dock",
            "april",
            "persistence",
            "execution",
            "download",
            "as62597 nsone",
            "echo request",
            "sweep",
            "payload hello",
            "world",
            "total",
            "please",
            "xport",
            "main",
            "look",
            "install",
            "servers",
            "found",
            "cnapple public",
            "accept",
            "chrome",
            "moved",
            "ssl certificate",
            "write c",
            "installcore",
            "june",
            "delphi",
            "as47846",
            "cookie",
            "as32787 akamai",
            "as714 apple",
            "m1",
            "onelouder",
            "brian sabey",
            "denver colorado",
            "fakedout threat",
            "gmt content",
            "x cache",
            "div div",
            "as8972 host",
            "france unknown",
            "registrar",
            "otx scoreblue",
            "address domain",
            "as24940 hetzner",
            "as44273 host",
            "asn as15598",
            "trojanspy",
            "mail spammer",
            "germany mail",
            "spammer",
            "hichina",
            "data redacted",
            "a domains",
            "wow64",
            "slcc2",
            "media center",
            "port",
            "powershell",
            "urls http",
            "tptjsw",
            "virus",
            "ids detections",
            "germany",
            "as8560",
            "austria",
            "as1921",
            "as14061",
            "whitelisted",
            "as16276",
            "script urls",
            "as16552 tiggee",
            "as9009 m247",
            "meta",
            "as29789",
            "detected m1",
            "mtb aug",
            "server",
            "as397241",
            "cryp",
            "hostmaster",
            "networks",
            "as19024",
            "gmt setcookie",
            "delete",
            "russia as49505",
            "sinkhole cookie",
            "value snkz",
            "pe32",
            "possible",
            "susp",
            "lnmp",
            "lnmp a",
            "licess",
            "shell",
            "as63949 linode",
            "as133618",
            "as21342",
            "cve201717215",
            "huawei remote",
            "huawei hg532",
            "malware worm",
            "gafgyt",
            "exploit none",
            "binbusybox",
            "delete c",
            "odigicert inc",
            "stwashington",
            "lredmond",
            "rsa ca",
            "cape",
            "nondns",
            "denver",
            "redacted for",
            "method status",
            "url hostname",
            "ip country",
            "type get",
            "date tue",
            "gmt contenttype",
            "connection",
            "cachecontrol",
            "expires thu",
            "gmt vary",
            "poland unknown",
            "title",
            "script domains",
            "updated date",
            "serce internetu",
            "cnc beacon",
            "javascript",
            "wsasend",
            "post",
            "delete shadows",
            "all quiet",
            "t1047",
            "instrumentation",
            "rpcs",
            "ms windows",
            "asnone dns",
            "http host",
            "ip check",
            "sha256",
            "bits",
            "adware malware",
            "etpro malware",
            "bios",
            "guard",
            "tulach",
            "spectrum",
            "cyber folks",
            "tsara brashears",
            ".pl",
            "contacted",
            "kryptikxp",
            "apple",
            "ios",
            "android",
            "sabey",
            "charter communications",
            "denvecolorado",
            "quantum fiber",
            "air force",
            "swipper",
            "masquerade",
            "hitmen",
            "mitm",
            "whitesky",
            "cyber warfare",
            "porn",
            "pornhub.software"
          ],
          "references": [
            "DISTINCTIO8.pdf",
            "FileHash - SHA256 001f0ebe975b5f5a7e5272f53455635cc938a5a0129417f7e79c39df6cf65657 | Yara Detections: stack_string",
            "IDS Detections: Win32/Tofsee.AX google.com connectivity check Non-DNS or Non-Compliant DNS traffic on DNS port Opcode 8 through 15 set",
            "Tofsee: 'google.com' |  https://www.gov50.icu |",
            "ET TROJAN Win32/DarkWatchman Checkin Activity (POST) ( This is true. They sit around watching, following...)",
            "Alerts: procmem_yara injection_inter_process creates_largekey network_bind persistence_autorun antivm_generic_disk",
            "Alerts: persistence_autorun_tasks spawns_dev_util cape_detected_threat injection_process_hollowing",
            "hubt.pornhub.com | www.pornhub.com | pornative.com",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian ||  pin.it || https://pin.it/",
            "www.sweetheartvideo.com || https://www.sweetheartvideo.com/tsara-brashears/",
            "Unix.Trojan.Mirai-6981169-0: FileHash - SHA256  fe00b364b6b8342e3ce0dd146902ac3330ab976e87aca6be666efde39ea485da",
            "IDS Detections: WGET Command Specifying Output in HTTP Headers",
            "IDS Detections: D-Link Devices Home Network Administration Protocol Command Execution",
            "Yara Detections: is__elf ,  DemonBot",
            "Alerts: dead_host network_icmp tcp_syn_scan nolookup_communication writes_to_stdout",
            "FileHash - SHA256  f32f6b229913d68daad937cc72a57aa45291a9d623109ed48938815aa7b6005c",
            "IDS Detections: Andariel Backdoor Activity (Checkin)",
            "Alerts: dead_host nids_malware_alert network_icmp nolookup_communication",
            "DDoS:Linux/Gafgyt : FileHash - SHA256  358c2bd5b9e925dc23894dec18ce486c03d743cde766ce298ac1e2f00d86f0b2",
            "IDS Detection: Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound",
            "IDS Detection: Mirai Variant User-Agent (Inbound) WebShell Generic - wget http - POST",
            "IDS Detection: Observed Suspicious UA (Hello-World) Suspicious Activity potential UPnProxy",
            "http://vortex-nlb-http2-fed-us-taut-purple.nr-data.net/",
            "https://tulach.cc/ || tulach.cc || www-temp.metrobyt-mobile.com",
            "apple-reactivate.com | appleweb-aem.apple.com | apple.com | revoked-aprtr1-tr1g1.apple.com | network-framework.apple.com",
            "autodiscover.webcompanion.com || avc-gft-dashboard.apple.com || cac1-wwfde-wave.apple.com || demo27.apple.com",
            "* https://github.com/MSUDenverSystemsEngineering/Salt-Instructional-18/tree/master/AppDeployToolkit",
            "https://tulach.cc/ | tulach.cc |",
            "http://hallrender.com/attorney/brian-sabey | www-temp.metrobyt-mobile.com",
            "google.pl | aplikacja.ceidg.gov.pl | imaginecup.pl | microsoft.pl",
            "18teen.net | teensnow.com | grannies-porn.net | pornmd.com",
            "www.pornhubselect.com | pornhub.software"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Chile",
            "Morocco",
            "Taiwan",
            "Guatemala",
            "United Kingdom of Great Britain and Northern Ireland",
            "Ireland",
            "Kenya",
            "Peru",
            "Singapore",
            "Mexico",
            "Brazil",
            "Slovakia",
            "Spain",
            "Australia",
            "Belgium",
            "Germany",
            "Hungary",
            "Netherlands",
            "Russian Federation",
            "Japan",
            "Poland"
          ],
          "malware_families": [
            {
              "id": "Ransom",
              "display_name": "Ransom",
              "target": null
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "TEL:CreateScheduledTask",
              "display_name": "TEL:CreateScheduledTask",
              "target": null
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Unix.Trojan.Mirai-6981169-0",
              "display_name": "Unix.Trojan.Mirai-6981169-0",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Tofsee",
              "display_name": "Backdoor:Win32/Tofsee",
              "target": "/malware/Backdoor:Win32/Tofsee"
            },
            {
              "id": "Ransom:Win32/Haperlock",
              "display_name": "Ransom:Win32/Haperlock",
              "target": "/malware/Ransom:Win32/Haperlock"
            },
            {
              "id": "Trojan:Win32/Neurevt",
              "display_name": "Trojan:Win32/Neurevt",
              "target": "/malware/Trojan:Win32/Neurevt"
            },
            {
              "id": "DDoS:Linux/Gafgyt.YA!MTB",
              "display_name": "DDoS:Linux/Gafgyt.YA!MTB",
              "target": "/malware/DDoS:Linux/Gafgyt.YA!MTB"
            },
            {
              "id": "CVE-2017-17215",
              "display_name": "CVE-2017-17215",
              "target": null
            },
            {
              "id": "CVE-2023-27350",
              "display_name": "CVE-2023-27350",
              "target": null
            },
            {
              "id": "CVE-2014-8361",
              "display_name": "CVE-2014-8361",
              "target": null
            },
            {
              "id": "Trojan:Win32/Zombie.A",
              "display_name": "Trojan:Win32/Zombie.A",
              "target": "/malware/Trojan:Win32/Zombie.A"
            },
            {
              "id": "NIDS",
              "display_name": "NIDS",
              "target": null
            },
            {
              "id": "M1",
              "display_name": "M1",
              "target": null
            },
            {
              "id": "OneLouder",
              "display_name": "OneLouder",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Win.Trojan.Sarwent-10012602-0",
              "display_name": "Win.Trojan.Sarwent-10012602-0",
              "target": null
            },
            {
              "id": "Virus:Win32/Sivis.A",
              "display_name": "Virus:Win32/Sivis.A",
              "target": "/malware/Virus:Win32/Sivis.A"
            },
            {
              "id": "Win.Trojan.Installcore-1177",
              "display_name": "Win.Trojan.Installcore-1177",
              "target": null
            },
            {
              "id": "Win.Malware.Oxypumper-6900435-0",
              "display_name": "Win.Malware.Oxypumper-6900435-0",
              "target": null
            },
            {
              "id": "Win.Malware.Qshell-9875653-0",
              "display_name": "Win.Malware.Qshell-9875653-0",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1189",
              "name": "Drive-by Compromise",
              "display_name": "T1189 - Drive-by Compromise"
            },
            {
              "id": "T1203",
              "name": "Exploitation for Client Execution",
              "display_name": "T1203 - Exploitation for Client Execution"
            },
            {
              "id": "T1485",
              "name": "Data Destruction",
              "display_name": "T1485 - Data Destruction"
            },
            {
              "id": "T1564",
              "name": "Hide Artifacts",
              "display_name": "T1564 - Hide Artifacts"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1047",
              "name": "Windows Management Instrumentation",
              "display_name": "T1047 - Windows Management Instrumentation"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1089",
              "name": "Disabling Security Tools",
              "display_name": "T1089 - Disabling Security Tools"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1023",
              "name": "Shortcut Modification",
              "display_name": "T1023 - Shortcut Modification"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1428",
              "name": "Exploit Enterprise Resources",
              "display_name": "T1428 - Exploit Enterprise Resources"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1133",
              "name": "External Remote Services",
              "display_name": "T1133 - External Remote Services"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "678f0dbdbc59dd2ea5656dcf",
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 7589,
            "FileHash-SHA1": 3982,
            "FileHash-SHA256": 8280,
            "URL": 441,
            "domain": 2416,
            "hostname": 2155,
            "email": 37,
            "CVE": 4,
            "SSLCertFingerprint": 6
          },
          "indicator_count": 24910,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 47,
          "modified_text": "2 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "628dff37032808c7c9e014dc",
          "name": "Sauron - Malware Domain Feed V2",
          "description": "Command and Control domains for Sauron. These domains are extracted from a number of sources, and are suspicious.",
          "modified": "2026-04-17T06:25:54.995000",
          "created": "2022-05-25T10:04:39.623000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 156400,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "otxrobottwo",
            "id": "78495",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_78495/resized/80/avatar_ba5a8acdbd.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 48998,
            "domain": 83143
          },
          "indicator_count": 132141,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 1550,
          "modified_text": "2 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "5fa1852d337eca8e99c2ec32",
          "name": "Malware - Malware Domain Feed V2 - November 03 2020",
          "description": "Command and Control domains for Malware. These domains are extracted from a number of sources, and are suspicious.",
          "modified": "2026-04-17T03:00:09.717000",
          "created": "2020-11-03T16:28:29.011000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 508351,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 3,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "otxrobottwo",
            "id": "78495",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_78495/resized/80/avatar_ba5a8acdbd.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 48210,
            "domain": 72684
          },
          "indicator_count": 120894,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 1699,
          "modified_text": "2 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69b9e8cd17878754f0417e3e",
          "name": "DOMAIN 0x21.in (dist mapping related abuse by users)",
          "description": "DOMAIN\n0x21.in\nAdd to Pulse\nPulses\n50\nPassive DNS\n46\nURLs\n1K\nFiles\n19K\nAnalysis Overview\nIP Address\n3.229.117.57\nLocation\n\nUnited States\nASN\nAS14618 amazon.com inc.\nNameservers\nns1.csof.net.\n, \nns3.csof.net.\nMore\nWHOIS\nRegistrar:\nEndurance Domains Technology LLP,  \nCreation Date:\nJul 26, 2018\nRelated Pulses\nOTX User-Created Pulses (50)\nRelated Tags\n114 Related Tags\nosint-volley\n, \nthreatfox\n, \nautomated\n, \nphorpiex\n, \nunknown-malware\nMore\nIndicator Facts\n1000 malicious files communicating\nHistorical OTX telemetry\nRunning webserver\n4 subdomains\nSPF record\nAntivirus Detections\nVirTool:Win32/AutInject\n, \nVirTool:Win32/AutInject.CX!bit\nAV Detection Ratio\n1000\n / 1000",
          "modified": "2026-04-17T00:14:03.790000",
          "created": "2026-03-17T23:50:37.641000",
          "tags": [
            "present nov",
            "unknown",
            "united",
            "virtool",
            "present feb",
            "present jan",
            "as396982",
            "as13335",
            "passive dns",
            "ip address",
            "date"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 20,
            "FileHash-MD5": 541,
            "FileHash-SHA1": 573,
            "FileHash-SHA256": 759,
            "hostname": 118,
            "URL": 34,
            "email": 5
          },
          "indicator_count": 2050,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "2 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69b960c645ec203d112bc9a0",
          "name": "US based.",
          "description": "",
          "modified": "2026-04-16T14:03:51.443000",
          "created": "2026-03-17T14:10:14.506000",
          "tags": [
            "united",
            "unknown",
            "as13335",
            "as55293 a2",
            "aaaa",
            "status",
            "passive dns",
            "ip address",
            "creation date",
            "pulses",
            "date",
            "title"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1,
            "FileHash-SHA1": 59,
            "URL": 220,
            "domain": 409,
            "hostname": 77,
            "email": 1
          },
          "indicator_count": 767,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "2 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69b960c8dc1b20c8f6ae0625",
          "name": "US based.",
          "description": "",
          "modified": "2026-04-16T14:03:51.443000",
          "created": "2026-03-17T14:10:16.743000",
          "tags": [
            "united",
            "unknown",
            "as13335",
            "as55293 a2",
            "aaaa",
            "status",
            "passive dns",
            "ip address",
            "creation date",
            "pulses",
            "date",
            "title"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1,
            "FileHash-SHA1": 2,
            "URL": 20,
            "domain": 103,
            "hostname": 24,
            "email": 1
          },
          "indicator_count": 151,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "2 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69b9380613f88eec31f8a2e6",
          "name": "What an odd registrant name. Who teaches here.. hmm",
          "description": ": Cambridge\nAdministrative country: United States\nAdministrative email: 775cc83f56a3b4e7s@mit.edu\nAdministrative state: MA\nBilling city: Cambridge\nBilling country: United States\nBilling email: 3c3d334158ebfea1s@mit.edu\nBilling state: MA\nCreate date: 1985-05-23 00:00:00\nDomain name: mit.edu\nDomain registrar id: 0.0\nDomain registrar url: whois.educause.edu\nExpiry date: 2026-07-31 00:00:00\nQuery time: 2026-01-15 06:12:15\nRegistrant address: 30df1aef753261ef\nRegistrant city: 85ce83927452d906\nRegistrant country: United States\nRegistrant name: c0a6a961a5aefb99\nRegistrant state: 36e414cc8874c746\nRegistrant zip: 077f5ed532d03f34\nTechnical city: Cambridge\nTechnical country: United States\nTechnical email: 3c3d334158ebfea1s@mit.edu\nTechnical state: MA\nUpdate date: 2026-01-15 00:00:00",
          "modified": "2026-04-16T12:28:09.524000",
          "created": "2026-03-17T11:16:22.723000",
          "tags": [
            "united",
            "ma billing",
            "billing email",
            "billing state",
            "ma create",
            "domain",
            "expiry date",
            "registrant name",
            "technical email",
            "technical state"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 856,
            "email": 38,
            "hostname": 895,
            "FileHash-SHA1": 156,
            "FileHash-MD5": 157,
            "FileHash-SHA256": 1788,
            "URL": 489,
            "SSLCertFingerprint": 4
          },
          "indicator_count": 4383,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 49,
          "modified_text": "2 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69b908eb4a06b82d61c7c47d",
          "name": "Civil Rights. Wow.",
          "description": "Pulses: A full list of keywords, phrases, and statistics (1.1-2.4 million characters) - the full set of words, which can be accessed with a mouse.<--- pretext my own experimet : 50756c7365733a20412066756c6c206c697374206f66206b6579776f7264732c20706872617365732c20616e6420737461746973746963732028312e312d322e34206d696c6c696f6e206368617261637465727329202d207468652066756c6c20736574206f6620776f7264732c2077686963682063616e20626520616363657373656420776974682061206d6f7573652e\nHashes\nMD5: 887fda95f95104ed9bf8c4e8614e0b7a\nSHA-1: 307f07dc6036d04ef5e0da8a6f9eaefd5282c2c7\nSHA-2 (SHA-256): 22be0871410e9f0057cc2f754796c360cf3b9cd39f682ff733441ace4c726795",
          "modified": "2026-04-16T08:05:04.592000",
          "created": "2026-03-17T07:55:23.062000",
          "tags": [
            "ids detections",
            "pulse pulses",
            "av detections",
            "yara detections",
            "alerts",
            "analysis date",
            "file score",
            "medium risk",
            "tls handshake",
            "failure yara"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 44,
            "FileHash-SHA1": 22,
            "FileHash-SHA256": 147,
            "hostname": 77,
            "domain": 143,
            "URL": 75,
            "email": 2,
            "JA3": 2,
            "CVE": 1
          },
          "indicator_count": 513,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 49,
          "modified_text": "3 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69db609269c77812f937026e",
          "name": "CAPE Sandbox ----- emulex fc 2.72.011.002-3",
          "description": "emulex fc 2.72.011.002-3, Malware Behavior Catalog Tree\nAnti-Behavioral Analysis\nOB0001\nVirtual Machine Detection\nB0009\nSoftware Packing\nF0001\nAnti-Static Analysis\nOB0002\nSoftware Packing\nF0001\nDefense Evasion\nOB0006\nSoftware Packing\nF0001\nDiscovery\nOB0007\nFile and Directory Discovery\nE1083\nExecution\nOB0009\nCommand and Scripting Interpreter\nE1059\nFile System\nOC0001\nDelete File\nC0047\nGet File Attributes\nC0049\nSet File Attributes\nC0050\nRead File\nC0051\nWrites File\nC0052\nProcess\nOC0003\nTerminate Process\nC0018\nCommunication\nOC0006\nHTTP Communication\nC0002\n\nWho are you protecting? Look at your root certificate map to 2018-19. Im not mad, I am just disappointed in the lack of cyber security awareness and cryptographic failures. If I see one more unsigned DNSSEC. Edge node completely exposed. Maybe let CISA and the NSA handle things since they are competent. unknown agency- #burnedyourowncountry.\nPalo Alto, level blue, falcon sandbox, cape, yomi, sec, arc- you are heroes for picking up malware that evades everything.",
          "modified": "2026-04-15T19:46:25.951000",
          "created": "2026-04-12T09:06:26.754000",
          "tags": [
            "hbanyware",
            "hbas",
            "true",
            "reportlocation",
            "programfiles",
            "command line",
            "enable silent",
            "mode",
            "full",
            "local only",
            "false",
            "path",
            "example",
            "windows sandbox",
            "clear filters",
            "show",
            "fibre channel",
            "emulex fibre",
            "emulex network",
            "fibre chann",
            "host b",
            "network",
            "emulex",
            "network cards",
            "find",
            "UNITED STATES SENT.",
            "Still love USA.",
            "bankers doc",
            "ESign Violation",
            "cyber warfare",
            "Fraud",
            "pdfkit.net",
            "CIVIL rights violation",
            "geofence",
            "whistleblower",
            "adobe exploited from unsafe practices",
            "certificate abuse",
            "wiper",
            "Docusign exploited from unsafe practices",
            "abuse",
            "modification of the record",
            "date changes",
            "deleting evidence",
            "wateringholeleftwideopen#RiskManagementKnowledgeDeficient",
            "firmware neutral",
            "fraud",
            "espionage",
            "Iloveyou.txt",
            "APTnull.",
            "PlutoniumoftheInternet",
            "apiabuse",
            "Put Zen at risk",
            "Microsoft exploited from misuse of power and secure protocols",
            "Spyonyourinternalframework.",
            "fsquirt.[exe]",
            "bluetooth tampering",
            "wormhole",
            "backdoor",
            "GITlikeMITbutSouth",
            "pool",
            "CloseDoorsProper",
            "spellbound.[exe]",
            "Wizard",
            "GUI of Bluetooth File Transfer Wizard",
            "<fsquirt",
            "Silkwood",
            "RF's, EMF's, EF's - beyond reasonable measure",
            "lateral moving world wide higher ed warrants further research, G",
            "emulex fc 2.72.011.002-3"
          ],
          "references": [
            "https://vtbehaviour.commondatastorage.googleapis.com/d6a033eb92cc58314c55460d4b1b32befca63cd522f89bc3a09c7cf6477e67a9_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775984872&Signature=X7ut04viSpboUfiHbVbGH602vbGaavKO28%2FuQZ9YCLjbW%2Bl9JHGrffH4HHtGQ39GPFGg3uUwyMpuOewArLSuI0W%2F0SjlRr%2B3ob5iUQ8eckXWI47mIElQtuCwRStAGCclC8lI%2BsnrEI7u%2FvPhk16ucrMhQtHiSehYuWwNi1lQkbG3Y5ZoDqClBlw1uSMm1jm1Gpu1EBVSIeAqmbV33HSK%2FDTrwzhuwObiyOu4RKE9E7MOmj%2",
            "https://vtbehaviour.commondatastorage.googleapis.com/d6a033eb92cc58314c55460d4b1b32befca63cd522f89bc3a09c7cf6477e67a9_VirusTotal%20Jujubox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775984910&Signature=hjdKVB1Hclv%2FNw7qh%2FV50rCooI70BC8NJcq77KWRUu6VAlxs8vV%2FWfNLh9VzjKS2pBgR7wAaaDp6GwPof61nS4TwykWgUO%2FavR45JKGxhUsjhYKLE5VQoAZkh13wvx1nTVwH%2FP6fx71mJlF71bDqJe7pjpKdd3jyGRDGC6ksN3fMJ%2FRVnusGPDwzZXpy9F6CUYZ1tT9xuK7k3zz9xdIV5e0noQ9s7P343Ca7ROLOUhs9"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1539",
              "name": "Steal Web Session Cookie",
              "display_name": "T1539 - Steal Web Session Cookie"
            },
            {
              "id": "T1548",
              "name": "Abuse Elevation Control Mechanism",
              "display_name": "T1548 - Abuse Elevation Control Mechanism"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "IPv4": 182,
            "FileHash-MD5": 771,
            "FileHash-SHA1": 836,
            "FileHash-SHA256": 2524,
            "URL": 810,
            "domain": 764,
            "email": 112,
            "hostname": 2635,
            "URI": 3,
            "CVE": 7,
            "CIDR": 12,
            "JA3": 1
          },
          "indicator_count": 8657,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "3 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69b786ef253f307468ab0d63",
          "name": "Project",
          "description": "Pulses, also known as Pulse.org, are being used to track users' activity on the internet and send emails to a website owned by GoDaddy.com, the company that owns the domain. <-- pretext not my thoughts but interesting and not my take though infra I suspect is targeted for geofencing and other abuse. researchers remain vigilint on infra",
          "modified": "2026-04-15T04:08:56.830000",
          "created": "2026-03-16T04:28:31.032000",
          "tags": [
            "united",
            "unknown",
            "as54113",
            "date",
            "aaaa",
            "status",
            "cname",
            "as44273 host",
            "moved",
            "passive dns",
            "title",
            "body",
            "encrypt"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 350,
            "FileHash-SHA1": 5,
            "domain": 501,
            "hostname": 1851,
            "email": 7,
            "CIDR": 6,
            "FileHash-SHA256": 8,
            "CVE": 1,
            "FileHash-MD5": 2
          },
          "indicator_count": 2731,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "4 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69b76181dc4fdaf185bfec2e",
          "name": "mustache.com",
          "description": "i mustache you a Question. why do you have so many win EXE?",
          "modified": "2026-04-15T02:24:17.244000",
          "created": "2026-03-16T01:48:49.393000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 5,
            "FileHash-SHA1": 5,
            "FileHash-SHA256": 34,
            "domain": 329,
            "hostname": 254,
            "URL": 276,
            "email": 7
          },
          "indicator_count": 910,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "4 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69b75475235f55af134a852e",
          "name": "motherless.com",
          "description": "sicko.",
          "modified": "2026-04-15T01:19:40.005000",
          "created": "2026-03-16T00:53:09.636000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 130,
            "hostname": 385,
            "URL": 893,
            "FileHash-MD5": 855,
            "FileHash-SHA1": 320,
            "FileHash-SHA256": 320,
            "SSLCertFingerprint": 129
          },
          "indicator_count": 3032,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 49,
          "modified_text": "4 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69b75b324b51985e569a70ac",
          "name": "Nothing but love PA.",
          "description": "A look at some of the key events in the history of GlobalProtect, the company set up to protect the internet from third-party providers such as Google, Facebook, Twitter and YouTube..",
          "modified": "2026-04-15T01:19:40.005000",
          "created": "2026-03-16T01:21:54.729000",
          "tags": [
            "a domains",
            "protect",
            "your ip",
            "content type",
            "gmt server",
            "gmt etag",
            "accept encoding",
            "certificate",
            "present oct",
            "entries http",
            "body",
            "date",
            "accept",
            "apache",
            "encrypt"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 38,
            "FileHash-SHA1": 42,
            "domain": 224,
            "hostname": 469,
            "FileHash-MD5": 18,
            "FileHash-SHA256": 484,
            "email": 6
          },
          "indicator_count": 1281,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "4 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69ded8198b25581a09b90824",
          "name": "BearShare \u2022 Solarwinds? \u2022 SearchSuite \u2022 Healthcare Administration",
          "description": "",
          "modified": "2026-04-15T00:13:13.981000",
          "created": "2026-04-15T00:13:13.981000",
          "tags": [
            "Win32/SearchSuite",
            "pe32",
            "intel",
            "ms windows",
            "ms visual",
            "win32 dynamic",
            "link library",
            "win16 ne",
            "pe32 installer",
            "install system",
            "compiler",
            "NSIS",
            "code signing",
            "serial number",
            "db d2",
            "de d3",
            "f3 e1",
            "issuer thawte",
            "primary root",
            "ca valid",
            "valid",
            "valid usage",
            "client auth",
            "algorithm",
            "rticon english",
            "type type",
            "chi2",
            "ico rtgroupicon",
            "english us",
            "capa",
            "c2 antianalysis",
            "executable",
            "sample appears",
            "installer",
            "installers well",
            "results may",
            "be misleading",
            "or incomplete",
            "analyze created",
            "techniques",
            "info modify",
            "files",
            "modify registry",
            "directory permi",
            "techniques none",
            "info",
            "scripting inte",
            "shared modules",
            "Bear Share",
            "urls",
            "ip address",
            "asn as8075",
            "united",
            "flag united",
            "name servers",
            "name domain",
            "org apple",
            "infinite loop",
            "city cupertino",
            "country us",
            "dnssec",
            "urlmailto",
            "urlhttps",
            "search",
            "urlhttp",
            "moved",
            "title",
            "encrypt",
            "certificate",
            "segoe ui",
            "otx logo",
            "url analysis",
            "tokyo",
            "msie",
            "chrome",
            "gmt content",
            "all ipv4",
            "zeppelin",
            "trojandropper",
            "cookie",
            "backdoor",
            "hash avast",
            "avg clamav",
            "msdefender feb",
            "k oct",
            "k may",
            "mtb feb",
            "mtb jan",
            "k aug",
            "windows nt",
            "dynamicloader",
            "unknown",
            "medium",
            "default",
            "as16509",
            "show",
            "powershell",
            "write",
            "xserver",
            "bearshar data",
            "passive dns",
            "pulse submit",
            "port",
            "destination",
            "high",
            "displayname",
            "windows",
            "win64",
            "tofsee",
            "stream",
            "malware",
            "push",
            "next",
            "asnone",
            "germany as8560",
            "russia as198610",
            "strings",
            "is__elf",
            "systembc_linux_variant",
            "khtml",
            "gecko",
            "acceptencoding",
            "get na",
            "macintosh",
            "intel mac",
            "accept",
            "france as16276",
            "yara detections",
            "contacted",
            "all filehash",
            "sha256",
            "pulse pulses",
            "av detections",
            "ids detections",
            "alerts",
            "analysis date",
            "tls sni",
            "less see",
            "all ip",
            "Apple",
            "xordata",
            "United States"
          ],
          "references": [
            "b9e4e47c3f96846c30581c08acf5bc56.virus",
            "BearShare Install File Version 12.0.0.135802",
            "Musiclab, LLC",
            "msoid.applemanic.com \u2022 msoid.giftcardapple.shop \u2022 msoid.appleportconsulting.com",
            "gateway.fe.apple-dns.net \u2022 apple-dns.net",
            "africa.konnect.com",
            "http://scratch-mit-edu.027.cloudns.asia/users/alessandrito123",
            "euw-serp-dev-testing19.duck.ai",
            "account-apple.com",
            "Win.Trojan.Tofsee-7102058-0 ,  Backdoor:Win32/Tofsee.T",
            "IDS Detections Win32/Tofsee.AX google.com connectivity check Observed Telegram Domain (t .me in TLS SNI)",
            "Yara Detections: Tofsee",
            "Alerts: behavior_tofsee creates_largekey injection_write_exe_process network_bind",
            "Alerts: persistence_autorun persistence_autorun_tasks procmem_yara static_pe_anomaly",
            "Alerts: suricata_alert antivm_generic_services physical_drive_access deletes_executed_files",
            "Alerts: deletes_self injection_runpe persistence_ads suspicious_command_tools",
            "Alerts: anomalous_deletefile antisandbox_sleep dead_connect dynamic_function_loading",
            "IP\u2019s Contacted: 47.43.26.4  195.35.13.119  149.154.167.99  185.138.56.214  142.250.147.26  81.88.48.101",
            "IP\u2019s Contacted: 104.21.72.117  172.66.156.195  157.240.200.174  141.193.213.20",
            "Domains Contacted: microsoft.com microsoft-com.mail.protection.outlook.com vanaheim.cn yahoo.com mta6.am0.yahoodns.net 13.205.167.198.dnsbl.sorbs.net 13.205.167.198.bl.spamcop.net 13.205.167.198.zen.spamhaus.org 13.205.167.198.sbl-xbl.spamhaus.org 13.205.167.198.cbl.abuseat.org",
            "https://perigon-one.au.itglue.com/password_shared_links/52f082d3-d889-4db5-ae03-c7bfcbe5aa21",
            "https://identity.prd-cdc.jemena.com.au/pages/jemena-reset-password",
            "https://in2it.itglue.com/password_shared_links/9b0e2a1d-b554-4f0c-a333-390e41defe8e",
            "https://oauth2.admin.p4d-1.p4d.aks.lightops.cloud.slb-ds.com/lightops-auth/callback&response_type=code&scope=openid+email+profile&state=uJZE80MW6TdJQjbI0RWXhnF3SpYZXckLkfafnEHgr_I:",
            "https://oauth2.admin.p4d-1.p4d.aks.lightops.cloud.slb-ds.com/lightops-auth/callback",
            "ids-apple.com \u2022 itunes.org",
            "xn--cloud-4sa.com",
            "http://cab.applemarketingtools.com",
            "http://console.applemarketingtools.com/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Spain",
            "France",
            "United Kingdom of Great Britain and Northern Ireland",
            "Netherlands",
            "Japan",
            "Switzerland",
            "Madagascar",
            "Finland",
            "Germany",
            "Russian Federation"
          ],
          "malware_families": [
            {
              "id": "Win32/SearchSuite",
              "display_name": "Win32/SearchSuite",
              "target": null
            },
            {
              "id": "Win32.Application.BearShare.A",
              "display_name": "Win32.Application.BearShare.A",
              "target": null
            },
            {
              "id": "Exploit:Win32/CVE-2017-0147",
              "display_name": "Exploit:Win32/CVE-2017-0147",
              "target": "/malware/Exploit:Win32/CVE-2017-0147"
            },
            {
              "id": "CVE-2023-22518",
              "display_name": "CVE-2023-22518",
              "target": null
            },
            {
              "id": "Win.Packed.Bandook-9882274-1",
              "display_name": "Win.Packed.Bandook-9882274-1",
              "target": null
            },
            {
              "id": "Win.Trojan.Tofsee-7102058-0",
              "display_name": "Win.Trojan.Tofsee-7102058-0",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Tofsee.T",
              "display_name": "Backdoor:Win32/Tofsee.T",
              "target": "/malware/Backdoor:Win32/Tofsee.T"
            },
            {
              "id": "TrojanDownloader:Win32/Cutwail",
              "display_name": "TrojanDownloader:Win32/Cutwail",
              "target": "/malware/TrojanDownloader:Win32/Cutwail"
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1222",
              "name": "File and Directory Permissions Modification",
              "display_name": "T1222 - File and Directory Permissions Modification"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "TA0005",
              "name": "Defense Evasion",
              "display_name": "TA0005 - Defense Evasion"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "TA0002",
              "name": "Execution",
              "display_name": "TA0002 - Execution"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            }
          ],
          "industries": [
            "Government",
            "Healthcare",
            "Technology"
          ],
          "TLP": "green",
          "cloned_from": "69dab27a0493e0e80a0f35cd",
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 138,
            "FileHash-SHA1": 119,
            "FileHash-SHA256": 3553,
            "IPv4": 633,
            "CVE": 2,
            "URL": 6134,
            "domain": 2439,
            "hostname": 2271,
            "email": 9,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 15300,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "4 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69b7241a63b7527ac2b04d60",
          "name": "DoD_Cyber_Strategy | Umbald.A | Patched3_c.AKRV | DoD | Navy.mil extensions | Adult Content distribution [msudosos IoCs connects to]",
          "description": "I became curious about an IoC found in a Pulse labeled \u2018undefined\u2019  by msudosos notated in  references and in parenthesis below this text. I did deep research on msudosos IoC. \nhttps://www.cybercom.mil/Portals/56/Document\ns/Strategy/DoD_Cyber_Strategy_2023.pdf | Apparent cyber warfare. Distribution of pornography potentially. The only use I have seen the type of attacks used for is reputation damage. | I am going to stick with the \u2018undefined\u2019 label given by msudosos because I don\u2019t know the purpose for the alleged Navy. mil & DoD for porn distribution. It\u2019s not to ensnare child predators. Possibly quasi government access to deter potential claimants. Possible hacker involvement. Going with \u2018undefined\u2019 for the moment.\n\n[444ea032708bb0d940de0ef72b944244 | credit msudosos || Patched3_c.AKRV -> https://otx.alienvault.com/indicator/file/444ea032708bb0d940de0ef72b944244]",
          "modified": "2026-04-14T18:06:37.524000",
          "created": "2026-03-15T21:26:50.218000",
          "tags": [
            "man software",
            "destination",
            "port",
            "united",
            "delete",
            "read c",
            "virustotal",
            "patched3_c.akrv",
            "armadillov171",
            "dod",
            "thinkman",
            "win32",
            "trojan",
            "present mar",
            "backdoor",
            "urls",
            "files",
            "unknown",
            "search",
            "china as23724",
            "asnone",
            "artemis",
            "zeppelin",
            "drweb",
            "vipre",
            "panda",
            "malware",
            "suspicious",
            "cloud",
            "logic",
            "et trojan",
            "et info",
            "download",
            "windows",
            "embeddedwb",
            "shellexecuteexw",
            "msie",
            "windows nt",
            "writeconsolew",
            "displayname",
            "service",
            "ids detections",
            "yara detections",
            "crypt",
            "medium",
            "whitelisted",
            "passive dns",
            "worm",
            "mtb may",
            "mtb aug",
            "otx logo",
            "all ipv4",
            "pulse pulses",
            "dynamicloader",
            "yara rule",
            "ff d5",
            "high",
            "reg add",
            "regsz d",
            "write",
            "file type",
            "pexe",
            "pe32",
            "intel",
            "ms windows",
            "pe packer",
            "pm size",
            "pehash",
            "richhash",
            "learn",
            "ck id",
            "name tactics",
            "informative",
            "adversaries",
            "command",
            "defense evasion",
            "spawns",
            "found",
            "over",
            "sha256",
            "sha1",
            "ascii text",
            "size",
            "mitre att",
            "pattern match",
            "null",
            "span",
            "error",
            "body",
            "hybrid",
            "general",
            "local",
            "path",
            "click",
            "strings",
            "refresh",
            "tools",
            "title",
            "show technique",
            "look",
            "verify",
            "restart",
            "t1480 execution",
            "navy",
            "reputation",
            "adult content",
            "cyber warfare"
          ],
          "references": [
            "AVDetections:  Patched3_c.AKRV",
            "Yara Detections: Armadillov171",
            "Alerts: antiav_servicestop persistence_autorun network_bind antivirus_virustotal network_http",
            "IP\u2019s Contacted:  8.8.8.8  78.46.218.253  74.208.229.157  192.5.41.40",
            "Contacted Domains:  tick.usno.navy.mil www.thinkman.com",
            "AS27064 DOD Network Information Center? |  192.5.41.40 | tick.usno.navy.mil tick.usno.navy.mil | United States",
            "AS8560 1&1 ionos se | 74.208.229.157 | www.thinkman.com\twww.thinkman.com | United States",
            "AS24940 hetzner online gmbh |78.46.218.253\t | static.253.218.46.78.clients.your-server.de | Germany",
            "AS15169 google llc  | 8.8.8.8\t| dns.google | United States",
            "Email: d4@thinkman.com",
            "Domain: navy.mil DNS Files IP Address: 192.5.41.40 Location: United States",
            "ASN AS27064 dod network information center",
            "Nameservers: dns5.disa.mil. ,  dns4.disa.mil. ,  squad.navo.mil. ,  crnaone.navy.mil. ,  dns1.disa.mil.",
            "Nameservers: squid.navo. ,  squid.navo.mil. ,  dns2.disa.mil. ,  minnow.navo. ,  navy.mil. ,  dns3.disa.mil.",
            "tick.usno.navy.mil , navy.mil: trojan:Win32/Tiggre!rfn Win.Trojan.Rootkit-4668 Win32:Agent-ALXE\\ [Rtk] Win32:Malware-gen",
            "TrojanDownloader:Win32/Umbald.A\tMalware infection",
            "IDS Detections: Win32/Tofsee.AX google.com connectivity check",
            "Alerts: nolookup_communication persistence_autorun bypass_firewall network_http p2p_cnc",
            "Alerts: allocates_rwx antivm_disk_size creates_exe creates_service suspicious_process",
            "Alerts: stealth_window packer_entropy uses_windows_utilities",
            "Alerts: console_output antivm_memory_available pe_features",
            "Yara Detections: MS_Visual_Basic_6_0",
            "Alerts: process_creation_suspicious_location injection_write_exe_process persistence_autorun",
            "Alerts: procmem_yara static_pe_anomaly deletes_executed_files injection_runpe",
            "Alerts: mouse_movement_detect dynamic_function_loading resumethread_remote_process",
            "Alerts:  injection_write_process reads_self stealth_window injection_rwx uses_windows_utilities",
            "Alerts:  queries_user_name queries_keyboard_layout queries_locale_api",
            "Alerts: antidebug_setunhandledexceptionfilter dll_load_uncommon_file_types",
            "porn.nonstopvideos.pl \u2022 xxx-xvideo.com \u2022 essexmetals.com",
            "http://www.aerix.com/__media__/js/netsoltrademark.php?d=www.pornxxxgals.info/latex-porn/",
            "navy.mil \u2022 http://acts.navair.navy.mil \u2022  http://logistics.navair.navy.mil/rcm/",
            "https://www.cloud.mil/CVRC:/Users/joshua.colliflower/OneDrive/OneDrive%20-%20United%20States%20Department%20of%20the%20Navy/Documents/Archive%20Miscellaneous",
            "192.5.41.40 scanning_host\t\u2022 74.208.229.157 scanning_host",
            "444ea032708bb0d940de0ef72b944244 | credit msudosos",
            "Patched3_c.AKRV -> https://otx.alienvault.com/indicator/file/444ea032708bb0d940de0ef72b944244",
            "https://otx.alienvault.com/pulse/69b65d6a27024117a4cd3540 [credit msudosos]",
            "https://www.cybercom.mil/Portals/56/Documents/Strategy/DoD_Cyber_Strategy_2023.pdf",
            "DoD related:  192.5.41.40 scanning_host\t140.19.33.126 \u2022 199.9.2.136 \u2022 214.23.15.26",
            "https://encore360.omeclk.com/portal/wts/ug^cnOmfy6edod--a.gif",
            "https://encore360.omeclk.com/portal/wts/ug^cnOmfy6efyLw9|dod--a | (205.162.40.0/21) (Omeda Communications )",
            "205.162.42.171 (205.162.40.0/21) AS 53866 ( Omeda Communications )",
            "https://exchange.simply.ms/owa/auth/logon.aspx?url=https://exchange.simply.ms/owa/&reason=0",
            "mailbox.co.za",
            "fmx32.aig.com \u2022  167.230.105.81",
            "https://otx.alienvault.com/indicator/url/https://gossip.thedirty.com/cdn-cgi/l/chk_jschl?s=04e9c17f33a895764287ae3918f54f016b353177-1551745661-1800-AWU4eGCIAWcUFRuFo2RAigESClCdCQ/9FJquPKplzHISR2zmIZSTluV/jEDBqANqdDORIXIACOwCScDYumaSt5kRHUKVAK4z6Wlo0HzAhetn"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Patched3_c.AKRV",
              "display_name": "Patched3_c.AKRV",
              "target": null
            },
            {
              "id": "Win32:Agent-ALXE\\ [Rtk]",
              "display_name": "Win32:Agent-ALXE\\ [Rtk]",
              "target": null
            },
            {
              "id": "Win.Trojan.Rootkit-4668",
              "display_name": "Win.Trojan.Rootkit-4668",
              "target": null
            },
            {
              "id": "Trojan:Win32/Tiggre!rfn",
              "display_name": "Trojan:Win32/Tiggre!rfn",
              "target": "/malware/Trojan:Win32/Tiggre!rfn"
            },
            {
              "id": "Win32:Malware-gen",
              "display_name": "Win32:Malware-gen",
              "target": null
            },
            {
              "id": "Win32:Trojan-gen",
              "display_name": "Win32:Trojan-gen",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Tofsee.T",
              "display_name": "Backdoor:Win32/Tofsee.T",
              "target": "/malware/Backdoor:Win32/Tofsee.T"
            },
            {
              "id": "Inject2.BIVE",
              "display_name": "Inject2.BIVE",
              "target": null
            },
            {
              "id": "Crypt3.CHZW",
              "display_name": "Crypt3.CHZW",
              "target": null
            },
            {
              "id": "Crypt3.BXVC",
              "display_name": "Crypt3.BXVC",
              "target": null
            },
            {
              "id": "Crypt3.BXMJ",
              "display_name": "Crypt3.BXMJ",
              "target": null
            },
            {
              "id": "Crypt3.BOQD\t\t Inject2.BHBW",
              "display_name": "Crypt3.BOQD\t\t Inject2.BHBW",
              "target": null
            },
            {
              "id": "Crypt3.BMVU",
              "display_name": "Crypt3.BMVU",
              "target": null
            },
            {
              "id": "Trojan.DownLoader12.43161",
              "display_name": "Trojan.DownLoader12.43161",
              "target": null
            },
            {
              "id": "HEUR/UnSec",
              "display_name": "HEUR/UnSec",
              "target": null
            },
            {
              "id": "ET Trojan",
              "display_name": "ET Trojan",
              "target": null
            },
            {
              "id": "Win32:Trojan-gen",
              "display_name": "Win32:Trojan-gen",
              "target": null
            },
            {
              "id": "TrojanDownloader:Win32/Umbald.A",
              "display_name": "TrojanDownloader:Win32/Umbald.A",
              "target": "/malware/TrojanDownloader:Win32/Umbald.A"
            }
          ],
          "attack_ids": [
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1014",
              "name": "Rootkit",
              "display_name": "T1014 - Rootkit"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1100",
              "name": "Web Shell",
              "display_name": "T1100 - Web Shell"
            },
            {
              "id": "T1156",
              "name": "Malicious Shell Modification",
              "display_name": "T1156 - Malicious Shell Modification"
            },
            {
              "id": "T1587.001",
              "name": "Malware",
              "display_name": "T1587.001 - Malware"
            },
            {
              "id": "T1608.001",
              "name": "Upload Malware",
              "display_name": "T1608.001 - Upload Malware"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1046",
              "name": "Network Service Scanning",
              "display_name": "T1046 - Network Service Scanning"
            },
            {
              "id": "T1001",
              "name": "Data Obfuscation",
              "display_name": "T1001 - Data Obfuscation"
            },
            {
              "id": "T1048",
              "name": "Exfiltration Over Alternative Protocol",
              "display_name": "T1048 - Exfiltration Over Alternative Protocol"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1562.001",
              "name": "Disable or Modify Tools",
              "display_name": "T1562.001 - Disable or Modify Tools"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1048.003",
              "name": "Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol",
              "display_name": "T1048.003 - Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol"
            },
            {
              "id": "T1011",
              "name": "Exfiltration Over Other Network Medium",
              "display_name": "T1011 - Exfiltration Over Other Network Medium"
            },
            {
              "id": "T1048.001",
              "name": "Exfiltration Over Symmetric Encrypted Non-C2 Protocol",
              "display_name": "T1048.001 - Exfiltration Over Symmetric Encrypted Non-C2 Protocol"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            }
          ],
          "industries": [
            "Government",
            "Military",
            "Defense",
            "Insurance"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 165,
            "FileHash-SHA1": 165,
            "FileHash-SHA256": 3524,
            "URL": 11424,
            "email": 1,
            "hostname": 3954,
            "domain": 2523
          },
          "indicator_count": 21756,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "4 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69b640dc1d356dbe2694102c",
          "name": "725f6400ca35060e682a51204b8c7665a872e844cd56f262839605609198586e",
          "description": "Pulses\n13\nAV Detections\n1\nIDS Detections\n5\nYARA Detections\n0\nAlerts\n0\nAnalysis Overview\nAnalysis Date\n7 years ago\nFile Score\n11.8\nMalicious\nAntivirus Detections\nWin32:Trojan-gen\nIDS Detections\nWin32/Tofsee.AX google.com connectivity check\nYara Detections\nNone\nAlerts\ndead_host\nnetwork_icmp\nnolookup_communication\npersistence_autorun\nbypass_firewall\nnetwork_http\nsuspicious_tld\nallocates_rwx\nantivm_disk_size\ncreates_exe\nMore\nIP\u2019s Contacted\n20 IP\u2019s Contacted\n104.47.38.33\n104.47.4.33\n\n144.76.199.2\n144.76.199.43\n172.217.21.132\nMore\nDomains Contacted\n43 Domains Contacted\ninbox.ru\nmail.ru\nrosfinnadzor.ru\nsoft-shop.ru\nrambler.ru",
          "modified": "2026-04-14T05:27:39.348000",
          "created": "2026-03-15T05:17:16.071000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 33,
            "FileHash-SHA1": 29,
            "FileHash-SHA256": 45,
            "domain": 66,
            "hostname": 50,
            "SSLCertFingerprint": 2,
            "URL": 4
          },
          "indicator_count": 229,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 49,
          "modified_text": "5 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69b6044b1389957c1d2afb58",
          "name": "Pulses in Question",
          "description": "Following.",
          "modified": "2026-04-14T01:10:24.056000",
          "created": "2026-03-15T00:58:51.761000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 56,
            "FileHash-SHA1": 56,
            "FileHash-SHA256": 93,
            "URL": 122,
            "hostname": 150,
            "email": 1,
            "domain": 37
          },
          "indicator_count": 515,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "5 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69b5facbdf018450630688f5",
          "name": "\"Enrichment in Progress\" Indicators on my Device- WHATNOT.com",
          "description": "Referring EXE files. Thats whatsNOT cool.",
          "modified": "2026-04-14T00:14:29.475000",
          "created": "2026-03-15T00:18:19.924000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 20,
            "FileHash-SHA1": 37,
            "FileHash-SHA256": 474,
            "domain": 125,
            "email": 4,
            "hostname": 109,
            "URL": 200,
            "SSLCertFingerprint": 4
          },
          "indicator_count": 973,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "5 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6992bae83a5988dff8311490",
          "name": "Distributed Credential Exhaustion & C2 Orchestration via Golang-Based StealthWorker (ELF.Agent-VW)",
          "description": "Researcher credit: msudosos, level blue platform----\nThis artifact represents a high-integrity StealthWorker (GoBrut) botnet agent, architected as a statically linked, stripped 32-bit ELF binary to ensure cross-platform environmental independence. The sample utilizes XOR 0x20-encoded JavaScript payloads and String.fromCharCode obfuscation to mask its internal logic and bypass heuristic-based memory scanners. [User Notes] Its operational core is a multi-threaded service bruter targeting SSH, MySQL, and CMS backends, leveraging a massive infrastructure of 1,834 domains and 797 unique IPv4 endpoints for decentralized Command & Control (C2). Network telemetry confirms the use of ICMP and HTTP-based beaconing, indicating a sophisticated retry logic designed to maintain persistence across diverse network topologies. With a malicious file score of 10, this binary serves as a primary vector for large-scale credential harvesting and the subsequent integration of Linux infrastructure into global botnet clusters.",
          "modified": "2026-04-13T23:46:20.071000",
          "created": "2026-02-16T06:36:24.788000",
          "tags": [
            "Obfuscation: XOR-based String Encryption (0x20)",
            "T1110.001 (Brute Force: Password Guessing)",
            "Primary Hash (SHA256): cd3989830da99a69380901769fd78902efb3cd8ba",
            "MD5 Hash: f8add7e7161460ea2b1970cf4ca535bf",
            "#PotentialUS-Origin_FalseFlag_Obfuscation"
          ],
          "references": [
            "Primary Hash (SHA256): cd3989830da99a69380901769fd78902efb3cd8ba5c9390e94bd4333b7fad186",
            "Obfuscation: XOR-based String Encryption (0x20)",
            "T1110.001 (Brute Force: Password Guessing)",
            "This ELF 32-bit LSB artifact is a sophisticated GoBrut/StealthWorker agent, compiled via Golang 1.10 and stripped to obfuscate its high-velocity service-bruting logic. VirusTotal confirms a critical threat profile with 44/65 security vendors flagging the file, which leverages a unique Go BuildID (nGYES3pajdOm...) and a Telfhash (t1f303a0...) for architectural fingerprinting. The binary orchestrates decentralized Command and Control (C2) through an expansive infrastructure of 797 unique IPs and 1,834 domains",
            "Pivot-Ready Indicators (IOCs) Go BuildID: nGYES3pajdOmKy1i6Ghh/KO9ydOtZpXtoKtB0KHE-/iisNoniHgTbj_cV6M-uk/XmMYzkBiZs8NXMRZYTiT Telfhash: t1f303a0b3055d54e8b7f08907c7af7624cef6e0f726d078f169e278d09a72c826626874 Imphash: 9698f46495ce9401c8bcaf9a2afe1598 Vhash: 1e53f1a1b59ecb93f821c74b25d81e9f",
            "Researcher msudosos posits a strategic exploitation of Root Certificate Validation Failures, where the adversary leverages an expired trust chain to bypass heuristic security filters and establish persistence.",
            "his technique allows the GoBrut/StealthWorker agent to circumvent automated revocation checks, enabling its decentralized C2 infrastructure to recruit Linux hosts via high-velocity credential exhaustion.",
            "The local environment exhibits advanced telemetry suppression within specialized skim memory regions, effectively neutralizing standard DMARC validation and Microsoft-integrated defensive protocols.",
            "By maintaining a hollowed root posture, the sample facilitates persistent, low-signal synchronization with external cloud infrastructure while bypassing traditional heuristic trust-chain verification.",
            "The domain prioritywirreles.com (registered via NAMECHEAP INC) shows a 4/93 detection ratio, confirming it is a live but \"low-noise\" C2 node used to avoid broad-spectrum blacklisting",
            "",
            "The environment leverages prioritywirreles.com as a high-fidelity DGA-derived C2 node, utilizing its historical resolution to Russian-hosted IP space (194.61.24.231) to maintain persistent Stealthworker botnet synchronization.",
            "By operating through WhoisGuard-protected infrastructure and exploiting XOR 0x20 obfuscation, the adversary effectively suppresses telemetry into skim space, successfully bypassing DMARC and Microsoft-integrated trust-chain validation.",
            "The pivot from cd398983... to this domain confirms a multi-year campaign (2019\u20132023) utilizing Namecheap-registered infrastructure to orchestrate wide-scale T1110.001 brute-force operations while bypassing standard PKI expiration checks.",
            "LBresearcher: msudosos notes: The campaign's use of T1110.001 (Password Guessing) is specifically tuned to exhaust credentials across SSH, MySQL, and CMS backends, effectively recruiting server infrastructure into a global \"zombie\" network.",
            "LBresearcher: msudosos notes: The threat actor maintains operational longevity by rotating through WhoisGuard-protected nodes like prioritywirreles.com, which historically resolved to Russian-hosted IP space (194.61.24.231) to obfuscate its origin.",
            "LBresearcher: msudosos notes: By exploiting Root Certificate Validation Failures, the StealthWorker (GoBrut) agent ensures that its 32-bit ELF binaries bypass the automated reputation checks enforced by major cloud providers.",
            "Monitor DGA Shifts: Track new domains registered through NAMECHEAP INC using the current WhoisGuard patterns to identify the next cluster before it goes active. Analyze Telfhash Clusters: Use the Telfhash (t1f303a0...) to pivot and find if the adversary has updated to 64-bit ELF or ARM architectures. Harden DMARC: Ensure your environment moves from \"p=none\" to \"p=reject\" to mitigate the internal spoofing loops exploited by this botnet's telemetry suppression.",
            "Persistent C2 Orchestration: This ELF:Agent-VW variant serves as a critical GoBrut node, utilizing XOR 0x20 obfuscation and ICMP/HTTP beaconing to maintain a persistent link across 1,834 domains and 797 unique IPs",
            "Researcher msudosos: This activity appears to facilitate a preliminary reconnaissance phase, possibly utilizing system commands to query /proc/cpuinfo and /proc/version for architectural profiling purposes.",
            "Researcher msudosos suggests the VirusTotal (Tencent HABO) behavior report may indicate a potential execution path from volatile storage at /tmp/EB93A6/996E.elf.",
            "Msudosos Regional Notes: While historical pivots show Russian-hosted nodes, the current dual-origin telemetry\u2014dominated by 181 United States-based endpoints\u2014strongly suggests a domestic-aligned adversary leveraging global 'grey space' to obfuscate its operational core. This massive US-centric footprint (exceeding all other regions combined) reinforces the theory of a false-flag orchestration designed to divert attribution toward foreign infrastructure while abusing legitimate Western-hosted trust chains.",
            "WHOIS data anchors administrative and technical operations for prioritywirreles.com in Los Angeles, CA (90064) via Namecheap infrastructure. Following its 2020 expiration, the domain has transitioned into redemptionPeriod/pendingDelete status, signaling the formal decommissioning of this C2 asset."
          ],
          "public": 1,
          "adversary": "StealthWorker/GoBrut (The adversary demonstrates advanced telemetry suppression within specialized s",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Malware Family: StealthWorker / GoBrut",
              "display_name": "Malware Family: StealthWorker / GoBrut",
              "target": "/malware/Malware Family: StealthWorker / GoBrut"
            },
            {
              "id": "MD5 Hash: f8add7e7161460ea2b1970cf4ca535bf",
              "display_name": "MD5 Hash: f8add7e7161460ea2b1970cf4ca535bf",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1001",
              "name": "Data Obfuscation",
              "display_name": "T1001 - Data Obfuscation"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2166,
            "FileHash-SHA1": 2067,
            "FileHash-SHA256": 3371,
            "domain": 13295,
            "URL": 6860,
            "email": 272,
            "hostname": 4705,
            "SSLCertFingerprint": 268,
            "CVE": 107,
            "CIDR": 6
          },
          "indicator_count": 33117,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 62,
          "modified_text": "5 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69b5ed28735eb01702a6fe04",
          "name": "46e4e53eb51472a25b3261ce0abaf46ce9577f55880b5720c6bfa724bdfdac94",
          "description": "f0db3575920be022b33b4618d1dc05c5\nSHA-1\n0328b199184ec3fd1a5c765bcf33f2cc71d5b341\nSHA-256\n46e4e53eb51472a25b3261ce0abaf46ce9577f55880b5720c6bfa724bdfdac94\nVhash\n0360b6666d5c0d5d151c00d016z689zfaz1fz2\nAuthentihash\n23923d50f45700facda2365484894e192f7b95e27a33c310c3eb0cc6e0ae86cc\nImphash\ne8ac1646024d52d1534a88da2e8037cd\nSSDEEP\n49152:ZnfhrouO1P5cR3uRpYzxqozktxrn4uncp5soapYGfANKv1p/858kiOLRn5M:ZnfhrI1WR3uMooQbnoa2rNe1N8yk/lC\nTLSH\nT15DF5F123E24EA73EE46A593509B29950583FBE60651E8CA396FC3D4CCE390901D7EF47\nFile type\nWin32 EXE \nexecutable\nwindows\nwin32\npe\npeexe\nMagic\nPE32 executable (GUI) Intel 80386, for MS Windows\nTrID\nInno Setup installer (50.8%)   InstallShield setup (20.4%)   Win32 EXE PECompact compressed (generic) (19.7%)   Win64 Executable (generic) (3%)   Win32 Executable (generic) (2.1%)\nDetectItEasy\nPE32   Installer: Inno Setup Module   Compiler: Embarcadero Delphi (11.x Alexandria++)   Linker: Turbo Linker (2.25*,Delphi) [GUI32,signed]\nMagika\nPEBIN\nFile size\n3.23 MB (3383824 bytes)",
          "modified": "2026-04-13T00:21:24.884000",
          "created": "2026-03-14T23:20:08.223000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 456,
            "FileHash-SHA1": 454,
            "FileHash-SHA256": 452,
            "URL": 214,
            "hostname": 28,
            "domain": 10
          },
          "indicator_count": 1614,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 47,
          "modified_text": "6 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69dc04c12782d2d76c111a93",
          "name": "VirusTotal \u2022 PsBanker \u2022 Attacked / Blocked",
          "description": "",
          "modified": "2026-04-12T20:46:57.338000",
          "created": "2026-04-12T20:46:57.338000",
          "tags": [
            "indicator role",
            "active related",
            "ck ids",
            "files",
            "information",
            "discovery",
            "mitre att",
            "pattern match",
            "ck id",
            "ck matrix",
            "ascii text",
            "united",
            "binary file",
            "april",
            "hybrid",
            "apikey",
            "general",
            "local",
            "path",
            "iframe",
            "click",
            "protocol",
            "learn",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "spawns",
            "execution att",
            "related pulses",
            "dll read",
            "function read",
            "icmp traffic",
            "machineguid",
            "systembiosdate",
            "total",
            "read",
            "write",
            "network_icmp",
            "js_eval",
            "recon_fingerprint",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "tlsv1",
            "tls handshake",
            "execution",
            "dock",
            "persistence",
            "malware",
            "unknown",
            "neue",
            "certificate",
            "error",
            "scans show",
            "record value",
            "title site",
            "servers",
            "emails",
            "all hostname",
            "dnsadmin",
            "data upload",
            "extraction",
            "failed",
            "include review",
            "exclude sugges",
            "find s",
            "typ no",
            "active",
            "urls",
            "ip address",
            "asn as54113",
            "registrar",
            "wscript",
            "united states",
            "stcalifornia",
            "lmountain view",
            "ogoogle llc",
            "ogoogle trust",
            "cngts ca",
            "whitelisted",
            "as15169",
            "hostile",
            "crash",
            "contacted",
            "av detections",
            "ids detections",
            "yara detections",
            "alerts",
            "analysis date",
            "file score",
            "detections alf",
            "hostile yara",
            "detections none",
            "less ip",
            "domains",
            "ms windows",
            "intel",
            "pe32",
            "regsetvalueexa",
            "langturkish",
            "sublangdefault",
            "port",
            "destination",
            "entries",
            "worm",
            "delphi",
            "win32",
            "body",
            "explorer",
            "defender",
            "regdword",
            "false",
            "true",
            "end sub",
            "object",
            "createobject",
            "sheetschanged",
            "private sub",
            "string",
            "boolean",
            "cancel",
            "trojan",
            "copy",
            "query",
            "dns update",
            "useragent",
            "myapp",
            "delphi alerts",
            "alerts deadhost",
            "women who code",
            "tulach",
            "114.114.114.114",
            "samuel",
            "brian sabey"
          ],
          "references": [
            "https://www.virustotal.com/gui/search/maxsecure:%22virus.webtoolbar.w32.searchsuite.gen_227097%22%20entity:file",
            "this.target",
            "c6pPVZhf.exe FileHash-SHA256 99e60fbd12fa9cffb9e84b4f8fa53169cd9eb965f083337de1995926a5ed83f1",
            "amazon.com \u2022 pki.goog \u2022 google-analytics.com",
            "authrootstl.cab common file extension",
            "dlvr.it \u2022 securityaffairs.com \u2022 wscript.shell",
            "https://securityaffairs.com/144927/cyber-crime~#",
            "https://securityaffairs.com/144927/cyber-crime/qbot-campaign-april-2023.html",
            "virustotalcloud.firebaseapp.com \u2022 firebaseapp.com \u2022 firebase.google.com \u2022 dns-admin@google.com",
            "https://clockoutbox.es/password",
            "http://cr-malware.testpanw.com/url",
            "IDS Detections: Query to a *.pw domain - Likely Hostile",
            "Alerts: network_icmp deletes_executed_files injection_resumethread dumped_buffer",
            "Alerts: network_http nids_alert suspicious_tld allocates_rwx antisandbox_foregroundwindows",
            "Alerts: applcation_raises_exception creates_exe suspicious_process stealth_window uses_",
            "Alerts: windows_utilities antivm_memory_available pe_features raises_exception",
            "IP\u2019s Contacted: 104.16.132.229  104.31.4.167  108.177.126.101  108.177.126.94  13.107.21.200  172.217.14.227",
            "IP\u2019s Contacted: 172.217.3.163  172.217.3.202  172.217.3.206  173.194.69.94",
            "Domains Contacted: www.youtube.com www.google.co.ck www.google.com ocsp.pki.goog",
            "Domains Contacted: www.virustotal.com www.gstatic.com fonts.googleapis.com",
            "Domains Contacted:: i.ytimg.com encrypted-tbn0.gstatic.com cponline.pw",
            "Win32:Crypt-SKC\\ [Trj] ,  Win.Malware.Delf-6899401-0 ,  Worm:Win32/AutoRun!atmn",
            "IDS Detections: W32.Bloat-A Checkin DYNAMIC_DNS Query to Abused Domain *.mooo.com Suspicious Dynamic DNS Update Request Suspicious User-Agent (MyApp)",
            "Yara Detections compromised_site_redirector_fromcharcode ,  Delphi",
            "Alerts: dead_host network_icmp persistence_autorun modifies_certificates modifies_proxy_wpad",
            "Alerts: multiple_useragents dumped_buffer networkdyndns_checkip network_http allocates_rwx",
            "IP\u2019s Contacted: 104.97.41.163  142.251.33.67  142.251.33.78  209.197.3.8  216.239.32.29",
            "Domains Contacted: pki.goog www.microsoft.com ocsp.pki.goog freedns.afraid.org",
            "Domains Contacted: xred.mooo.com www.download.windowsupdate.com docs.google.com",
            "114.114.114.114 = Tulach"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "ALF:Trojan:Win64/PsBanker",
              "display_name": "ALF:Trojan:Win64/PsBanker",
              "target": null
            },
            {
              "id": "Worm:Win32/AutoRun!atmn",
              "display_name": "Worm:Win32/AutoRun!atmn",
              "target": "/malware/Worm:Win32/AutoRun!atmn"
            },
            {
              "id": "Trojan:O97M/Madeba.A!det",
              "display_name": "Trojan:O97M/Madeba.A!det",
              "target": "/malware/Trojan:O97M/Madeba.A!det"
            },
            {
              "id": "Tulach",
              "display_name": "Tulach",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1115",
              "name": "Clipboard Data",
              "display_name": "T1115 - Clipboard Data"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1583.001",
              "name": "Domains",
              "display_name": "T1583.001 - Domains"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1114,
            "hostname": 594,
            "domain": 200,
            "FileHash-SHA256": 2379,
            "FileHash-MD5": 426,
            "FileHash-SHA1": 259,
            "IPv4": 322,
            "SSLCertFingerprint": 24,
            "email": 2,
            "IPv6": 1
          },
          "indicator_count": 5321,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "6 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69bf4cc74c3d8f391a1a927c",
          "name": "9e42ac52bda44d5cadcabffd1d5e78a06598c8b5",
          "description": "",
          "modified": "2026-04-12T09:32:06.522000",
          "created": "2026-03-22T01:58:31.611000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 308,
            "FileHash-SHA1": 305,
            "FileHash-SHA256": 362,
            "IPv4": 15,
            "URL": 369,
            "hostname": 376,
            "domain": 192,
            "email": 13
          },
          "indicator_count": 1940,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 50,
          "modified_text": "7 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69db05f833d3d6d2231fb201",
          "name": "CREDIT: Q.Vashti's research: SearchSuite \u2022 Healthcare Administration CREATED 6 HOURS AGO by Q.Vashti",
          "description": "",
          "modified": "2026-04-12T02:39:52.993000",
          "created": "2026-04-12T02:39:52.993000",
          "tags": [
            "Win32/SearchSuite",
            "pe32",
            "intel",
            "ms windows",
            "ms visual",
            "win32 dynamic",
            "link library",
            "win16 ne",
            "pe32 installer",
            "install system",
            "compiler",
            "NSIS",
            "code signing",
            "serial number",
            "db d2",
            "de d3",
            "f3 e1",
            "issuer thawte",
            "primary root",
            "ca valid",
            "valid",
            "valid usage",
            "client auth",
            "algorithm",
            "rticon english",
            "type type",
            "chi2",
            "ico rtgroupicon",
            "english us",
            "capa",
            "c2 antianalysis",
            "executable",
            "sample appears",
            "installer",
            "installers well",
            "results may",
            "be misleading",
            "or incomplete",
            "analyze created",
            "techniques",
            "info modify",
            "files",
            "modify registry",
            "directory permi",
            "techniques none",
            "info",
            "scripting inte",
            "shared modules",
            "Bear Share",
            "urls",
            "ip address",
            "asn as8075",
            "united",
            "flag united",
            "name servers",
            "name domain",
            "org apple",
            "infinite loop",
            "city cupertino",
            "country us",
            "dnssec",
            "urlmailto",
            "urlhttps",
            "search",
            "urlhttp",
            "moved",
            "title",
            "encrypt",
            "certificate",
            "segoe ui",
            "otx logo",
            "url analysis",
            "tokyo",
            "msie",
            "chrome",
            "gmt content",
            "all ipv4",
            "zeppelin",
            "trojandropper",
            "cookie",
            "backdoor",
            "hash avast",
            "avg clamav",
            "msdefender feb",
            "k oct",
            "k may",
            "mtb feb",
            "mtb jan",
            "k aug",
            "windows nt",
            "dynamicloader",
            "unknown",
            "medium",
            "default",
            "as16509",
            "show",
            "powershell",
            "write",
            "xserver",
            "bearshar data",
            "passive dns",
            "pulse submit",
            "port",
            "destination",
            "high",
            "displayname",
            "windows",
            "win64",
            "tofsee",
            "stream",
            "malware",
            "push",
            "next",
            "asnone",
            "germany as8560",
            "russia as198610",
            "strings",
            "is__elf",
            "systembc_linux_variant",
            "khtml",
            "gecko",
            "acceptencoding",
            "get na",
            "macintosh",
            "intel mac",
            "accept",
            "france as16276",
            "yara detections",
            "contacted",
            "all filehash",
            "sha256",
            "pulse pulses",
            "av detections",
            "ids detections",
            "alerts",
            "analysis date",
            "tls sni",
            "less see",
            "all ip",
            "Apple",
            "xordata",
            "United States"
          ],
          "references": [
            "b9e4e47c3f96846c30581c08acf5bc56.virus",
            "BearShare Install File Version 12.0.0.135802",
            "Musiclab, LLC",
            "msoid.applemanic.com \u2022 msoid.giftcardapple.shop \u2022 msoid.appleportconsulting.com",
            "gateway.fe.apple-dns.net \u2022 apple-dns.net",
            "africa.konnect.com",
            "http://scratch-mit-edu.027.cloudns.asia/users/alessandrito123",
            "euw-serp-dev-testing19.duck.ai",
            "account-apple.com",
            "Win.Trojan.Tofsee-7102058-0 ,  Backdoor:Win32/Tofsee.T",
            "IDS Detections Win32/Tofsee.AX google.com connectivity check Observed Telegram Domain (t .me in TLS SNI)",
            "Yara Detections: Tofsee",
            "Alerts: behavior_tofsee creates_largekey injection_write_exe_process network_bind",
            "Alerts: persistence_autorun persistence_autorun_tasks procmem_yara static_pe_anomaly",
            "Alerts: suricata_alert antivm_generic_services physical_drive_access deletes_executed_files",
            "Alerts: deletes_self injection_runpe persistence_ads suspicious_command_tools",
            "Alerts: anomalous_deletefile antisandbox_sleep dead_connect dynamic_function_loading",
            "IP\u2019s Contacted: 47.43.26.4  195.35.13.119  149.154.167.99  185.138.56.214  142.250.147.26  81.88.48.101",
            "IP\u2019s Contacted: 104.21.72.117  172.66.156.195  157.240.200.174  141.193.213.20",
            "Domains Contacted: microsoft.com microsoft-com.mail.protection.outlook.com vanaheim.cn yahoo.com mta6.am0.yahoodns.net 13.205.167.198.dnsbl.sorbs.net 13.205.167.198.bl.spamcop.net 13.205.167.198.zen.spamhaus.org 13.205.167.198.sbl-xbl.spamhaus.org 13.205.167.198.cbl.abuseat.org",
            "https://perigon-one.au.itglue.com/password_shared_links/52f082d3-d889-4db5-ae03-c7bfcbe5aa21",
            "https://identity.prd-cdc.jemena.com.au/pages/jemena-reset-password",
            "https://in2it.itglue.com/password_shared_links/9b0e2a1d-b554-4f0c-a333-390e41defe8e",
            "https://oauth2.admin.p4d-1.p4d.aks.lightops.cloud.slb-ds.com/lightops-auth/callback&response_type=code&scope=openid+email+profile&state=uJZE80MW6TdJQjbI0RWXhnF3SpYZXckLkfafnEHgr_I:",
            "https://oauth2.admin.p4d-1.p4d.aks.lightops.cloud.slb-ds.com/lightops-auth/callback",
            "ids-apple.com \u2022 itunes.org",
            "xn--cloud-4sa.com",
            "http://cab.applemarketingtools.com",
            "http://console.applemarketingtools.com/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Spain",
            "France",
            "United Kingdom of Great Britain and Northern Ireland",
            "Netherlands",
            "Japan",
            "Switzerland",
            "Madagascar",
            "Finland",
            "Germany",
            "Russian Federation"
          ],
          "malware_families": [
            {
              "id": "Win32/SearchSuite",
              "display_name": "Win32/SearchSuite",
              "target": null
            },
            {
              "id": "Win32.Application.BearShare.A",
              "display_name": "Win32.Application.BearShare.A",
              "target": null
            },
            {
              "id": "Exploit:Win32/CVE-2017-0147",
              "display_name": "Exploit:Win32/CVE-2017-0147",
              "target": "/malware/Exploit:Win32/CVE-2017-0147"
            },
            {
              "id": "CVE-2023-22518",
              "display_name": "CVE-2023-22518",
              "target": null
            },
            {
              "id": "Win.Packed.Bandook-9882274-1",
              "display_name": "Win.Packed.Bandook-9882274-1",
              "target": null
            },
            {
              "id": "Win.Trojan.Tofsee-7102058-0",
              "display_name": "Win.Trojan.Tofsee-7102058-0",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Tofsee.T",
              "display_name": "Backdoor:Win32/Tofsee.T",
              "target": "/malware/Backdoor:Win32/Tofsee.T"
            },
            {
              "id": "TrojanDownloader:Win32/Cutwail",
              "display_name": "TrojanDownloader:Win32/Cutwail",
              "target": "/malware/TrojanDownloader:Win32/Cutwail"
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1222",
              "name": "File and Directory Permissions Modification",
              "display_name": "T1222 - File and Directory Permissions Modification"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "TA0005",
              "name": "Defense Evasion",
              "display_name": "TA0005 - Defense Evasion"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "TA0002",
              "name": "Execution",
              "display_name": "TA0002 - Execution"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            }
          ],
          "industries": [
            "Government",
            "Healthcare",
            "Technology"
          ],
          "TLP": "green",
          "cloned_from": "69dab27a0493e0e80a0f35cd",
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 138,
            "FileHash-SHA1": 119,
            "FileHash-SHA256": 3553,
            "IPv4": 633,
            "CVE": 2,
            "URL": 6134,
            "domain": 2439,
            "hostname": 2271,
            "email": 9,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 15300,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 49,
          "modified_text": "7 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69dab27a0493e0e80a0f35cd",
          "name": "SearchSuite \u2022 Healthcare Administration",
          "description": "Embedded in communication between a healthcare system and a client. \n\nThis is just one of countless internal issues causing a gap in communication, malicious adware, spyware, system sweeps, injection, system modification, downloads , call failures.",
          "modified": "2026-04-11T20:43:38.695000",
          "created": "2026-04-11T20:43:38.695000",
          "tags": [
            "Win32/SearchSuite",
            "pe32",
            "intel",
            "ms windows",
            "ms visual",
            "win32 dynamic",
            "link library",
            "win16 ne",
            "pe32 installer",
            "install system",
            "compiler",
            "NSIS",
            "code signing",
            "serial number",
            "db d2",
            "de d3",
            "f3 e1",
            "issuer thawte",
            "primary root",
            "ca valid",
            "valid",
            "valid usage",
            "client auth",
            "algorithm",
            "rticon english",
            "type type",
            "chi2",
            "ico rtgroupicon",
            "english us",
            "capa",
            "c2 antianalysis",
            "executable",
            "sample appears",
            "installer",
            "installers well",
            "results may",
            "be misleading",
            "or incomplete",
            "analyze created",
            "techniques",
            "info modify",
            "files",
            "modify registry",
            "directory permi",
            "techniques none",
            "info",
            "scripting inte",
            "shared modules",
            "Bear Share",
            "urls",
            "ip address",
            "asn as8075",
            "united",
            "flag united",
            "name servers",
            "name domain",
            "org apple",
            "infinite loop",
            "city cupertino",
            "country us",
            "dnssec",
            "urlmailto",
            "urlhttps",
            "search",
            "urlhttp",
            "moved",
            "title",
            "encrypt",
            "certificate",
            "segoe ui",
            "otx logo",
            "url analysis",
            "tokyo",
            "msie",
            "chrome",
            "gmt content",
            "all ipv4",
            "zeppelin",
            "trojandropper",
            "cookie",
            "backdoor",
            "hash avast",
            "avg clamav",
            "msdefender feb",
            "k oct",
            "k may",
            "mtb feb",
            "mtb jan",
            "k aug",
            "windows nt",
            "dynamicloader",
            "unknown",
            "medium",
            "default",
            "as16509",
            "show",
            "powershell",
            "write",
            "xserver",
            "bearshar data",
            "passive dns",
            "pulse submit",
            "port",
            "destination",
            "high",
            "displayname",
            "windows",
            "win64",
            "tofsee",
            "stream",
            "malware",
            "push",
            "next",
            "asnone",
            "germany as8560",
            "russia as198610",
            "strings",
            "is__elf",
            "systembc_linux_variant",
            "khtml",
            "gecko",
            "acceptencoding",
            "get na",
            "macintosh",
            "intel mac",
            "accept",
            "france as16276",
            "yara detections",
            "contacted",
            "all filehash",
            "sha256",
            "pulse pulses",
            "av detections",
            "ids detections",
            "alerts",
            "analysis date",
            "tls sni",
            "less see",
            "all ip",
            "Apple",
            "xordata",
            "United States"
          ],
          "references": [
            "b9e4e47c3f96846c30581c08acf5bc56.virus",
            "BearShare Install File Version 12.0.0.135802",
            "Musiclab, LLC",
            "msoid.applemanic.com \u2022 msoid.giftcardapple.shop \u2022 msoid.appleportconsulting.com",
            "gateway.fe.apple-dns.net \u2022 apple-dns.net",
            "africa.konnect.com",
            "http://scratch-mit-edu.027.cloudns.asia/users/alessandrito123",
            "euw-serp-dev-testing19.duck.ai",
            "account-apple.com",
            "Win.Trojan.Tofsee-7102058-0 ,  Backdoor:Win32/Tofsee.T",
            "IDS Detections Win32/Tofsee.AX google.com connectivity check Observed Telegram Domain (t .me in TLS SNI)",
            "Yara Detections: Tofsee",
            "Alerts: behavior_tofsee creates_largekey injection_write_exe_process network_bind",
            "Alerts: persistence_autorun persistence_autorun_tasks procmem_yara static_pe_anomaly",
            "Alerts: suricata_alert antivm_generic_services physical_drive_access deletes_executed_files",
            "Alerts: deletes_self injection_runpe persistence_ads suspicious_command_tools",
            "Alerts: anomalous_deletefile antisandbox_sleep dead_connect dynamic_function_loading",
            "IP\u2019s Contacted: 47.43.26.4  195.35.13.119  149.154.167.99  185.138.56.214  142.250.147.26  81.88.48.101",
            "IP\u2019s Contacted: 104.21.72.117  172.66.156.195  157.240.200.174  141.193.213.20",
            "Domains Contacted: microsoft.com microsoft-com.mail.protection.outlook.com vanaheim.cn yahoo.com mta6.am0.yahoodns.net 13.205.167.198.dnsbl.sorbs.net 13.205.167.198.bl.spamcop.net 13.205.167.198.zen.spamhaus.org 13.205.167.198.sbl-xbl.spamhaus.org 13.205.167.198.cbl.abuseat.org",
            "https://perigon-one.au.itglue.com/password_shared_links/52f082d3-d889-4db5-ae03-c7bfcbe5aa21",
            "https://identity.prd-cdc.jemena.com.au/pages/jemena-reset-password",
            "https://in2it.itglue.com/password_shared_links/9b0e2a1d-b554-4f0c-a333-390e41defe8e",
            "https://oauth2.admin.p4d-1.p4d.aks.lightops.cloud.slb-ds.com/lightops-auth/callback&response_type=code&scope=openid+email+profile&state=uJZE80MW6TdJQjbI0RWXhnF3SpYZXckLkfafnEHgr_I:",
            "https://oauth2.admin.p4d-1.p4d.aks.lightops.cloud.slb-ds.com/lightops-auth/callback",
            "ids-apple.com \u2022 itunes.org",
            "xn--cloud-4sa.com",
            "http://cab.applemarketingtools.com",
            "http://console.applemarketingtools.com/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Spain",
            "France",
            "United Kingdom of Great Britain and Northern Ireland",
            "Netherlands",
            "Japan",
            "Switzerland",
            "Madagascar",
            "Finland",
            "Germany",
            "Russian Federation"
          ],
          "malware_families": [
            {
              "id": "Win32/SearchSuite",
              "display_name": "Win32/SearchSuite",
              "target": null
            },
            {
              "id": "Win32.Application.BearShare.A",
              "display_name": "Win32.Application.BearShare.A",
              "target": null
            },
            {
              "id": "Exploit:Win32/CVE-2017-0147",
              "display_name": "Exploit:Win32/CVE-2017-0147",
              "target": "/malware/Exploit:Win32/CVE-2017-0147"
            },
            {
              "id": "CVE-2023-22518",
              "display_name": "CVE-2023-22518",
              "target": null
            },
            {
              "id": "Win.Packed.Bandook-9882274-1",
              "display_name": "Win.Packed.Bandook-9882274-1",
              "target": null
            },
            {
              "id": "Win.Trojan.Tofsee-7102058-0",
              "display_name": "Win.Trojan.Tofsee-7102058-0",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Tofsee.T",
              "display_name": "Backdoor:Win32/Tofsee.T",
              "target": "/malware/Backdoor:Win32/Tofsee.T"
            },
            {
              "id": "TrojanDownloader:Win32/Cutwail",
              "display_name": "TrojanDownloader:Win32/Cutwail",
              "target": "/malware/TrojanDownloader:Win32/Cutwail"
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1222",
              "name": "File and Directory Permissions Modification",
              "display_name": "T1222 - File and Directory Permissions Modification"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "TA0005",
              "name": "Defense Evasion",
              "display_name": "TA0005 - Defense Evasion"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "TA0002",
              "name": "Execution",
              "display_name": "TA0002 - Execution"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            }
          ],
          "industries": [
            "Government",
            "Healthcare",
            "Technology"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 138,
            "FileHash-SHA1": 119,
            "FileHash-SHA256": 3553,
            "IPv4": 633,
            "CVE": 2,
            "URL": 6134,
            "domain": 2439,
            "hostname": 2271,
            "email": 9,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 15300,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "7 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69d9aeb4f571a55c916fc973",
          "name": "(Credit Q Vashti Clone: Cyber Espionage - Project Helix)",
          "description": "",
          "modified": "2026-04-11T05:42:31.615000",
          "created": "2026-04-11T02:15:16.240000",
          "tags": [
            "foundry",
            "helix",
            "espionage",
            "intel",
            "abuse",
            "tech bro",
            "united",
            "unknown aaaa",
            "unknown ns",
            "search",
            "date",
            "servers",
            "ip address",
            "registrar",
            "encrypt",
            "record value",
            "refresh",
            "denver",
            "ibm",
            "monitored target",
            "dns",
            "network",
            "t1071",
            "protocol",
            "web protocols",
            "t1005",
            "local system",
            "monitored target",
            "project helix",
            "sign",
            "code",
            "github",
            "appearance",
            "github advanced",
            "view",
            "notifications",
            "find",
            "star",
            "project",
            "anything",
            "stars",
            "footer",
            "dynamicloader",
            "show",
            "yara detections",
            "http",
            "port",
            "dynamic",
            "delete",
            "entries",
            "top source",
            "phishing",
            "write",
            "malware infection",
            "tls handshake",
            "failure",
            "default",
            "medium",
            "ptjsw",
            "total",
            "copy",
            "upatre",
            "malware",
            "unknown",
            "windows nt",
            "wow64",
            "write c",
            "suspicious",
            "ukraine domain",
            "double",
            "trojan",
            "yandex.net",
            "behavior_upatre"
          ],
          "references": [
            "Spy.Bancos.OQI Checkin",
            "Double User-Agent (User-Agent User-Agent)",
            "Crowdsourced Research from multiple sources"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "trojandownloader:Win32/Upatre.A",
              "display_name": "trojandownloader:Win32/Upatre.A",
              "target": "/malware/trojandownloader:Win32/Upatre.A"
            },
            {
              "id": "TrojanDownloader:Win32/Tasekjom.A",
              "display_name": "TrojanDownloader:Win32/Tasekjom.A",
              "target": "/malware/TrojanDownloader:Win32/Tasekjom.A"
            }
          ],
          "attack_ids": [
            {
              "id": "T1005",
              "name": "Data from Local System",
              "display_name": "T1005 - Data from Local System"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            }
          ],
          "industries": [
            "Government",
            "Telecommunications",
            "Technology"
          ],
          "TLP": "white",
          "cloned_from": "6851a3a099527852f95f1092",
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1823,
            "hostname": 503,
            "domain": 583,
            "FileHash-SHA1": 154,
            "email": 3,
            "FileHash-SHA256": 695,
            "FileHash-MD5": 156
          },
          "indicator_count": 3917,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 50,
          "modified_text": "8 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69b1f6ccd6f3801af4cf936d",
          "name": "X comm files",
          "description": "",
          "modified": "2026-04-10T23:06:53.889000",
          "created": "2026-03-11T23:12:12.063000",
          "tags": [
            "present mar",
            "united",
            "error",
            "asnone country",
            "backdoor",
            "as54113",
            "as13414 twitter",
            "nxdomain",
            "aaaa",
            "whitelisted",
            "date"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 102,
            "FileHash-SHA1": 117,
            "FileHash-SHA256": 540,
            "hostname": 41,
            "URL": 111,
            "domain": 6,
            "email": 1
          },
          "indicator_count": 918,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "8 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69b1f368db0d00947ef729c2",
          "name": "\u5403\u74dc\u770b\u9ed1\u6599\u5c31\u4e0a - \u9ed1\u6599\u5403\u74dc\u7f51 | \u70ed\u95e8\u4e8b\u4ef6\u7206\u6599\u4e0e\u771f\u76f8",
          "description": "Why is this type of malicious found on a US citizens device? Found in a link extracted from a glitching device.. Palantir\u2019s Prometheus Intelligence Technology tracking and AI at work.\n#tracker #http_redirect #onlyfans_? #bombing #airlines #lalal.ai #openclaw #targeted",
          "modified": "2026-04-10T22:04:28.607000",
          "created": "2026-03-11T22:57:44.584000",
          "tags": [
            "\u9ed1\u6599",
            "\u5403\u74dc",
            "\u5403\u74dc\u7f51",
            "51\u5403\u74dc",
            "\u9ed1\u6599\u4e0d\u6253\u70ca",
            "\u9ed1\u6599\u5403\u74dc\u7f51",
            "\u70ed\u95e8\u5927\u74dc",
            "\u660e\u661f\u8d44\u8baf",
            "\u7f51\u7ea2\u9ed1\u6599",
            "\u5185\u6db5\u6bb5\u5b50",
            "\u4eca\u65e5\u5403\u74dc",
            "\u5403\u74dc\u65b0\u95fb",
            "\u9ed1\u6599\u66dd\u5149",
            "\u516b\u5366\u65b0\u95fb",
            "\u793e\u4f1a\u70ed\u70b9",
            "\u5403\u74dc\u7fa4\u4f17",
            "\u70ed\u70b9\u4e8b\u4ef6",
            "\u6bcf\u65e5\u5403\u74dc",
            "\u7f51\u7ea2\u5403\u74dc",
            "\u4eca\u65e5\u5927\u74dc",
            "\u5403\u74dc\u7206\u6599",
            "\u5403\u74dc\u4e2d\u5fc3",
            "\u4eca\u65e5\u70ed\u74dc",
            "\u5403\u74dc\u9ed1\u6599",
            "\u9ed1\u6599\u6cc4\u5bc6",
            "\u91cd\u78c5\u9ed1\u6599",
            "\u5403\u74dc\u6cc4\u5bc6",
            "\u4eca\u65e5\u9ed1\u6599",
            "\u6700\u65b0\u9ed1\u6599",
            "\u5403\u74dc\u66dd\u5149",
            "\u5403\u74dc\u8d44\u6e90",
            "\u91cd\u78c5\u5403\u74dc",
            "\u5a31\u4e50\u70ed\u74dc",
            "chrome",
            "cos ai",
            "a serif",
            "sans serif",
            "top10",
            "openclaw",
            "21200",
            "onlyfans",
            "strong",
            "dmca copyright",
            "address google",
            "safe browsing",
            "data upload",
            "extraction",
            "lte all",
            "enter sc",
            "type o",
            "extra",
            "referen https",
            "lte o",
            "type",
            "extr data",
            "include review",
            "exclude sugges",
            "failed",
            "hong kong",
            "passive dns",
            "otx logo",
            "all ipv4",
            "url analysis",
            "urls",
            "files",
            "location hong",
            "value",
            "march",
            "0x1595 function",
            "0x19b5 object",
            "tracker",
            "base64 object",
            "cookie function",
            "mlog",
            "localconst",
            "style function",
            "reverse dns",
            "general full",
            "url https",
            "resource",
            "software",
            "hash",
            "security tls",
            "singapore",
            "asn139341",
            "aceasap ace",
            "ip address",
            "cloudflare",
            "report",
            "whois",
            "as13335",
            "name lookup",
            "website",
            "kong",
            "ssl certificate",
            "http",
            "request chain",
            "nl redirected",
            "http redirect",
            "kb script",
            "protocol h3",
            "security quic",
            "seychelles",
            "asn13335",
            "cloudflarenet",
            "js function",
            "portable descr",
            "internet",
            "iana",
            "iana web",
            "stepgo limited",
            "assigned pa",
            "afrinic",
            "filtered parent",
            "ebene",
            "mahe",
            "stepgo",
            "united",
            "unknown ns",
            "script script",
            "moved",
            "record value",
            "title",
            "0 lte",
            "find s",
            "size",
            "mitre att",
            "ck id",
            "ck matrix",
            "root",
            "hybrid",
            "general",
            "path",
            "click",
            "strings",
            "yrbyd",
            "learn",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "spawns",
            "initial access",
            "lalal.ai",
            "record type",
            "ttl value",
            "thumbprint",
            "ios ping",
            "defense evasion",
            "id name",
            "malicious",
            "t1055.015 list planting",
            "sha1",
            "copy md5",
            "sha256",
            "pattern match",
            "show technique",
            "unknown",
            "accept",
            "date",
            "local",
            "starfield",
            "encrypt",
            "iframe",
            "prometheus intelligence technology",
            "apple",
            "cyber attacks",
            "usptracker.com",
            "android"
          ],
          "references": [
            "https://airline.cmntgoyq.com/  | Prometheus Intelligence Technology",
            "lalal.ai",
            "logstream-mystifying-tharp-7si72pw.cribl.cloud",
            "quantum-staging.emsbk.com",
            "spf.google.com",
            "Amazon.com",
            "mc.yandex.com \u2022 mc.yandex.ru \u2022 yandex.com \u2022 yandex.ru",
            "mc.yandex.com/metrika/ \u2022 mc.yandex.com/watch/99885987/",
            "api-cookie.click",
            "delete-me.bgs.beanie.cloud",
            "bridge-websocket-evolosciuc.devint01.goodleap.com",
            "https://bombing.gwuzafo.cc/",
            "test-ssa.pineapples.dev",
            "sso.dev.applemarketingtools.com",
            "containers-oceanus.palantirsec.com",
            "https://otx.alienvault.com/pulse/69af3fd8db2ede31abda6c14",
            "kadmos.bot \u2022 cutout.bot \u2022 scenebot.com",
            "https://www.lalal.ai/privacy-policy/InvalidOutputFolderErrorQAndroidJniObject",
            "Will sort to identify malware",
            "https://hybrid-analysis.com/sample/9e7bfc9fb60aa3e3f3c5b91f84ebf8b07e35893e1491149420535cd494bb8a32/69b1b467625a11ce330587db"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Malware",
              "display_name": "Malware",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1583.001",
              "name": "Domains",
              "display_name": "T1583.001 - Domains"
            },
            {
              "id": "T1566.002",
              "name": "Spearphishing Link",
              "display_name": "T1566.002 - Spearphishing Link"
            },
            {
              "id": "T1553.002",
              "name": "Code Signing",
              "display_name": "T1553.002 - Code Signing"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1048",
              "name": "Exfiltration Over Alternative Protocol",
              "display_name": "T1048 - Exfiltration Over Alternative Protocol"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1562.001",
              "name": "Disable or Modify Tools",
              "display_name": "T1562.001 - Disable or Modify Tools"
            },
            {
              "id": "T1048.003",
              "name": "Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol",
              "display_name": "T1048.003 - Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol"
            },
            {
              "id": "T1584.005",
              "name": "Botnet",
              "display_name": "T1584.005 - Botnet"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4097,
            "domain": 849,
            "hostname": 2440,
            "FileHash-MD5": 149,
            "FileHash-SHA1": 131,
            "FileHash-SHA256": 955,
            "CIDR": 5,
            "email": 6,
            "SSLCertFingerprint": 8
          },
          "indicator_count": 8640,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "8 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69b235439d56630943ea31e6",
          "name": "Clone by Q Vashti (excellent systemic analyzer I may add)",
          "description": "",
          "modified": "2026-04-10T22:04:28.607000",
          "created": "2026-03-12T03:38:43.171000",
          "tags": [
            "\u9ed1\u6599",
            "\u5403\u74dc",
            "\u5403\u74dc\u7f51",
            "51\u5403\u74dc",
            "\u9ed1\u6599\u4e0d\u6253\u70ca",
            "\u9ed1\u6599\u5403\u74dc\u7f51",
            "\u70ed\u95e8\u5927\u74dc",
            "\u660e\u661f\u8d44\u8baf",
            "\u7f51\u7ea2\u9ed1\u6599",
            "\u5185\u6db5\u6bb5\u5b50",
            "\u4eca\u65e5\u5403\u74dc",
            "\u5403\u74dc\u65b0\u95fb",
            "\u9ed1\u6599\u66dd\u5149",
            "\u516b\u5366\u65b0\u95fb",
            "\u793e\u4f1a\u70ed\u70b9",
            "\u5403\u74dc\u7fa4\u4f17",
            "\u70ed\u70b9\u4e8b\u4ef6",
            "\u6bcf\u65e5\u5403\u74dc",
            "\u7f51\u7ea2\u5403\u74dc",
            "\u4eca\u65e5\u5927\u74dc",
            "\u5403\u74dc\u7206\u6599",
            "\u5403\u74dc\u4e2d\u5fc3",
            "\u4eca\u65e5\u70ed\u74dc",
            "\u5403\u74dc\u9ed1\u6599",
            "\u9ed1\u6599\u6cc4\u5bc6",
            "\u91cd\u78c5\u9ed1\u6599",
            "\u5403\u74dc\u6cc4\u5bc6",
            "\u4eca\u65e5\u9ed1\u6599",
            "\u6700\u65b0\u9ed1\u6599",
            "\u5403\u74dc\u66dd\u5149",
            "\u5403\u74dc\u8d44\u6e90",
            "\u91cd\u78c5\u5403\u74dc",
            "\u5a31\u4e50\u70ed\u74dc",
            "chrome",
            "cos ai",
            "a serif",
            "sans serif",
            "top10",
            "openclaw",
            "21200",
            "onlyfans",
            "strong",
            "dmca copyright",
            "address google",
            "safe browsing",
            "data upload",
            "extraction",
            "lte all",
            "enter sc",
            "type o",
            "extra",
            "referen https",
            "lte o",
            "type",
            "extr data",
            "include review",
            "exclude sugges",
            "failed",
            "hong kong",
            "passive dns",
            "otx logo",
            "all ipv4",
            "url analysis",
            "urls",
            "files",
            "location hong",
            "value",
            "march",
            "0x1595 function",
            "0x19b5 object",
            "tracker",
            "base64 object",
            "cookie function",
            "mlog",
            "localconst",
            "style function",
            "reverse dns",
            "general full",
            "url https",
            "resource",
            "software",
            "hash",
            "security tls",
            "singapore",
            "asn139341",
            "aceasap ace",
            "ip address",
            "cloudflare",
            "report",
            "whois",
            "as13335",
            "name lookup",
            "website",
            "kong",
            "ssl certificate",
            "http",
            "request chain",
            "nl redirected",
            "http redirect",
            "kb script",
            "protocol h3",
            "security quic",
            "seychelles",
            "asn13335",
            "cloudflarenet",
            "js function",
            "portable descr",
            "internet",
            "iana",
            "iana web",
            "stepgo limited",
            "assigned pa",
            "afrinic",
            "filtered parent",
            "ebene",
            "mahe",
            "stepgo",
            "united",
            "unknown ns",
            "script script",
            "moved",
            "record value",
            "title",
            "0 lte",
            "find s",
            "size",
            "mitre att",
            "ck id",
            "ck matrix",
            "root",
            "hybrid",
            "general",
            "path",
            "click",
            "strings",
            "yrbyd",
            "learn",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "spawns",
            "initial access",
            "lalal.ai",
            "record type",
            "ttl value",
            "thumbprint",
            "ios ping",
            "defense evasion",
            "id name",
            "malicious",
            "t1055.015 list planting",
            "sha1",
            "copy md5",
            "sha256",
            "pattern match",
            "show technique",
            "unknown",
            "accept",
            "date",
            "local",
            "starfield",
            "encrypt",
            "iframe",
            "prometheus intelligence technology",
            "apple",
            "cyber attacks",
            "usptracker.com",
            "android"
          ],
          "references": [
            "https://airline.cmntgoyq.com/  | Prometheus Intelligence Technology",
            "lalal.ai",
            "logstream-mystifying-tharp-7si72pw.cribl.cloud",
            "quantum-staging.emsbk.com",
            "spf.google.com",
            "Amazon.com",
            "mc.yandex.com \u2022 mc.yandex.ru \u2022 yandex.com \u2022 yandex.ru",
            "mc.yandex.com/metrika/ \u2022 mc.yandex.com/watch/99885987/",
            "api-cookie.click",
            "delete-me.bgs.beanie.cloud",
            "bridge-websocket-evolosciuc.devint01.goodleap.com",
            "https://bombing.gwuzafo.cc/",
            "test-ssa.pineapples.dev",
            "sso.dev.applemarketingtools.com",
            "containers-oceanus.palantirsec.com",
            "https://otx.alienvault.com/pulse/69af3fd8db2ede31abda6c14",
            "kadmos.bot \u2022 cutout.bot \u2022 scenebot.com",
            "https://www.lalal.ai/privacy-policy/InvalidOutputFolderErrorQAndroidJniObject",
            "Will sort to identify malware",
            "https://hybrid-analysis.com/sample/9e7bfc9fb60aa3e3f3c5b91f84ebf8b07e35893e1491149420535cd494bb8a32/69b1b467625a11ce330587db"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Malware",
              "display_name": "Malware",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1583.001",
              "name": "Domains",
              "display_name": "T1583.001 - Domains"
            },
            {
              "id": "T1566.002",
              "name": "Spearphishing Link",
              "display_name": "T1566.002 - Spearphishing Link"
            },
            {
              "id": "T1553.002",
              "name": "Code Signing",
              "display_name": "T1553.002 - Code Signing"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1048",
              "name": "Exfiltration Over Alternative Protocol",
              "display_name": "T1048 - Exfiltration Over Alternative Protocol"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1562.001",
              "name": "Disable or Modify Tools",
              "display_name": "T1562.001 - Disable or Modify Tools"
            },
            {
              "id": "T1048.003",
              "name": "Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol",
              "display_name": "T1048.003 - Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol"
            },
            {
              "id": "T1584.005",
              "name": "Botnet",
              "display_name": "T1584.005 - Botnet"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "69b1f368db0d00947ef729c2",
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4097,
            "domain": 849,
            "hostname": 2440,
            "FileHash-MD5": 149,
            "FileHash-SHA1": 131,
            "FileHash-SHA256": 955,
            "CIDR": 5,
            "email": 6,
            "SSLCertFingerprint": 8
          },
          "indicator_count": 8640,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "8 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69afd95e9073ee0f67be8694",
          "name": "URLSpirit Spyware | Targeted Device attacks | MITM attacks | AI and Browser Attacks",
          "description": "",
          "modified": "2026-04-09T08:02:04.521000",
          "created": "2026-03-10T08:42:06.133000",
          "tags": [
            "msie",
            "chrome",
            "search",
            "united",
            "unknown ns",
            "taiwan unknown",
            "requested range",
            "ip address",
            "taiwan",
            "title",
            "tlsv1",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "stcalifornia",
            "lmountain view",
            "ogoogle llc",
            "unknown",
            "encrypt",
            "malware",
            "suspicious",
            "learn",
            "informative",
            "ck id",
            "name tactics",
            "command",
            "spawns",
            "found",
            "id name",
            "malicious",
            "over",
            "ascii text",
            "pattern match",
            "mitre att",
            "size",
            "null",
            "refresh",
            "span",
            "hybrid",
            "general",
            "local",
            "path",
            "click",
            "strings",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "http",
            "data upload",
            "enter scords",
            "one on",
            "extraction",
            "http request",
            "checkin",
            "observed dns",
            "query",
            "dns query",
            "domain",
            "lila windows",
            "all se",
            "file version",
            "product vers",
            "failed",
            "included ic",
            "review iocs",
            "ic data",
            "status",
            "ch ua",
            "emails",
            "servers",
            "for privacy",
            "record value",
            "trojan",
            "pegasus",
            "body",
            "palantir",
            "se antivirus",
            "ids deted",
            "domains",
            "tachnalnav dan",
            "origin",
            "pe versio",
            "include review",
            "exclude sugges",
            "stop data",
            "q search",
            "product",
            "contact data",
            "contact urlspirit",
            "url http",
            "hostname",
            "url https",
            "stop show",
            "types",
            "type",
            "indicator",
            "defense evasion",
            "sha1",
            "legalcopyngn",
            "copyugnt zur",
            "fileversic data",
            "exclude data",
            "no expiration",
            "ipv4",
            "filehashsha256",
            "filehashsha1",
            "filehashmd5",
            "macintosh",
            "khtml",
            "type indicator",
            "iocs",
            "sc type",
            "hong kong",
            "certificate",
            "enterprise",
            "adversaries",
            "evasion att",
            "urlspirit",
            "targeted att",
            "monitored target",
            "browser attacks",
            "ai chat",
            "next level",
            "quasi",
            "apple",
            "android",
            "windows"
          ],
          "references": [
            "Exploit Source: 210.64.137.210 | IP\u4f4d\u5740\u8cc7\u8a0a\uff08210.64.0.0 tw.ntunhs.net)",
            "https://otx.alienvault.com/indicator/file/8550f80522c90177b58eecc3c31b8e82cfbc0a10283c888a45da497b2b5ddca5",
            "Antivirus Detections: Win.Trojan.Agent-1190546",
            "IDS Detections: URLSpirit Spyware Checkin Observed DNS Query to Suspicious Domain adz2you[.]com",
            "IDS Detections: DNS Query for Suspicious .cf Domain HTTP Request to a *.xyz domain",
            "Alerts: network_icmp persistence_autorun disables_proxy modifies_certificates",
            "Alerts: modifies_proxy_wpad  ransomware_dropped_files ransomware_mass_file_delete",
            "Alerts: dumped_buffer network_cnc_http network_http network_http_post suspicious_tld",
            "Alerts: allocates_rwx antisandbox_foregroundwindows antisandbox_sleep antivm_disk_size",
            "Alerts: origin_langid creates_exe injection_process_search multiple_useragents",
            "Domains Contacted: r4---sn-5goeen7d.googlevideo.com s23.cnzz.com www.youtube.com",
            "Domains Contacted: c.cnzz.com crl.comodoca4.com ocsp2.globalsign.com a.exdynsrv.com",
            "Domains Contacted: www.wanuu2.club xml.admidainsight.com www.gstatic.com .",
            "Indicator deletion during pulse | Requires more research | Positive for MITM attack",
            "IP\u2019s Contacted: 103.23.108.110  103.23.108.112  103.23.108.114  103.23.108.124  103.23.108.140",
            "IP\u2019s Contacted: 103.23.108.184  103.23.108.220  103.23.108.80  103.23.108.92  104.18.20.226",
            "URLSpirit Spyware",
            "Palantir\u2019s PIT - Prometheus Intelligence Technology Damaging Spyware distribution, AI Man in the Middle Attacks",
            "Origin: https://otx.alienvault.com/pulse/69af3fd8db2ede31abda6c14",
            "https://otx.alienvault.com/indicator/file/8550f80522c90177b58eecc3c31b8e82cfbc0a10283c888a45da497b2b5ddca5",
            "https://otx.alienvault.com/otxapi/indicators/file/screenshot/8550f80522c90177b58eecc3c31b8e82cfbc0a10283c888a45da497b2b5ddca5",
            "PE Version Information :  LegalCopyright: Copyright 2012 Spiritsoft All Rights Reserved. InternalName\tjingling.exe",
            "FileVersion: 2013.10.10.100 Company Name: \u7cbe\u7075\u8f6f\u4ef6 Comments: \u6d41\u91cf\u7cbe\u7075(1094) ProductName: \u6d41\u91cf\u7cbe\u7075",
            "Product Version: 4.0.3.1 File Description: \u6d41\u91cf\u7cbe\u7075 Original File name: jingling.exe",
            "023097.palantir.events \u2022 palantir.events \u2022 url3561.palantir.events",
            "13.32.178.127 \u2022 023097.palantir.events \u2022 palantir.events \u2022 Email admin@dnstinations.com",
            "www.palantir.events  \u2022 Email cirt@palantir.com \u2022 0055-b2b-nonprod-bigip1.palantir.events \u2022",
            "151-80-200-88.palantir.events \u2022 196-196-19-74.palantir.events",
            "http://www.net-chinese.com.tw \u2022 pixanalytics.com \u2022 pixnet.cc \u2022 pixnet.tv",
            "quecompegasune.tk \u2022 hipicapegaso.com",
            "This is part of a Prometheus Intelligence Technology (PIT) Palantir Attack",
            "Incredibly false information, white screens , pink screens and chat erasure",
            "Definitely requires further research",
            "Pegasus Indicators deleted during pulse"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Malaysia"
          ],
          "malware_families": [
            {
              "id": "URLSpirit",
              "display_name": "URLSpirit",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1048",
              "name": "Exfiltration Over Alternative Protocol",
              "display_name": "T1048 - Exfiltration Over Alternative Protocol"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1048.003",
              "name": "Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol",
              "display_name": "T1048.003 - Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1456",
              "name": "Drive-by Compromise",
              "display_name": "T1456 - Drive-by Compromise"
            },
            {
              "id": "T1608.004",
              "name": "Drive-by Target",
              "display_name": "T1608.004 - Drive-by Target"
            },
            {
              "id": "T1557",
              "name": "Man-in-the-Middle",
              "display_name": "T1557 - Man-in-the-Middle"
            },
            {
              "id": "T1185",
              "name": "Man in the Browser",
              "display_name": "T1185 - Man in the Browser"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1587.001",
              "name": "Malware",
              "display_name": "T1587.001 - Malware"
            },
            {
              "id": "T1608.001",
              "name": "Upload Malware",
              "display_name": "T1608.001 - Upload Malware"
            },
            {
              "id": "T1598",
              "name": "Phishing for Information",
              "display_name": "T1598 - Phishing for Information"
            },
            {
              "id": "T1428",
              "name": "Exploit Enterprise Resources",
              "display_name": "T1428 - Exploit Enterprise Resources"
            },
            {
              "id": "T1080",
              "name": "Taint Shared Content",
              "display_name": "T1080 - Taint Shared Content"
            }
          ],
          "industries": [
            "Technology",
            "Government",
            "Defense"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 406,
            "FileHash-SHA1": 391,
            "FileHash-SHA256": 5770,
            "URL": 7299,
            "domain": 1307,
            "email": 13,
            "hostname": 2162,
            "CVE": 3,
            "SSLCertFingerprint": 45
          },
          "indicator_count": 17396,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "10 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69d6dbadc9cf047e9718df92",
          "name": "CAPE Sandbox",
          "description": "<full text of the full report on this year's EU Referendum, which will take place on 26 May 2017, has been published on the BBC News website, and will be shown here>",
          "modified": "2026-04-08T22:59:32.559000",
          "created": "2026-04-08T22:50:21.130000",
          "tags": [
            "united",
            "unknown",
            "as13335",
            "aaaa",
            "as397273 render",
            "meta",
            "as62597 nsone",
            "france unknown",
            "date",
            "name servers",
            "cookie",
            "encrypt",
            "vhash",
            "ssdeep",
            "pdf document",
            "magic pdf",
            "trid adobe",
            "format",
            "magika pdf",
            "file size",
            "geofence"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1203",
              "name": "Exploitation for Client Execution",
              "display_name": "T1203 - Exploitation for Client Execution"
            },
            {
              "id": "T1485",
              "name": "Data Destruction",
              "display_name": "T1485 - Data Destruction"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            },
            {
              "id": "T1542",
              "name": "Pre-OS Boot",
              "display_name": "T1542 - Pre-OS Boot"
            },
            {
              "id": "T1564",
              "name": "Hide Artifacts",
              "display_name": "T1564 - Hide Artifacts"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1014",
              "name": "Rootkit",
              "display_name": "T1014 - Rootkit"
            },
            {
              "id": "T1047",
              "name": "Windows Management Instrumentation",
              "display_name": "T1047 - Windows Management Instrumentation"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "IPv4": 69,
            "FileHash-MD5": 357,
            "FileHash-SHA1": 307,
            "IPv6": 10,
            "FileHash-SHA256": 482,
            "hostname": 66,
            "URL": 48,
            "domain": 9,
            "email": 1
          },
          "indicator_count": 1349,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 47,
          "modified_text": "10 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69d68fffbf012630d57033b6",
          "name": "Sabey SWIPPER - Pornhub\u00bbX.Com migration to Twitter | Sabey\u2019s Daddy Data Center ",
          "description": "",
          "modified": "2026-04-08T17:27:27.851000",
          "created": "2026-04-08T17:27:27.851000",
          "tags": [
            "url https",
            "filehashsha256",
            "browse scan",
            "report spam",
            "author",
            "output",
            "tsara brashears",
            "created",
            "days ago",
            "showing",
            "trojan",
            "win32",
            "msil",
            "trojanspy",
            "virtool",
            "scan endpoints",
            "all search",
            "otx scoreblue",
            "author avatar",
            "fraud",
            "june",
            "worm",
            "search",
            "tsara type",
            "indicator role",
            "title added",
            "active related",
            "pulses url",
            "url http",
            "ipv6",
            "type indicator",
            "role title",
            "added active",
            "related pulses",
            "sort",
            "least",
            "researched",
            "f https",
            "scan",
            "iocs",
            "learn more",
            "filehashmd5",
            "hostname",
            "domain",
            "indicators show",
            "browser",
            "unsupported",
            "view",
            "continue",
            "watch tsara",
            "searchtsa",
            "brashears",
            "most relevant",
            "porn videos",
            "download",
            "google search",
            "open threat",
            "babe",
            "green",
            "daily",
            "play",
            "fullscreen",
            "tsara",
            "videos",
            "love",
            "top tsara",
            "xxx videos",
            "hardcore porn",
            "jeffrey reimer",
            "puts",
            "porn",
            "javascript",
            "body",
            "creation date",
            "record value",
            "united",
            "gmt content",
            "gmt max",
            "age900",
            "httponly x",
            "date",
            "unknown",
            "pragma",
            "levelblue",
            "exchange open",
            "threat exchange",
            "indicator",
            "safebae",
            "get involved",
            "anyone else",
            "press",
            "data reports",
            "teen students",
            "become",
            "chapter lead",
            "become a",
            "certified peer",
            "district",
            "brian sabey",
            "sabey data",
            "hallrender",
            "sabey data centers",
            "swipper",
            "mark b sabey",
            "m brian sabey",
            "2beeg",
            "thebrotherssabey",
            "urls",
            "show",
            "cloudflarenet",
            "us urlscan",
            "skip",
            "accessibility",
            "all images",
            "videos shopping",
            "forums news",
            "web more",
            "tools",
            "service",
            "malicious",
            "size",
            "recent",
            "off blur",
            "find",
            "summary",
            "securitytrails",
            "urlscan https",
            "tryporn",
            "icann whois",
            "data problem",
            "disclaimer",
            "judaporn",
            "kompoz",
            "blur filter",
            "search results",
            "xxxvideohd",
            "hacker news",
            "item",
            "url",
            "website",
            "web",
            "scanner",
            "analyze",
            "analyzer",
            "september",
            "domains",
            "sale worldwide",
            "street",
            "gate parkway",
            "stateprovince",
            "postal code",
            "route",
            "open",
            "watch",
            "links",
            "footer",
            "delete see",
            "delete c",
            "tofsee",
            "grum",
            "entries",
            "cape",
            "high",
            "total",
            "copy",
            "write",
            "malware",
            "patched",
            "next",
            "please"
          ],
          "references": [
            "http://hghltd.yandex.net/yandbtm?fmode=inject&url=http://siteinlink.d1.cnbd.net/search/tsara-brashears-assaulted-by-jeffrey-reimer",
            "thebrotherssabey.wordpress.com | https://hallrender.com/attorney/brian-sabey",
            "https://twitter.com/ootiosum/status/1812208222150726029a4dmHAxV0M0QIHawADl4Qr4kDegUI-QEQAA&usg=AOvVaw37yALadqlgoR9_xlQ5B4Hm",
            "https://thebrotherssabey.wordpress.com/wp-admin/customize.php?url=https://thebrotherssabey.wordpress.com/",
            "https://SafeBae.org |  https://www.sweetheartvideo.com/tsara-brashearsAccept-Language",
            "http://sexiezpics.com/tsara-brashears-hardcore-porn | https://www.sweetheartvideo.com/tsara-brashearsAccept-Language",
            "https://urlscan.io/domain/cdn2e-videos2.yjcontentdelivery.com | http://videolal.com/jeffrey-reimer-dpt-assaulted-tsara-brashears-denver.html",
            "https://www.google.com/search?client=ms-android-tcl-rvo2b&sca_esv=677ff2260c38da6a&sca_upv=1&q=tsara%20brashears&tbm=vid&source=lnms&fbs=AEQNm0Aa4sjWe7Rqy32pFwRj0UkWd8nbOJfsBGGB5IQQO6L3J5MIFhvnvU242yFxzEEp3BfRFWcyM5BvpTgNzM3vKj4sz-C2iLdc_0v0iAkScdtYjVPIGyVlvwujMCY6xcQ3LIupWIQPyPPfztGwIqpQ9H2EXqXXY4GBGq8hpekXoFuduDqktZzSriMQxAlKPjQviXaDVnUYcgWw9ejzcyECyIGanCUinw&sa=X&biw=1128&bih=1971&dpr=2&no_sw_cr=1&zx=1724209326040&sssc=1",
            "bfxxxhindi.to | https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://billpay.stcu.org/csp/ws/ALKAMI-S5M/html/PC_Remote_Role_Due_XP_Help/role1_faq_email_notifications.html  billpay.stcu.org",
            "bfxxxhindi.to  www.bfxxxhindi.to  https://www.bfxxxhindi.to   tsara brashears bfxxxhindi.to https://www.bfxxxhindi.to/trend/eaUvPMTg3NzMytY07Q/",
            "http://siteinlink.d1.cnbd.net/search/tsara-brashears-assaulted-by-jeffrey-reimer/",
            "http://siteinlink.d1.cnbd.net/search/tsara-brashears-dead/. http://www.music-forum.org/www-cixiu888-com-tsara-brashears.html",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "http://hghltd.yandex.net/yandbtm?fmode=inject&url=http://siteinlink.d1.cnbd.net/search/tsara-brashears-assaulted-by-jeffrey-reimer",
            "http://alohatube.xyz/search/tsara-brashears  http://alohatube.xyz/search/tsara-brashears/",
            "http://videolal.com/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-massage-sexual-misconduct-miscinception.html",
            "http://videolal.co/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-concentra-medic",
            "http://videolal.co/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-concentra-medical-center",
            "http://videolal.com/jeffrey-reimer-dpt-assaulted-tsara-brashears-denver.html",
            "http://videolal.com/jeffrey-reimer-dpt-assaulted-tsara-brashears-medical.html",
            "http://videolal.com/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-massage-misconduct-miscinception.html",
            "http://videolal.com/tsara-brashears-assaulted-by-jeffrey-reimer.html  http://videolal.com/tsara-brashears-dead-or-alive-song-rap.html",
            "http://videolal.com/tsara-brashears-pueblo.html , http://videolal.com/tsara-brashears.html",
            "http://pornbitter.com/storage/tsara-brashears/  http://www.gdsl-pallemoebler.info/seach/tsara-brashears/ advocate-smyslova.ru",
            "http://browntubeporn.com/tsara-brashears.html  browntubeporn.com  http://pornvideoj.com/tsara-brashears.htm",
            "pornhub.com/gay/video/search?search=tsara%2Blynn%2Bbrashears%2Blesbian",
            "feestzalenvanvlaanderen.be  www.gdsl-pallemoebler.info  http://anybunny.tv/search/tsara-brashears-submission-on-august-27-via-manual.html&us",
            "http://anybunny.tv/search/tsara-brashears-submission-on-august-27-via-manual.html&us  www.tryporn.net",
            "http://www.gdsl-pallemoebler.info/seach/tsara-brashears/ advocate-smyslova.ru  feestzalenvanvlaanderen.be www.gdsl-pallemoebler.info",
            "http://www.tryporn.net/seach/tsara-brashears/  hicksandchicks.org redpornvideos.net   http://advocate-smyslova.ru/tsara-brashears/",
            "http://flexporn.net/tsara-brashears.html  http://onlyindianporn.net/videos/tsara-brashears/  http://pornbitter.com/storage/tsara-brashears/",
            "http://pornpx.com/trends/tsara-brashears-submission-on-august-27-via-manual/1/ http://www.potnhub.org/tsara-brashears.html",
            "http://www.bukaporn.net/trend/tsara-brashears/  http://onlyindianporn.tv/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-concentra",
            "http://www.sexpornimages.com/tsara/tsara-lynn-brashears-porn/7x56y.html",
            "www.sexpornimages.com http://hicksandchicks.org/ju/tsara-brashears/  hlebo.mobi  pornpx.com  www.potnhub.org",
            "http://wapwon.live/category/tsara-brashears-assaulted-by-jeffrey-reimerAccept-Language  http://www.music-forum.",
            "http://kompoz.me/find/tsara-brashears-submission-on-august-27-via-manual/  http://redpornvideos.net/tsara-brashears.html",
            "https://wallpapers-nature.com/  https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
            "https://wallpapers-nature.com/tsara-brashears/urlscan-io   https://www.sweetheartvideo.com/tsara-brashears",
            "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net  https://www.sweetheartvideo.com/tsara-brashears/",
            "https://www.sweetheartvideo.com/tsara-brashears/ | https://www.sweetheartvideo.com/tsara-brashearsAccept-Language",
            "https://www.sweetheartvideo.com/tsara-brashearsAccept-Language | https://wallpapers-nature.com/tsara-brashears/urlscan-io",
            "http://hghltd.yandex.net/yandbtm?fmode=inject&url=http://siteinlink.d1.cnbd.net/search/tsara-brashears-assaulted-by-jeffrey-reimer",
            "https://xlxx.mobi phishing\thttps://2beeg.me   https://2beeg.net  https://www.redporn.video   https://youjizz.sex  2beeg.me xlxx.mobi ladys.one",
            "tsara-brashears-deadspin-twitter-suspended-account-help.ht  videolal.com  wallpapers-nature.com   www.sweetheartvideo.com",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/  Domain mom2fuck.mobi   https://youjizz.sex/tsara-brashears.html   https://youjizz.sex",
            "http://amp.mypornvid.fun/videos/2/SLFGMWoQaCU/white-dpt-jeffrey-reimer-loves-pretty-indian-patient-forces-sex-3gp-video-tsara-brashears",
            "http://pixelrz.com/lists/keywords/tsara-brashears-assaulted-by-jeffrey-reimer  http://pixelrz.com/lists/keywords/brashears-tsara-buzz-news",
            "http://pixelrz.com/lists/keywords/%20dr-jeffrey-reimer-dpt-funds-tsara-brashears/ https://xlxx.mobi",
            "http://pixelrz.com/lists/keywords/dr-jeffrey-reimer-dpt-funds-tsara-brashears/  orangeporntube.net   www.tryporno.net",
            "http://pixelrz.com/lists/keywords/tsara-brashears-massage-misconduct-misconception  http://pixelrz.com/lists/keywords/tsara-brashears-dead/  http://orangeporntube.net/tsara-brashears.html",
            "http://www.tryporno.net/movies/tsara-brashears/  http://www.pixelrz.com/lists/keywords/tsara-brashears/",
            "https://kompoz.me/find/tsara-brashears-submission-on-august-27-via-manual/  sexiezpics.com",
            "http://sexiezpics.com/tsara-brashears-hardcore-porn http://mypornvid.com/videos/27/x510fb2/white-dpt-jeffrey-reimer-loves-pretty-indian-patient-forces-sex-3gp-video-tsara-brashears/caillou-finger-family",
            "http://pixelrz.com/lists/keywords/tsara-brashears-assaulted-at-concentra/   http://pornohata.com/mov/tsara-brashears/",
            "http://onlyindianporn2.com/videos/tsara-brashears/   onlyindianporn2.com-porn.html   aninditaannisa.blogspot.com   porno-trash.net",
            "myhotzpic.com  pornohata.com pornstarsporno.net aninditaannisa.blogspot.com/2019/02/tsara-brashears",
            "http://pornstarsporno.net/tsara-brashears.html  http://vtwctr.org/explore/inmate-tsara-brashears/",
            "https://videolal.co/videos/jeffrey-reimer-dpt-assaulted-tsara%20-brashears-massage-nearby.html",
            "Hostname aninditaannisa.blogspot.com No Expiration\t0\t  URL aninditaannisa.blogspot.com/2019/02/tsara-brashears-porn.html  billpay.stcu.org",
            "http://hghltd.yandex.net/yandbtm?fmode=inject&url=http://siteinlink.d1.cnbd.net/search/tsara-brashears-assaulted-by-jeffrey-reimer",
            "https://thebrotherssabey.wordpress.com/wp-admin/customize.php?url=https://thebrotherssabey.wordpress.com/",
            "thebrotherssabey.wordpress.com http://www.sabey.com | http://resources.sabeydatacenters.com | http://root.sabeydatacenters.com",
            "http://go.sabey.com http://vpn2.sabey.com | http://resources.sabeydatacenters.com | http://root.sabeydatacenters.com |",
            "http://itsupport.sabey.com http://www.sabey.com | http://root.sabeydatacenters.com/ | http://server1.sabeydatacenters.com | http://smtp1.sabeydatacenters.com No Expiration\t http://smtps.sabeydatacenters.com | http://smtpseguro.sabeydatacenters.com",
            "http://sabey.com/construction/ | https://tulach.cc/ | sabeydatacenters.com | https://thebrotherssabey.com | http://root.sabeydatacenters.com/ No Expiration\t0\t  URL http://server1.sabeydatacenters.com No Expiration\t0\t  URL http://smtp1.sabeydatacenters.com No Expiration\t http://smtps.sabeydatacenters.com | http://smtpseguro.sabeydatacenters.com | http://staging.sabeydatacenters.com",
            "https://info.sabeydatacenters.com/webmail/404532/1590752290/6c9ed1e0b6b364689835e8c6bd51ed2198f99ee8ec7fa1924787e4e9b6382872",
            "forceusercontent.com | sabey.com | tulach.cc | http://thebrotherssabey.com/2018m.sabeydatacenters.com | https://www.vpn.sabey.com/",
            "root.sabeydatacenters.com | server1.sabeydatacenters.com | smtps.sabeydatacenters.com | smtpseguro.sabeydatacenters.com",
            "https://thebrotherssabey.com | https://thebrotherssabey.com/2015/08/24/why | staging.sabeydatacenters.com |",
            "authsmtp.sabeydatacenters.com | go.sabey.com | thebrotherssabey.com | mx5.sabeydatacenters.com | posta.sabeydatacenters.com",
            "remote.files.downloadnow-1.com | remote.sabeydatacenters.com | poczta.sabeydatacenters.com | pop.sabeydatacenters.com",
            "https://thebrotherssabey.com/2018/12/05/nature | https://thebrotherssabey.com/2019/01/20/miracle/ | https://thebrotherssabey.com/20",
            "https://thebrotherssabey.com/2015/08/24/why  | https://thebrotherssabey.com/2016/03/12/how | https://thebrotherssabey.com/2017/04/17/truth",
            "https://thebrotherssabey.com/2016/01/18/ballroom | resources.sabeydatacenters.com | https://thebrotherssabey.com/feed/",
            "https://thebrotherssabey.com/comments/feed/ | mail2.sabeydatacenters.com | mails.sabeydatacenters.com | newmail.sabeydatacenters.com",
            "http://staging.sabeydatacenters.com | https://sabey.com/careers/ | https://vpn2.sabey.com | https://www.sabey.com | https://www.vpn.sabey.com |",
            "https://info.sabeydatacenters.com/emailPreference/epc/404532/EcSDdxFsTp4vgdAzwbcD5rWn7oROwp5s8Buq0L48dF0/732bdcab2311714bb73d4d507e6508d215afb4dbc511",
            "1a8fc49a4265fe146976/1523680312 |  https://thebrotherssabey.com/2018/04/22/the  |  https://thebrotherssabey.com/2019/07/08/suffering",
            "https://info.sabeydatacenters.com/listUnsubscribeHeader/u/404532/732bdcab2311714bb73d4d507e6508d215afb4dbc5111a8fc49a4265fe14697",
            "https://info.sabeydatacenters.com/r/404532/1/1523680312/open/1 | http://onlyindianporn2.com/videos/dia-sabey/?p=13",
            "https://thebrotherssabey.com/category/pregnancy | https://thebrotherssabey.com/discourse | onlyindianporn2.com",
            "https://thebrotherssabey.com/2019/01/20/miracle/?share=twitter | https://thebrotherssabey.com/author/dbsabey/",
            "https://thebrotherssabey.com/author/thebrotherssabey/ | https://thebrotherssabey.com/category/homosexuality",
            "https://thebrotherssabey.com/2018/12/05/nature-of-scripture-part-5-conclusions/ | https://thebrotherssabey.com/2019/08/01/why",
            "mypornvid.fun | porn100.tv | amp.mypornvid.fun | cdn10.mypornvid.fun | cdn11.mypornvid.fun | cdn5.mypornvid.fun | cdn8.mypornvid.fun",
            "www.anyxxxtube.net | sv2.mypornvid.fun | www.porn100.tv | www.redporn.video | https://www.anyxxxtube.net/search-porn/tsara-brashears/ phishing |",
            "http://amp.mypornvid.fun/videos/2/SLFGMWoQaCU/white-dpt-jeffrey-reimer-loves-pretty-indian-patient-forces-sex-3gp-video-tsara-brashears",
            "anybunny.tv | http://anybunny.tv/search/eva-lisa | http://anybunny.tv/search/tsara-brashears-submission-on-august-27-via-manual.html&us",
            "https://videolal.co/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-massage-nearby.html. |",
            "http://onlyindianporn.tv/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-concent | http://wapwon.live/category/tsara-brashears-assaulted-by-jeffrey-reimerAccept-Languauge",
            "onlyindianporn.tv | sexpornimages.com | http://www.sexpornimages.com/hillary/hillary-clinton",
            "https://mypornvid.fun/videos/3/o00vnGgcVx0/dude-sex-fuck-a-deer-wapporn-video-com/fuck-deer",
            "http://www.sexpornimages.com/tsara/tsara-lynn-brashears-porn/7x56y.html",
            "http://siteinlink.d1.cnbd.net/search/tsara-brashears-dead/ | http://videolal.com/tsara-brashears-dead-by-daylight.html",
            "http://videolal.com/tsara-brashears-dead-or-alive-song-rap.html | http://videolal.com/tsara-brashears-dead.html |",
            "https://thebrotherssabey.com/comments/feed/ | https://thebrotherssabey.com/2019/01/20/miracle/",
            "https://videolal.com/videos/tsara-brashears-dead-by-daylight.html | tsara-brashears-deadspin-twitter-suspended-account-help.ht",
            "https://thebrotherssabey.com/2018/12/05/nature | https://thebrotherssabey.com/2017/04/17/truth",
            "https://thebrotherssabey.com/2016/03/12/how | https://thebrotherssabey.com/2016/01/18/ballroom",
            "https://thebrotherssabey.com/comments/feed/ | https://thebrotherssabey.com/category/pregnancy",
            "https://thebrotherssabey.com/feed/ | https://thebrotherssabey.com/discourse | https://thebrotherssabey.com/comments/feed/",
            "https://thebrotherssabey.com/2015/08/24/why | https://thebrotherssabey.com/20 | https://thebrotherssabey.com | https://thebrotherssabey.com",
            "http://thebrotherssabey.com/2018 | https://thebrotherssabey.com/2019/01/20/miracle/ | https://thebrotherssabey.com/2019/07/08/suffering",
            "https://thebrotherssabey.com/category/pregnancy | https://thebrotherssabey.com/category/homosexuality",
            "https://thebrotherssabey.com/author/thebrotherssabey/  | https://thebrotherssabey.com/author/dbsabey/",
            "http://siteinlink.d1.cnbd.net/site/maps.google.com.lb/ | https://www.applefilmaker.com | https://www.applefilmaker.com/1odbU3D",
            "www.wwwgitlab.gitlab.git.git.gitlab.git.128-199-7-137.cprapid.com",
            "https://thebrotherssabey.wordpress.com/wp-admin/customize.php?url=https://thebrotherssabey.wordpress.com/",
            "https://hallrender.com/attorney/brian-sabey | https://thebrotherssabey.com/2019/01/20/miracle/?share=twitter",
            "storage.ladys.one ladys.one: | http://photos.ladys.one ladys.one: | http://porno.ladys.one ladys.one: | http://storage.ladys.one ladys.one: | http://xxx-videos.ladys.one ladys.one:",
            "http://www.xvxx.me/clips/nadia-ali-hardcore/199530/",
            "https://kompoz2.com/tv/454575/blonde-slut-sara-jay-with-big-ass-is-fucked-in-doggy-style.html",
            "http://onlyindianporn2.com/videos/vichatter-young-11//title/0.7292669771257236"
          ],
          "public": 1,
          "adversary": "Brian Sabey | Tulach | Sabey Data Centers",
          "targeted_countries": [
            "United States of America",
            "Netherlands",
            "United Kingdom of Great Britain and Northern Ireland"
          ],
          "malware_families": [
            {
              "id": "Win32/Tofsee.AX",
              "display_name": "Win32/Tofsee.AX",
              "target": null
            },
            {
              "id": "Trojan:Win32/Muldrop",
              "display_name": "Trojan:Win32/Muldrop",
              "target": "/malware/Trojan:Win32/Muldrop"
            }
          ],
          "attack_ids": [
            {
              "id": "T1125",
              "name": "Video Capture",
              "display_name": "T1125 - Video Capture"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1190",
              "name": "Exploit Public-Facing Application",
              "display_name": "T1190 - Exploit Public-Facing Application"
            },
            {
              "id": "T1472",
              "name": "Generate Fraudulent Advertising Revenue",
              "display_name": "T1472 - Generate Fraudulent Advertising Revenue"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1586.001",
              "name": "Social Media Accounts",
              "display_name": "T1586.001 - Social Media Accounts"
            },
            {
              "id": "T1055.013",
              "name": "Process Doppelg\u00e4nging",
              "display_name": "T1055.013 - Process Doppelg\u00e4nging"
            },
            {
              "id": "T1080",
              "name": "Taint Shared Content",
              "display_name": "T1080 - Taint Shared Content"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "69bea426487bffa5384c6f38",
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 121,
            "FileHash-SHA1": 116,
            "FileHash-SHA256": 443,
            "URL": 1878,
            "domain": 312,
            "hostname": 518,
            "email": 5,
            "CIDR": 1,
            "SSLCertFingerprint": 1
          },
          "indicator_count": 3395,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "10 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69d653b6e87c5b1f56db3158",
          "name": "InstallMonstr | Emotet affecting HCA | PHI | PII | Technologies [ScoreBlue]",
          "description": "",
          "modified": "2026-04-08T13:15:16.580000",
          "created": "2026-04-08T13:10:14.081000",
          "tags": [
            "historical ssl",
            "threat roundup",
            "october",
            "september",
            "referrer",
            "december",
            "apple",
            "apple ios",
            "sqli dumper",
            "formbook",
            "raspberry robin",
            "redline stealer",
            "hacktool",
            "metro",
            "core",
            "life",
            "awful",
            "darkgate",
            "snatch",
            "ransomware",
            "review",
            "analyzer paste",
            "iocs",
            "urls https",
            "samples",
            "no data",
            "tag count",
            "analyzer threat",
            "url summary",
            "ip summary",
            "summary",
            "sample",
            "detection list",
            "cyber threat",
            "united",
            "engineering",
            "malicious",
            "phishing",
            "bambernek",
            "hostname",
            "team phishing",
            "covid19",
            "malware",
            "download",
            "suppobox",
            "emotet",
            "team",
            "facebook",
            "plasma",
            "kraken",
            "downloader",
            "cisco umbrella",
            "site",
            "alexa top",
            "safe site",
            "malware site",
            "malicious site",
            "malicious url",
            "million",
            "blacklist https",
            "installcore",
            "blacklist",
            "hostnames",
            "urls http",
            "cnc server",
            "cnc feodo",
            "tracker",
            "cronup threat",
            "threats et",
            "emotet ip",
            "blocklist",
            "coalition et",
            "feodo",
            "generic",
            "dridex",
            "team top",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "b body",
            "sha256",
            "headers date",
            "gmt server",
            "sale",
            "html info",
            "title",
            "meta tags",
            "usd twitter",
            "utc google",
            "tag manager",
            "utc gtmsxrf",
            "html",
            "dan.com",
            "my boy dan",
            "dark consultants",
            "brent kimball",
            "kb body",
            "headers",
            "expires thu",
            "please",
            "show",
            "medium",
            "search",
            "service",
            "open",
            "centerchecks",
            "copy",
            "post http",
            "memcommit",
            "trojan",
            "write",
            "win32",
            "erase",
            "find",
            "close",
            "scan endpoints",
            "all scoreblue",
            "alf features",
            "related pulses",
            "file samples",
            "files matching",
            "date hash",
            "showing",
            "next",
            "aaaa",
            "asnone united",
            "a domains",
            "script urls",
            "passive dns",
            "entries",
            "body doctype",
            "date",
            "unknown",
            "title error",
            "ipv4",
            "pulse submit",
            "url analysis",
            "urls",
            "yara rule",
            "t1063",
            "high",
            "high security",
            "discovery",
            "etpro malware",
            "tls sni",
            "guard",
            "tsara brashears",
            "delete",
            "post",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "findwindowa",
            "ollydbg",
            "regsetvalueexa",
            "regdword",
            "high process",
            "x8bxe5",
            "regbinary",
            "injection t1055",
            "august",
            "internal",
            "best targets",
            "sites",
            "manjusaka",
            "china",
            "high level",
            "hackers",
            "june",
            "mail spammer",
            "zeus",
            "telefonica co",
            "proxy",
            "nanocore rat",
            "stealer",
            "pony",
            "betabot",
            "asyncrat",
            "blacklist http",
            "alexa",
            "bank",
            "fuery",
            "zbot",
            "pe32",
            "intel",
            "ms windows",
            "ms visual",
            "win16 ne",
            "pe32 compiler",
            "exe32",
            "compiler",
            "linker",
            "gui32",
            "vs2003",
            "info compiler",
            "products id",
            "header intel",
            "name md5",
            "contained",
            "type",
            "language",
            "overlay",
            "flow t1574",
            "dll sideloading",
            "create",
            "modify system",
            "process t1543",
            "windows service",
            "stop service",
            "start service",
            "boot",
            "logon autostart",
            "get http",
            "request",
            "host",
            "memory pattern",
            "cus cnmicrosoft",
            "azure tls",
            "issuing ca",
            "http requests",
            "connect azurepc",
            "dns resolutions",
            "evil",
            "samplepath",
            "classname",
            "created",
            "shell commands",
            "evil c",
            "user",
            "shelltraywnd",
            "pcidump rasman",
            "processes tree",
            "registry keys",
            "hashes",
            "apple notepad",
            "cyberstalking",
            "highly targeted",
            "cyber attack",
            "spotify artist",
            "gamers",
            "critical risk",
            "remote system",
            "cobalt strike",
            "mon jul",
            "fakedout threat",
            "maltiverse",
            "adware",
            "drivertalent",
            "fusioncore",
            "riskware",
            "pdf document",
            "adobe portable",
            "document format",
            "history",
            "oc0008",
            "catalog tree",
            "ob0005 defense",
            "evasion ob0006",
            "hide artifacts",
            "e1564 discovery",
            "ob0007 system",
            "e1082 impact",
            "e1203 data",
            "exploitation",
            "ob0012 hide",
            "adversaries",
            "spawns",
            "sandbox",
            "mitre att",
            "access ta0001",
            "t1189 found",
            "ta0004 process",
            "defense evasion",
            "connection",
            "accept",
            "response",
            "win64",
            "khtml",
            "gecko",
            "date mon",
            "pragma",
            "dangeroussig",
            "heur",
            "phishing site",
            "dos com",
            "javascript",
            "files",
            "file type",
            "web open",
            "font format",
            "sneaky server",
            "replacement",
            "unauthorized",
            "mr windows",
            "url https",
            "steganography",
            "clickjacking",
            "amazon 02",
            "tmobile",
            "executable",
            "basic",
            "os2 executable",
            "clipper dos",
            "generic windos",
            "pe32 packer",
            "info header",
            "win32 exe",
            "ip detections",
            "country",
            "contacted",
            "phishtank",
            "services",
            "http attacker",
            "hitmen",
            "murderers",
            "redrum",
            "brian sabey",
            "workers compensation",
            "aig",
            "industry_and_commerce",
            "quasi"
          ],
          "references": [
            "https://darkconsultants.com/brent-kimball",
            "HCA | https://www.healthonecares.com/physicians/profile/Dr-Brent-Y-Kimball-MD | Neurosurgeons state failed surgery performed on target/others",
            "Matches rule User with Privileges Logon by frack113",
            "Emotet - CnC IP's: 104.131.58.132 | 14.160.93.230 | 163.172.40.218 | 186.15.83.52  | 190.17.42.79 | 72.29.55.174 | 82.8.232.51  91.204.163.19 command_and_control",
            "Emotet: FileHash-MD5  dc8a506286ad0664872a52ce9ce2434f",
            "Emotet: FileHash-SHA1  00533ac38b0b61ad6bd8c821337b9d2e6cc97a55",
            "Emotet: FileHash-SHA256  0b0cc210943913d7afcbc007c3d0eb3ead6b8bedcaae2c3104a20eb872527127",
            "Antivirus Detections: Win32:Malware-gen , Win.Malware.Generic-7430042-0 , Trojan:Win32/Emotet!MTB",
            "Alerts: dead_host nolookup_communication persistence_autorun removes_zoneid_ads dumped_buffer",
            "Alerts: network_cnc_http network_http_post allocates_rwx antisandbox_foregroundwindows",
            "Alerts: creates_service network_http antivm_queries_computername moves_self packer_entropy",
            "Install: https://otx.alienvault.com/otxapi/indicators/file/screenshot/669a87ee497aefdbeedfff72455a32511c458714fc6d6817efb7ad792095606e",
            "Win32:InstallMonstr-MA: FileHash-MD5 70007c3aedf9f1685d266a67cfed80af",
            "Win32:InstallMonstr-MA: FileHash-SHA1 132cc254607c3669afe70e7af773672178823682",
            "Win32:InstallMonstr-MA: FileHash-SHA256 e9b66a63d6ab467c32b1162fc1c72acc26835de0d79ae3d45a0420c399e39f1f",
            "Backdoor:Win32/Simda.gen!B: FileHash-MD5 fd9849e8e0b6234ea49551d73b2cb8fe",
            "Backdoor:Win32/Simda.gen!B: FileHash-SHA1 fcfcab8f821af9858b78b670d837b09b0b120f3a",
            "Backdoor:Win32/Simda.gen!B: FileHash-SHA256 fc9ef718314979909ec27998697e32731d551e2b1b713b5e39e60c1ea60af1ef",
            "Antivirus Detections: Win32:Shiz-JT\\ [Trj] ,\u00a0Win.Trojan.Generic-6323528-0 ,\u00a0Backdoor:Win32/Simda.gen!B",
            "IDS Detections: Wapack Labs Sinkhole DNS Reply Backdoor.Win32.Shiz.ivr Checkin Backdoor.Win32/Simda.gen!A Checkin Unsupported/Fake Internet Explorer Version MSIE 2. Unsupported/Fake Windows NT Version 5.0 More Yara Detections stack_string ,\u00a0 dbgdetect_procs",
            "Alerts: network_icmp dumped_buffer2 allocates_execute_remote_process antiav_detectfile antidbg_windows antivm_generic_bios",
            "Alerts: dead_host persistence_autorun disables_proxy injection_createremotethread injection_modifies_memory injection_write_memory",
            "Alerts: modifies_proxy_wpad multiple_useragents packer_polymorphic process_interest ransomware_mass_file_delete",
            "Suspicious Manipulation Of Default Accounts Detects suspicious manipulations of default accounts such as 'administrator' and 'guest'. For example 'enable' or 'disable' accounts or change the password...etc Sigma Integrated Rule Set (GitHub) - Nasreddine Bencherchali (Nextron Systems)",
            "CS Sigma rules: Matches rule Suspicious Manipulation Of Default Accounts by Nasreddine Bencherchali (Nextron Systems)",
            "IDS Detections: Matches rule MALWARE-CNC Win.Trojan.Scudy outbound connection",
            "roblox-hack-tool-jailbreak_GM431946152.pdf",
            "Matches rule Suspicious Eventlog Clear or Configuration Using Wevtutil by Ecco, Daniil Yugoslavskiy, oscd.community",
            "Matches rule COM Hijacking For Persistence With Suspicious Locations by Nasreddine Bencherchali",
            "http://connectivitycheck.gstatic.com/generate_204",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian | www.pornhub.com",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ | www.anyxxxtube.net",
            "hannahseenan.pornsextape.com",
            "https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowledgement+PD-MB&utm_term=",
            "Apple 'that's my boy' Dan: https://cdn1.dan.com/assets/icons/touch",
            "FileHash-SHA256: cef164b4d6d29e1bff2bad9e49abaf143593a07d8a6e584f472b545b9e0c5631",
            "FileHash-SHA256: 7e9822ba1e8fa34ce37262f6746dbc72819d754f805a410dbeb2cedb08a05789",
            "FileHash-SHA256: cef164b4d6d29e1bff2bad9e49abaf143593a07d8a6e584f472b545b9e0c5631",
            "Tulach: 114.114.114.114",
            "kaiser-friedrich-halle.de | kurma.hosting-mexico.net"
          ],
          "public": 1,
          "adversary": "State of Colorado",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Trojan:Win32/Emotet!MTB",
              "display_name": "Trojan:Win32/Emotet!MTB",
              "target": "/malware/Trojan:Win32/Emotet!MTB"
            },
            {
              "id": "ALF:HeraklezEval:PUA:Win32/InstallMonstr",
              "display_name": "ALF:HeraklezEval:PUA:Win32/InstallMonstr",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Simda.gen!B",
              "display_name": "Backdoor:Win32/Simda.gen!B",
              "target": "/malware/Backdoor:Win32/Simda.gen!B"
            },
            {
              "id": "Trojan.Scar.lzt",
              "display_name": "Trojan.Scar.lzt",
              "target": null
            },
            {
              "id": "Trojan.Click1.19227",
              "display_name": "Trojan.Click1.19227",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "phishing.phishinggame",
              "display_name": "phishing.phishinggame",
              "target": null
            },
            {
              "id": "Tulach Malware",
              "display_name": "Tulach Malware",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1096",
              "name": "NTFS File Attributes",
              "display_name": "T1096 - NTFS File Attributes"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1222",
              "name": "File and Directory Permissions Modification",
              "display_name": "T1222 - File and Directory Permissions Modification"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1543",
              "name": "Create or Modify System Process",
              "display_name": "T1543 - Create or Modify System Process"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            },
            {
              "id": "T1564",
              "name": "Hide Artifacts",
              "display_name": "T1564 - Hide Artifacts"
            },
            {
              "id": "T1569",
              "name": "System Services",
              "display_name": "T1569 - System Services"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            },
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            },
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1005",
              "name": "Data from Local System",
              "display_name": "T1005 - Data from Local System"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1189",
              "name": "Drive-by Compromise",
              "display_name": "T1189 - Drive-by Compromise"
            },
            {
              "id": "T1203",
              "name": "Exploitation for Client Execution",
              "display_name": "T1203 - Exploitation for Client Execution"
            },
            {
              "id": "T1485",
              "name": "Data Destruction",
              "display_name": "T1485 - Data Destruction"
            },
            {
              "id": "T1552",
              "name": "Unsecured Credentials",
              "display_name": "T1552 - Unsecured Credentials"
            },
            {
              "id": "T1555",
              "name": "Credentials from Password Stores",
              "display_name": "T1555 - Credentials from Password Stores"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            }
          ],
          "industries": [
            "Healthcare",
            "Technology",
            "Telecommunications",
            "Civilian Society"
          ],
          "TLP": "green",
          "cloned_from": "66c1d668b2adcc909d7608bf",
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 3660,
            "FileHash-SHA1": 2288,
            "FileHash-SHA256": 4720,
            "CVE": 8,
            "URL": 896,
            "domain": 338,
            "hostname": 839,
            "IPv4": 10
          },
          "indicator_count": 12759,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 141,
          "modified_text": "10 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69aeda93ec05fb8653adca6d",
          "name": "clone of my pulse. this dmv kit pdfkit.net used the same off logo kit it was one of the few i found in their fcc application   . rpi&macids look for",
          "description": "",
          "modified": "2026-04-08T00:00:45.252000",
          "created": "2026-03-09T14:34:59.072000",
          "tags": [
            "pfft.net"
          ],
          "references": [
            ""
          ],
          "public": 1,
          "adversary": "pi, pdfkit.net",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": "698c75717175e2cc7ff33df2",
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 551,
            "domain": 638,
            "CVE": 114,
            "hostname": 449,
            "email": 28,
            "FileHash-MD5": 145,
            "FileHash-SHA1": 188,
            "FileHash-SHA256": 132,
            "Mutex": 1
          },
          "indicator_count": 2246,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 50,
          "modified_text": "11 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69d586108786e7be59439809",
          "name": "Bot.io",
          "description": "",
          "modified": "2026-04-07T22:32:48.996000",
          "created": "2026-04-07T22:32:48.996000",
          "tags": [
            "added active",
            "related pulses",
            "found",
            "zergeca botnet",
            "zergeca",
            "upx packer",
            "khtml",
            "gecko",
            "united",
            "ids detections",
            "yara detections",
            "https domain",
            "tls sni",
            "ip lookup",
            "external ip",
            "malware",
            "encrypt",
            "techniques",
            "modify system",
            "process",
            "https",
            "performs dns",
            "tls version",
            "reads cpu",
            "proc indicative",
            "urls",
            "downloads",
            "persistence",
            "data upload",
            "extraction",
            "find s",
            "failed",
            "typ don",
            "ipv4 url",
            "canreb",
            "type ipv4",
            "url domail",
            "domail showing",
            "elf conta",
            "typ url",
            "zercega",
            "enter sc",
            "type",
            "include",
            "review",
            "n1 exclude",
            "suggestedincc",
            "a50 typ",
            "ipv4",
            "matches yara",
            "dete data",
            "yara detectea",
            "cro intormation",
            "exclude sugges",
            "sc car",
            "extra lte",
            "referen",
            "l extraction",
            "droo anv",
            "extr referen",
            "lte all",
            "je matches",
            "yara detel",
            "yara dete",
            "include review",
            "exchange lte",
            "je elf",
            "passive dns",
            "certificate",
            "files",
            "trojan",
            "related tags",
            "worm",
            "medium",
            "write c",
            "write",
            "high",
            "binary",
            "yara rule",
            "default",
            "moved",
            "schaan",
            "as834 ipxo",
            "dynamicloader",
            "program",
            "ee fc",
            "users",
            "ff d5",
            "python",
            "windows",
            "autoit",
            "confuserex",
            "stream",
            "guard",
            "launcher",
            "updater",
            "global",
            "america flag",
            "ashburn",
            "america related",
            "tags",
            "indicator facts",
            "historical otx",
            "controller fake",
            "akamai rank",
            "russia",
            "present nov",
            "aaaa",
            "link",
            "a domains",
            "ip address",
            "meta",
            "cve -2014-2321",
            "handle",
            "address range",
            "cidr",
            "network name",
            "allocation type",
            "pa status",
            "whois server",
            "included iocs",
            "manually add",
            "iocs o",
            "iocs",
            "sugges",
            "stop show",
            "types",
            "external",
            "ripe",
            "pa abusec",
            "neterra",
            "sofia",
            "bulgaria phone",
            "filtered person",
            "neven dilkov",
            "bg phone",
            "filtered route",
            "a5ip",
            "aa2023",
            "aamirai",
            "a2scanner",
            "apple inc",
            "issuer",
            "valid",
            "algorit",
            "thum",
            "name",
            "a9 a8",
            "status",
            "macho",
            "macho 64bit",
            "mac os",
            "x macho",
            "intel",
            "typ no",
            "td td",
            "td tr",
            "a td",
            "dynamic dns",
            "date",
            "name servers",
            "arial",
            "error",
            "null",
            "enough",
            "hosts",
            "win32",
            "fast",
            "contacted",
            "MacSync_AppleScript_Stealer",
            "cve-2018-10562",
            "source",
            "roboto",
            "robotodraft",
            "helvetica",
            "iframe",
            "manually ada",
            "review iocs",
            "abv0",
            "qaeaav0",
            "cptbdev",
            "w4uninitialized",
            "qaeaav01",
            "abv01",
            "qaexn",
            "qbenxz",
            "phoneidentify",
            "qbepaxxz"
          ],
          "references": [
            "https://apple.k8s.joewa.com/\u2022 https://com.apple \u2022 freedns.afraid.org",
            "IPv4 188.114.96.1 In CDN range: provider=cloudflare \u2022 dns.google \u2022 push.apple.com",
            "Zercega \u2022 IPv4 84.54.51.82",
            "Zercega \u2022  http://bot.hamsterrace.space:5966/",
            "Zercega \u2022  multi-user.target",
            "Zercega \u2022  ootheca.pw",
            "CVE-2023-22518\tCVE-2018-10562\t CVE-2024-6387\tCVE-2025-20393",
            "Crowdsourced IDS rules: 6b81d548c0fbd7a2275bb0d29deca0de96c1584ce7aadaf4f5dac3cb28ee9c29",
            "Matches rule Suspicious DNS Query for IP Lookup Service APIs by Brandon George (blog post), Thomas Patzke",
            "Matches rule Suspicious Network Connection to IP Lookup Service APIs by Janantha Marasinghe, Nasreddine Bencherchali (Nextron Systems)",
            "Matches rule Local System Accounts Discovery - Linux by Alejandro Ortuno, oscd.community",
            "Crowdsourced IDS rules:",
            "Matches rule ET POLICY External IP Lookup ipinfo.io",
            "Matches rule ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io)",
            "Matches rule ET INFO External IP Check (checkip .amazonaws .com)",
            "Matches rule SERVER-OTHER Squid HTTP Vary response header denial of service attempt",
            "Matches rule ET INFO Observed Cloudflare DNS over HTTPS Domain (cloudflare-dns .com in TLS SNI) Unique rule identifier: This rule belongs to a private collection.",
            "Yara detected: Xmrig cryptocurrency miner",
            "Yara detected: Reads CPU information from /proc indicative of miner or evasive malware Compliance",
            "meta.com \u2022 meta.com.apple",
            "geomi.service \u2022 74b23c7dc3cca50a6d78e18116e31ca189a4549de35ff49903af2c4c0bd06a63",
            "ELF contains segments with high entropy indicating compressed/encrypted content",
            "/etc/systemd/system/geomi.service File type: ASCII text",
            "http://www.bing.lt/search?q=",
            "Win.Malware.Salat-10058846-0",
            "Yara Detections: MacSync_AppleScript_Stealer",
            "Alerts: antisandbox_unhook hardware_id_profiling ntdll_memory_unhooking binary_yara",
            "Alerts: recon _fingerprint registers_vectored_exception_handler creates_suspended_process",
            "Alerts: resumethread_remote_process enumerates_running_processes reads_self",
            "Alerts: packer_unknown_pe_section_name script_tool_executed",
            "Alerts: queries_computer_name queries_keyboard_layout queries_locale_api",
            "Alerts: antidebug_setunhandledexceptionfilter stealth_timeout language_check_registry",
            "Contacted:  188.114.96.1 Domains Contacted dns.google",
            "distracted-chebyshev.84-54-51-82.plesk.page \u2022 domain plesk.page"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Zergeca",
              "display_name": "Zergeca",
              "target": null
            },
            {
              "id": "AutoIT",
              "display_name": "AutoIT",
              "target": null
            },
            {
              "id": "Win.Malware.Salat-10058846-0",
              "display_name": "Win.Malware.Salat-10058846-0",
              "target": null
            },
            {
              "id": "ALF:JASYP:TrojanDownloader:Win32/SmallAgent!",
              "display_name": "ALF:JASYP:TrojanDownloader:Win32/SmallAgent!",
              "target": null
            },
            {
              "id": "Win.Trojan.Emotet-9850453-0",
              "display_name": "Win.Trojan.Emotet-9850453-0",
              "target": null
            },
            {
              "id": "Worm:Win32/AutoRun!atmn",
              "display_name": "Worm:Win32/AutoRun!atmn",
              "target": "/malware/Worm:Win32/AutoRun!atmn"
            },
            {
              "id": "Win.Trojan.Tofsee-7102058-0\tBackdoor:Win32/Tofsee.T",
              "display_name": "Win.Trojan.Tofsee-7102058-0\tBackdoor:Win32/Tofsee.T",
              "target": "/malware/Win.Trojan.Tofsee-7102058-0\tBackdoor:Win32/Tofsee.T"
            },
            {
              "id": "CVE-2023-22518",
              "display_name": "CVE-2023-22518",
              "target": null
            },
            {
              "id": "CVE-2024-6387",
              "display_name": "CVE-2024-6387",
              "target": null
            },
            {
              "id": "CVE-2025-20393",
              "display_name": "CVE-2025-20393",
              "target": null
            },
            {
              "id": "CVE-2014-2321",
              "display_name": "CVE-2014-2321",
              "target": null
            },
            {
              "id": "Botnet",
              "display_name": "Botnet",
              "target": null
            },
            {
              "id": "CVE-2018-10562",
              "display_name": "CVE-2018-10562",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1543",
              "name": "Create or Modify System Process",
              "display_name": "T1543 - Create or Modify System Process"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "T1543.002",
              "name": "Systemd Service",
              "display_name": "T1543.002 - Systemd Service"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "TA0005",
              "name": "Defense Evasion",
              "display_name": "TA0005 - Defense Evasion"
            },
            {
              "id": "T1222",
              "name": "File and Directory Permissions Modification",
              "display_name": "T1222 - File and Directory Permissions Modification"
            },
            {
              "id": "T1222.002",
              "name": "Linux and Mac File and Directory Permissions Modification",
              "display_name": "T1222.002 - Linux and Mac File and Directory Permissions Modification"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1016",
              "name": "System Network Configuration Discovery",
              "display_name": "T1016 - System Network Configuration Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1571",
              "name": "Non-Standard Port",
              "display_name": "T1571 - Non-Standard Port"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1070.004",
              "name": "File Deletion",
              "display_name": "T1070.004 - File Deletion"
            },
            {
              "id": "T1518.001",
              "name": "Security Software Discovery",
              "display_name": "T1518.001 - Security Software Discovery"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1037.002",
              "name": "Logon Script (Mac)",
              "display_name": "T1037.002 - Logon Script (Mac)"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "69d5859750dfad7fe7989ef4",
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "IPv4": 169,
            "URL": 1871,
            "domain": 393,
            "hostname": 925,
            "FileHash-MD5": 391,
            "FileHash-SHA1": 390,
            "FileHash-SHA256": 2452,
            "CVE": 1,
            "SSLCertFingerprint": 1,
            "IPv6": 9,
            "email": 4,
            "CIDR": 1
          },
          "indicator_count": 6607,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "11 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69d5859750dfad7fe7989ef4",
          "name": "Apple / Cloud/ Data Network within Zergeca / Zerg Botnet \u2022 MacSync_AppleScript_Stealer",
          "description": "",
          "modified": "2026-04-07T22:30:47.312000",
          "created": "2026-04-07T22:30:47.312000",
          "tags": [
            "added active",
            "related pulses",
            "found",
            "zergeca botnet",
            "zergeca",
            "upx packer",
            "khtml",
            "gecko",
            "united",
            "ids detections",
            "yara detections",
            "https domain",
            "tls sni",
            "ip lookup",
            "external ip",
            "malware",
            "encrypt",
            "techniques",
            "modify system",
            "process",
            "https",
            "performs dns",
            "tls version",
            "reads cpu",
            "proc indicative",
            "urls",
            "downloads",
            "persistence",
            "data upload",
            "extraction",
            "find s",
            "failed",
            "typ don",
            "ipv4 url",
            "canreb",
            "type ipv4",
            "url domail",
            "domail showing",
            "elf conta",
            "typ url",
            "zercega",
            "enter sc",
            "type",
            "include",
            "review",
            "n1 exclude",
            "suggestedincc",
            "a50 typ",
            "ipv4",
            "matches yara",
            "dete data",
            "yara detectea",
            "cro intormation",
            "exclude sugges",
            "sc car",
            "extra lte",
            "referen",
            "l extraction",
            "droo anv",
            "extr referen",
            "lte all",
            "je matches",
            "yara detel",
            "yara dete",
            "include review",
            "exchange lte",
            "je elf",
            "passive dns",
            "certificate",
            "files",
            "trojan",
            "related tags",
            "worm",
            "medium",
            "write c",
            "write",
            "high",
            "binary",
            "yara rule",
            "default",
            "moved",
            "schaan",
            "as834 ipxo",
            "dynamicloader",
            "program",
            "ee fc",
            "users",
            "ff d5",
            "python",
            "windows",
            "autoit",
            "confuserex",
            "stream",
            "guard",
            "launcher",
            "updater",
            "global",
            "america flag",
            "ashburn",
            "america related",
            "tags",
            "indicator facts",
            "historical otx",
            "controller fake",
            "akamai rank",
            "russia",
            "present nov",
            "aaaa",
            "link",
            "a domains",
            "ip address",
            "meta",
            "cve -2014-2321",
            "handle",
            "address range",
            "cidr",
            "network name",
            "allocation type",
            "pa status",
            "whois server",
            "included iocs",
            "manually add",
            "iocs o",
            "iocs",
            "sugges",
            "stop show",
            "types",
            "external",
            "ripe",
            "pa abusec",
            "neterra",
            "sofia",
            "bulgaria phone",
            "filtered person",
            "neven dilkov",
            "bg phone",
            "filtered route",
            "a5ip",
            "aa2023",
            "aamirai",
            "a2scanner",
            "apple inc",
            "issuer",
            "valid",
            "algorit",
            "thum",
            "name",
            "a9 a8",
            "status",
            "macho",
            "macho 64bit",
            "mac os",
            "x macho",
            "intel",
            "typ no",
            "td td",
            "td tr",
            "a td",
            "dynamic dns",
            "date",
            "name servers",
            "arial",
            "error",
            "null",
            "enough",
            "hosts",
            "win32",
            "fast",
            "contacted",
            "MacSync_AppleScript_Stealer",
            "cve-2018-10562",
            "source",
            "roboto",
            "robotodraft",
            "helvetica",
            "iframe",
            "manually ada",
            "review iocs",
            "abv0",
            "qaeaav0",
            "cptbdev",
            "w4uninitialized",
            "qaeaav01",
            "abv01",
            "qaexn",
            "qbenxz",
            "phoneidentify",
            "qbepaxxz"
          ],
          "references": [
            "https://apple.k8s.joewa.com/\u2022 https://com.apple \u2022 freedns.afraid.org",
            "IPv4 188.114.96.1 In CDN range: provider=cloudflare \u2022 dns.google \u2022 push.apple.com",
            "Zercega \u2022 IPv4 84.54.51.82",
            "Zercega \u2022  http://bot.hamsterrace.space:5966/",
            "Zercega \u2022  multi-user.target",
            "Zercega \u2022  ootheca.pw",
            "CVE-2023-22518\tCVE-2018-10562\t CVE-2024-6387\tCVE-2025-20393",
            "Crowdsourced IDS rules: 6b81d548c0fbd7a2275bb0d29deca0de96c1584ce7aadaf4f5dac3cb28ee9c29",
            "Matches rule Suspicious DNS Query for IP Lookup Service APIs by Brandon George (blog post), Thomas Patzke",
            "Matches rule Suspicious Network Connection to IP Lookup Service APIs by Janantha Marasinghe, Nasreddine Bencherchali (Nextron Systems)",
            "Matches rule Local System Accounts Discovery - Linux by Alejandro Ortuno, oscd.community",
            "Crowdsourced IDS rules:",
            "Matches rule ET POLICY External IP Lookup ipinfo.io",
            "Matches rule ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io)",
            "Matches rule ET INFO External IP Check (checkip .amazonaws .com)",
            "Matches rule SERVER-OTHER Squid HTTP Vary response header denial of service attempt",
            "Matches rule ET INFO Observed Cloudflare DNS over HTTPS Domain (cloudflare-dns .com in TLS SNI) Unique rule identifier: This rule belongs to a private collection.",
            "Yara detected: Xmrig cryptocurrency miner",
            "Yara detected: Reads CPU information from /proc indicative of miner or evasive malware Compliance",
            "meta.com \u2022 meta.com.apple",
            "geomi.service \u2022 74b23c7dc3cca50a6d78e18116e31ca189a4549de35ff49903af2c4c0bd06a63",
            "ELF contains segments with high entropy indicating compressed/encrypted content",
            "/etc/systemd/system/geomi.service File type: ASCII text",
            "http://www.bing.lt/search?q=",
            "Win.Malware.Salat-10058846-0",
            "Yara Detections: MacSync_AppleScript_Stealer",
            "Alerts: antisandbox_unhook hardware_id_profiling ntdll_memory_unhooking binary_yara",
            "Alerts: recon _fingerprint registers_vectored_exception_handler creates_suspended_process",
            "Alerts: resumethread_remote_process enumerates_running_processes reads_self",
            "Alerts: packer_unknown_pe_section_name script_tool_executed",
            "Alerts: queries_computer_name queries_keyboard_layout queries_locale_api",
            "Alerts: antidebug_setunhandledexceptionfilter stealth_timeout language_check_registry",
            "Contacted:  188.114.96.1 Domains Contacted dns.google",
            "distracted-chebyshev.84-54-51-82.plesk.page \u2022 domain plesk.page"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Zergeca",
              "display_name": "Zergeca",
              "target": null
            },
            {
              "id": "AutoIT",
              "display_name": "AutoIT",
              "target": null
            },
            {
              "id": "Win.Malware.Salat-10058846-0",
              "display_name": "Win.Malware.Salat-10058846-0",
              "target": null
            },
            {
              "id": "ALF:JASYP:TrojanDownloader:Win32/SmallAgent!",
              "display_name": "ALF:JASYP:TrojanDownloader:Win32/SmallAgent!",
              "target": null
            },
            {
              "id": "Win.Trojan.Emotet-9850453-0",
              "display_name": "Win.Trojan.Emotet-9850453-0",
              "target": null
            },
            {
              "id": "Worm:Win32/AutoRun!atmn",
              "display_name": "Worm:Win32/AutoRun!atmn",
              "target": "/malware/Worm:Win32/AutoRun!atmn"
            },
            {
              "id": "Win.Trojan.Tofsee-7102058-0\tBackdoor:Win32/Tofsee.T",
              "display_name": "Win.Trojan.Tofsee-7102058-0\tBackdoor:Win32/Tofsee.T",
              "target": "/malware/Win.Trojan.Tofsee-7102058-0\tBackdoor:Win32/Tofsee.T"
            },
            {
              "id": "CVE-2023-22518",
              "display_name": "CVE-2023-22518",
              "target": null
            },
            {
              "id": "CVE-2024-6387",
              "display_name": "CVE-2024-6387",
              "target": null
            },
            {
              "id": "CVE-2025-20393",
              "display_name": "CVE-2025-20393",
              "target": null
            },
            {
              "id": "CVE-2014-2321",
              "display_name": "CVE-2014-2321",
              "target": null
            },
            {
              "id": "Botnet",
              "display_name": "Botnet",
              "target": null
            },
            {
              "id": "CVE-2018-10562",
              "display_name": "CVE-2018-10562",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1543",
              "name": "Create or Modify System Process",
              "display_name": "T1543 - Create or Modify System Process"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "T1543.002",
              "name": "Systemd Service",
              "display_name": "T1543.002 - Systemd Service"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "TA0005",
              "name": "Defense Evasion",
              "display_name": "TA0005 - Defense Evasion"
            },
            {
              "id": "T1222",
              "name": "File and Directory Permissions Modification",
              "display_name": "T1222 - File and Directory Permissions Modification"
            },
            {
              "id": "T1222.002",
              "name": "Linux and Mac File and Directory Permissions Modification",
              "display_name": "T1222.002 - Linux and Mac File and Directory Permissions Modification"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1016",
              "name": "System Network Configuration Discovery",
              "display_name": "T1016 - System Network Configuration Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1571",
              "name": "Non-Standard Port",
              "display_name": "T1571 - Non-Standard Port"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1070.004",
              "name": "File Deletion",
              "display_name": "T1070.004 - File Deletion"
            },
            {
              "id": "T1518.001",
              "name": "Security Software Discovery",
              "display_name": "T1518.001 - Security Software Discovery"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1037.002",
              "name": "Logon Script (Mac)",
              "display_name": "T1037.002 - Logon Script (Mac)"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "IPv4": 169,
            "URL": 1871,
            "domain": 393,
            "hostname": 925,
            "FileHash-MD5": 391,
            "FileHash-SHA1": 390,
            "FileHash-SHA256": 2452,
            "CVE": 1,
            "SSLCertFingerprint": 1,
            "IPv6": 9,
            "email": 4,
            "CIDR": 1
          },
          "indicator_count": 6607,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "11 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69d4619c47e294ad9f6488e5",
          "name": "27d40d40d00040d1dc42d43d00041d6183ff1bfae51ebd88d70384363d525c",
          "description": "The full text of this page, which contains the name, \"Whois\", is published on the website of Google.com, the firm that owns the search giant's search engine, its parent site.",
          "modified": "2026-04-07T04:25:21.664000",
          "created": "2026-04-07T01:45:00.190000",
          "tags": [
            "united",
            "unknown",
            "as13335",
            "as54113",
            "aaaa",
            "a domains",
            "as396982",
            "script urls",
            "nexus category",
            "code",
            "date",
            "title",
            "encrypt",
            "thumbprint",
            "email",
            "city",
            "server",
            "registrar abuse",
            "us admin",
            "admin postal",
            "mn billing",
            "milaca billing"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 64,
            "FileHash-SHA1": 43,
            "IPv6": 6,
            "hostname": 46,
            "IPv4": 110,
            "domain": 36,
            "email": 8,
            "CIDR": 3,
            "FileHash-MD5": 7,
            "FileHash-SHA256": 9,
            "CVE": 2
          },
          "indicator_count": 334,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "12 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69d4619c23aeade1bd8bb97e",
          "name": "27d40d40d00040d1dc42d43d00041d6183ff1bfae51ebd88d70384363d525c",
          "description": "The full text of this page, which contains the name, \"Whois\", is published on the website of Google.com, the firm that owns the search giant's search engine, its parent site.",
          "modified": "2026-04-07T04:25:20.672000",
          "created": "2026-04-07T01:45:00.700000",
          "tags": [
            "united",
            "unknown",
            "as13335",
            "as54113",
            "aaaa",
            "a domains",
            "as396982",
            "script urls",
            "nexus category",
            "code",
            "date",
            "title",
            "encrypt",
            "thumbprint",
            "email",
            "city",
            "server",
            "registrar abuse",
            "us admin",
            "admin postal",
            "mn billing",
            "milaca billing"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 29,
            "FileHash-SHA1": 33,
            "IPv6": 6,
            "hostname": 14,
            "IPv4": 18,
            "domain": 8,
            "email": 4,
            "CVE": 2
          },
          "indicator_count": 114,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "12 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69ad9422422d5502b5ed1511",
          "name": "Boardman US. RAT",
          "description": "92d12cfd54e3dc208dc384fe4099c698\n9af3719b3f61095537e5e7497c65e2a3144440f7\n004adf62746e56b097d3f5885006bd185ffc002bcd960e3eea1ce652fb1893f4\n9efc148da7a2b8658acadc68062b6a1f\n49152:7M2Z3k7U1Q6dBI2G77X351G840RVvdfa67APb7mOjgKmqWEa:Q21k7ZV36EjAPnEKmqWEa\nT13AF58C13A7806C55C2C7E078278F5766D321FE349BB0B6EB62A1E1725FF1E854B26702\ne425830dfabd452ff9f90e4fda33e1aeca03f048\n7c79cbe223cd707653c3c852b7f39260\nMach-O \nexecutable\nmac\nmacho\nMach-O 64-bit x86_64 executable, flags:<NOUNDEFS|DYLDLINK|TWOLEVEL|WEAK_DEFINES|BINDS_TO_WEAK|PIE|HAS_TLV_DESCRIPTORS>\nMac OS X Mach-O 64-bit Intel executable (100%)\nMach-O64   Operation system: macOS [EXECUTE64]\nMACHO\n3.22 MB (3378336 bytes)",
          "modified": "2026-04-07T00:35:09.118000",
          "created": "2026-03-08T15:22:10.713000",
          "tags": [
            "macho",
            "macho 64bit",
            "x8664",
            "mac os",
            "x macho",
            "execute64"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 5,
            "FileHash-SHA1": 4,
            "FileHash-SHA256": 3,
            "URL": 10,
            "domain": 1,
            "hostname": 5
          },
          "indicator_count": 28,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "12 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69ac975ac0061d86aec311d0",
          "name": "Reverse Engineered My Hacker with My Own Share Link see prior Cape report",
          "description": "Reverse Engineered My Hacker a** with My Own Share Link see prior Cape report for MITRE findings #bigbrainideas -msudosos",
          "modified": "2026-04-06T21:27:47.747000",
          "created": "2026-03-07T21:23:38.180000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 313,
            "URL": 311,
            "CVE": 6,
            "FileHash-MD5": 150,
            "FileHash-SHA1": 147,
            "FileHash-SHA256": 149,
            "hostname": 42
          },
          "indicator_count": 1118,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 48,
          "modified_text": "12 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "",
        "https://vtbehaviour.commondatastorage.googleapis.com/1af55649a731abb95d71e2e49693a7bcf87270eb4f8712b747f7e04a0a2a3031_VenusEye%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1776404740&Signature=UTWPNbGAoA9TgTHQiId%2B2IX5vXvrJW9JEMICUB8TIsjB%2F%2FqCyeDRc4kvJNYPqQxTrStjGw64eO9p5qPWO6VtkqSnCJfMhO67pVlA8pr2ftHKAGXBV5zwKVkKMUZEs45BhHkY1DLOe0o69EkrN5SlNTblrAVGT5Q6ZG54BbmLetpACp804v%2F9sfa7RgSTZBnItoA9xHcNnivoqRtyhreowE%2FTLFAXboIqs9cti95uwbKKhqzb",
        "FileHash - SHA256  f32f6b229913d68daad937cc72a57aa45291a9d623109ed48938815aa7b6005c",
        "http://hallrender.com/attorney/brian-sabey | www-temp.metrobyt-mobile.com",
        "https://thebrotherssabey.com/author/thebrotherssabey/ | https://thebrotherssabey.com/category/homosexuality",
        "root.sabeydatacenters.com | server1.sabeydatacenters.com | smtps.sabeydatacenters.com | smtpseguro.sabeydatacenters.com",
        "https://thebrotherssabey.com/2018/12/05/nature-of-scripture-part-5-conclusions/ | https://thebrotherssabey.com/2019/08/01/why",
        "https://thebrotherssabey.com/comments/feed/ | https://thebrotherssabey.com/category/pregnancy",
        "Definitely requires further research",
        "114.114.114.114 = Tulach",
        "Zercega \u2022  http://bot.hamsterrace.space:5966/",
        "444ea032708bb0d940de0ef72b944244 | credit msudosos",
        "https://apple.k8s.joewa.com/\u2022 https://com.apple \u2022 freedns.afraid.org",
        "Matches rule SERVER-OTHER Squid HTTP Vary response header denial of service attempt",
        "roblox-hack-tool-jailbreak_GM431946152.pdf",
        "delete-me.bgs.beanie.cloud",
        "hubt.pornhub.com | www.pornhub.com | pornative.com",
        "https://info.sabeydatacenters.com/r/404532/1/1523680312/open/1 | http://onlyindianporn2.com/videos/dia-sabey/?p=13",
        "Matches rule ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io)",
        "Alerts: dead_host network_icmp persistence_autorun modifies_certificates modifies_proxy_wpad",
        "http://pornpx.com/trends/tsara-brashears-submission-on-august-27-via-manual/1/ http://www.potnhub.org/tsara-brashears.html",
        "Alerts: behavior_tofsee creates_largekey injection_write_exe_process network_bind",
        "Origin: https://otx.alienvault.com/pulse/69af3fd8db2ede31abda6c14",
        "https://www.google.com/search?client=ms-android-tcl-rvo2b&sca_esv=677ff2260c38da6a&sca_upv=1&q=tsara%20brashears&tbm=vid&source=lnms&fbs=AEQNm0Aa4sjWe7Rqy32pFwRj0UkWd8nbOJfsBGGB5IQQO6L3J5MIFhvnvU242yFxzEEp3BfRFWcyM5BvpTgNzM3vKj4sz-C2iLdc_0v0iAkScdtYjVPIGyVlvwujMCY6xcQ3LIupWIQPyPPfztGwIqpQ9H2EXqXXY4GBGq8hpekXoFuduDqktZzSriMQxAlKPjQviXaDVnUYcgWw9ejzcyECyIGanCUinw&sa=X&biw=1128&bih=1971&dpr=2&no_sw_cr=1&zx=1724209326040&sssc=1",
        "m.pornsexer.xxx.3.1.adiosfil.roksit.net",
        "quecompegasune.tk \u2022 hipicapegaso.com",
        "Antivirus Detections: Win32:Malware-gen , Win.Malware.Generic-7430042-0 , Trojan:Win32/Emotet!MTB",
        "Gatsby Library Loader, DLL",
        "mypornvid.fun | porn100.tv | amp.mypornvid.fun | cdn10.mypornvid.fun | cdn11.mypornvid.fun | cdn5.mypornvid.fun | cdn8.mypornvid.fun",
        "his technique allows the GoBrut/StealthWorker agent to circumvent automated revocation checks, enabling its decentralized C2 infrastructure to recruit Linux hosts via high-velocity credential exhaustion.",
        "http://www.bing.lt/search?q=",
        "Alerts: recon _fingerprint registers_vectored_exception_handler creates_suspended_process",
        "Domains Contacted: r4---sn-5goeen7d.googlevideo.com s23.cnzz.com www.youtube.com",
        "Matches rule MALWARE-CNC Win.Malware.Ramnit outbound REGISTER_BOT beacon",
        "https://vtbehaviour.commondatastorage.googleapis.com/d6a033eb92cc58314c55460d4b1b32befca63cd522f89bc3a09c7cf6477e67a9_VirusTotal%20Jujubox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775984910&Signature=hjdKVB1Hclv%2FNw7qh%2FV50rCooI70BC8NJcq77KWRUu6VAlxs8vV%2FWfNLh9VzjKS2pBgR7wAaaDp6GwPof61nS4TwykWgUO%2FavR45JKGxhUsjhYKLE5VQoAZkh13wvx1nTVwH%2FP6fx71mJlF71bDqJe7pjpKdd3jyGRDGC6ksN3fMJ%2FRVnusGPDwzZXpy9F6CUYZ1tT9xuK7k3zz9xdIV5e0noQ9s7P343Ca7ROLOUhs9",
        "http://pixelrz.com/lists/keywords/dr-jeffrey-reimer-dpt-funds-tsara-brashears/  orangeporntube.net   www.tryporno.net",
        "Pegasus Indicators deleted during pulse",
        "https://thebrotherssabey.com/2019/01/20/miracle/?share=twitter | https://thebrotherssabey.com/author/dbsabey/",
        "https://vtbehaviour.commondatastorage.googleapis.com/1af55649a731abb95d71e2e49693a7bcf87270eb4f8712b747f7e04a0a2a3031_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1776404848&Signature=WmTL2fYm%2FkDYVa9Qo9Nz9RPF1sK%2BSfCJJtstGHcUos0pBsz0gehytubNXzwSckZACwulvt8Ye%2BDV3Q82C9WedSfmtisHhwbJuUC69xdfCcBiGcZjiEl%2FCDYoT5bQr16cZP7weWAn%2Beg8YFq4S5VWlVp3M7vNlHJSPy%2Bt4RNKiO6O5wHc74tX7b5Hvl08W9i%2F6vQ8iTmB0OFx21UK%2FG4wdLMIrBbhaxVD3zWi81iu0vgOU9",
        "http://pixelrz.com/lists/keywords/%20dr-jeffrey-reimer-dpt-funds-tsara-brashears/ https://xlxx.mobi",
        "Matches rule MALWARE-CNC Win.Trojan.Ramnit variant outbound detected",
        "http://www.tryporn.net/seach/tsara-brashears/  hicksandchicks.org redpornvideos.net   http://advocate-smyslova.ru/tsara-brashears/",
        "https://bombing.gwuzafo.cc/",
        "Indicator deletion during pulse | Requires more research | Positive for MITM attack",
        "IP\u2019s Contacted: 104.97.41.163  142.251.33.67  142.251.33.78  209.197.3.8  216.239.32.29",
        "205.162.42.171 (205.162.40.0/21) AS 53866 ( Omeda Communications )",
        "http://amp.mypornvid.fun/videos/2/SLFGMWoQaCU/white-dpt-jeffrey-reimer-loves-pretty-indian-patient-forces-sex-3gp-video-tsara-brashears",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "https://www.virustotal.com/gui/search/maxsecure:%22virus.webtoolbar.w32.searchsuite.gen_227097%22%20entity:file",
        "Backdoor:Win32/Simda.gen!B: FileHash-SHA1 fcfcab8f821af9858b78b670d837b09b0b120f3a",
        "The ILOVEYOU virus, released on May 4, 2000, - PDKIT.net May 4, 2025.",
        "http://siteinlink.d1.cnbd.net/search/tsara-brashears-dead/. http://www.music-forum.org/www-cixiu888-com-tsara-brashears.html",
        "Win32:InstallMonstr-MA: FileHash-SHA1 132cc254607c3669afe70e7af773672178823682",
        "Sectigo- Check abnormal patterns Sept 8, 2025 and ADT check alarms that went off",
        "The source of corruption stems from a US wiper/trust bypass doc resting an in Iranian node for C+C. Prelim Data supports this 'may' be misused by [some US lawyer, lower gov]  for suppression and sale to Iran. I want to be explicit in saying, this is a few bad apples, not the majority.",
        "https://vtbehaviour.commondatastorage.googleapis.com/d6a033eb92cc58314c55460d4b1b32befca63cd522f89bc3a09c7cf6477e67a9_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1775984872&Signature=X7ut04viSpboUfiHbVbGH602vbGaavKO28%2FuQZ9YCLjbW%2Bl9JHGrffH4HHtGQ39GPFGg3uUwyMpuOewArLSuI0W%2F0SjlRr%2B3ob5iUQ8eckXWI47mIElQtuCwRStAGCclC8lI%2BsnrEI7u%2FvPhk16ucrMhQtHiSehYuWwNi1lQkbG3Y5ZoDqClBlw1uSMm1jm1Gpu1EBVSIeAqmbV33HSK%2FDTrwzhuwObiyOu4RKE9E7MOmj%2",
        "Micro - Dates to look for specific: April/May/June 2025",
        "Alerts: antisandbox_unhook hardware_id_profiling ntdll_memory_unhooking binary_yara",
        "Google Docs 1.25.202.02 APK Download by Google LLC",
        "Msudosos Regional Notes: While historical pivots show Russian-hosted nodes, the current dual-origin telemetry\u2014dominated by 181 United States-based endpoints\u2014strongly suggests a domestic-aligned adversary leveraging global 'grey space' to obfuscate its operational core. This massive US-centric footprint (exceeding all other regions combined) reinforces the theory of a false-flag orchestration designed to divert attribution toward foreign infrastructure while abusing legitimate Western-hosted trust chains.",
        "Verification failure observed in automated verification handlers during sandbox replay.",
        "Product Version: 4.0.3.1 File Description: \u6d41\u91cf\u7cbe\u7075 Original File name: jingling.exe",
        "IDS Detections: Wapack Labs Sinkhole DNS Reply Backdoor.Win32.Shiz.ivr Checkin Backdoor.Win32/Simda.gen!A Checkin Unsupported/Fake Internet Explorer Version MSIE 2. Unsupported/Fake Windows NT Version 5.0 More Yara Detections stack_string ,\u00a0 dbgdetect_procs",
        "http://videolal.com/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-massage-misconduct-miscinception.html",
        "Alerts: allocates_rwx antisandbox_foregroundwindows antisandbox_sleep antivm_disk_size",
        "Research into the gogetlife.co telemetry confirms a dual-port obfuscation strategy designed to bypass multi-layer security indexing. Forensic HTTP scans identify a Port 80 \"Fail-Closed\" state, where standard web traffic is gated by a Cloudflare-managed 403 Forbidden challenge, effectively neutralizing automated crawlers. Conversely, Port 443 remains accessible, serving a WordPress-based interface backed by a freshly issued Google Trust Services certificate (Feb 4, 2026). This asymmetric configuration ensure",
        "https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowledgement+PD-MB&utm_term=",
        "This is reckless. This is dangerous. Us actors should be ashamed of themselves. #spreader",
        "gateway.fe.apple-dns.net \u2022 apple-dns.net",
        "Pivot-Ready Indicators (IOCs) Go BuildID: nGYES3pajdOmKy1i6Ghh/KO9ydOtZpXtoKtB0KHE-/iisNoniHgTbj_cV6M-uk/XmMYzkBiZs8NXMRZYTiT Telfhash: t1f303a0b3055d54e8b7f08907c7af7624cef6e0f726d078f169e278d09a72c826626874 Imphash: 9698f46495ce9401c8bcaf9a2afe1598 Vhash: 1e53f1a1b59ecb93f821c74b25d81e9f",
        "http://flexporn.net/tsara-brashears.html  http://onlyindianporn.net/videos/tsara-brashears/  http://pornbitter.com/storage/tsara-brashears/",
        "Alerts: windows_utilities antivm_memory_available pe_features raises_exception",
        "https://wallpapers-nature.com/  https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
        "http://siteinlink.d1.cnbd.net/search/tsara-brashears-dead/ | http://videolal.com/tsara-brashears-dead-by-daylight.html",
        "IMPACT: https://www.virustotal.com/graph/g92989765f2d44094a4f25307e33fdef026650fe364c640f894bef43f2646a815",
        "ET TROJAN Win32/DarkWatchman Checkin Activity (POST) ( This is true. They sit around watching, following...)",
        "Digi/Global Sign - audit 2020 digital intersect",
        "Proton.me/Zenbox: Audit July 2025",
        "https://thebrotherssabey.com/comments/feed/ | https://thebrotherssabey.com/2019/01/20/miracle/",
        "Google- look at 202 to Icloud docs likely feb 2025 but possible Dec 24, jan 25 up until June 2025",
        "navy.mil \u2022 http://acts.navair.navy.mil \u2022  http://logistics.navair.navy.mil/rcm/",
        "http://videolal.com/tsara-brashears-dead-or-alive-song-rap.html | http://videolal.com/tsara-brashears-dead.html |",
        "ASN AS27064 dod network information center",
        "Persistent C2 Orchestration: This ELF:Agent-VW variant serves as a critical GoBrut node, utilizing XOR 0x20 obfuscation and ICMP/HTTP beaconing to maintain a persistent link across 1,834 domains and 797 unique IPs",
        "http://anybunny.tv/search/tsara-brashears-submission-on-august-27-via-manual.html&us  www.tryporn.net",
        "BearShare Install File Version 12.0.0.135802",
        "bfxxxhindi.to | https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "Alerts: stealth_hidden_extension stealth_hiddenreg suspicious_command",
        "Broken Seal exploitation: The invalid X.509 seal appears engineered to exploit verification logic gaps, forcing fail-open behavior and allowing SEG bypass under certain configurations. Human-gated delivery posture: Cloudflare 403 challenges suggest the actor enforces human interaction before payload delivery, reducing automated discovery and sandbox analysis. Industrialized infrastructure: Correlation across thousands of domains and URLs indicates a highly automated, rotating delivery ecosystem.",
        "Contacted Domains:  tick.usno.navy.mil www.thinkman.com",
        "https://twitter.com/ootiosum/status/1812208222150726029a4dmHAxV0M0QIHawADl4Qr4kDegUI-QEQAA&usg=AOvVaw37yALadqlgoR9_xlQ5B4Hm",
        "https://polling.portal.gov.bd/js/npc.script.js",
        "Multiple antivirus engines flagged the sample with generic heuristic names (e.g., Trojan:Win32/Vigorf.A, Win32:Malware-gen, Trojan.Generic), consistent with multi-engine heuristic detection on VirusTotal.",
        "SHA-256: fc1fedce1419d4e2009828aad8644deca78b4eeed176e5b009797e0eb0d7d3ff \u2014 Detected as Win.Malware.Vtflooder / Trojan:Win32/Vflooder; UPX-packed PE32 executable, with 812 IDS hits (including C2 checkin + HTTP EXE upload).",
        "The pivot from cd398983... to this domain confirms a multi-year campaign (2019\u20132023) utilizing Namecheap-registered infrastructure to orchestrate wide-scale T1110.001 brute-force operations while bypassing standard PKI expiration checks.",
        "FileHash-SHA256: 7e9822ba1e8fa34ce37262f6746dbc72819d754f805a410dbeb2cedb08a05789",
        "System Impact: Attempts to spread to network shares and cloud storage",
        "http://cab.applemarketingtools.com",
        "https://videolal.com/videos/tsara-brashears-dead-by-daylight.html | tsara-brashears-deadspin-twitter-suspended-account-help.ht",
        "Crowdsourced IDS rules: 6b81d548c0fbd7a2275bb0d29deca0de96c1584ce7aadaf4f5dac3cb28ee9c29",
        "pornhub.com/gay/video/search?search=tsara%2Blynn%2Bbrashears%2Blesbian",
        "kadmos.bot \u2022 cutout.bot \u2022 scenebot.com",
        "hannahseenan.pornsextape.com",
        "Imphash: 9698f46495ce9401c8bcaf9a2afe1598 | Imports (additional): GdipSetSmoothingMode, I_UuidCreate, RpcStringFreeW, UuidCreate, UuidToStringW, InternetCheckConnectionW | Resource: RT_MANIFEST (1, ENGLISH US, SHA-256 4bb79dcea0a901f7d9eac5aa05728ae92acb42e0cb22e5dd14134f4421a3d8df, XML, entropy 4.91)",
        "France",
        "quantum-staging.emsbk.com",
        "https://thebrotherssabey.com/category/pregnancy | https://thebrotherssabey.com/category/homosexuality",
        "Win32:InstallMonstr-MA: FileHash-SHA256 e9b66a63d6ab467c32b1162fc1c72acc26835de0d79ae3d45a0420c399e39f1f",
        "http://www.forensickb.com/2013/03/file-entropy-explained.html  phishing",
        "Malicious sample (SHA256: fa8e2ddfe42e77a9771a7c4d6421c7a808cf4508f8cd6dc6f4cf8bd4e2ae7f8f) detected as TrojanDownloader:Win32/Tugspay.A with YARA hits for Win32_PUA_Domaiq, aPLib, PECompact_2xx and IDS alerts including TLS Handshake Failure + 403 Forbidden, contacting 36 domains (e.g., api.123mediaplayer.com, static.sslsecure1.com) and IPs such as 104.18.23.19 and 193.166.255.171.",
        "https://hallrender.com/attorney/brian-sabey | https://thebrotherssabey.com/2019/01/20/miracle/?share=twitter",
        "18teen.net | teensnow.com | grannies-porn.net | pornmd.com",
        "Yara detected: Reads CPU information from /proc indicative of miner or evasive malware Compliance",
        "IDS Detections: SUSPICIOUS Possible automated connectivity check (www.google.com)",
        "ids-apple.com \u2022 itunes.org",
        "https://thebrotherssabey.com/2016/01/18/ballroom | resources.sabeydatacenters.com | https://thebrotherssabey.com/feed/",
        "http://titasgas.portal.gov.bd/dead.php",
        "https://securityaffairs.com/144927/cyber-crime~#",
        "Other Recs: Pull every Micro Compliance Hold Email. This is a trap. The problem likely resides there.",
        "Alerts: antivm_generic_disk deletes_executed_files disables_uac folder_enumeration",
        "IP\u2019s Contacted: 103.23.108.184  103.23.108.220  103.23.108.80  103.23.108.92  104.18.20.226",
        "myhotzpic.com  pornohata.com pornstarsporno.net aninditaannisa.blogspot.com/2019/02/tsara-brashears",
        "https://vtbehaviour.commondatastorage.googleapis.com/1af55649a731abb95d71e2e49693a7bcf87270eb4f8712b747f7e04a0a2a3031_ReaQta-Hive.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1776404544&Signature=LCRNjms1qthotVXcKmffBD10Y7DKisr7k%2BlVYrTjCank6HB3%2ByH%2F1sAynrAczQNJMFvSCN5berXjisgbRQS12Ua0xWRr9S8WNELQIpaix5s1ZmT%2F20DZy3aPTFnkYjLEAbwCqct2rNETUFlznOBprz2NuaYDQTMU%2BBIuWQmPBconTM%2Bl3i3R2ijpm8NB74T2%2FHObuJDy9Q6nZLrypCtVXWXhM%2FFXBVbGbSnv8YuAN1knzyCy7",
        "IDS Detections: W32.Bloat-A Checkin DYNAMIC_DNS Query to Abused Domain *.mooo.com Suspicious Dynamic DNS Update Request Suspicious User-Agent (MyApp)",
        "T1110.001 (Brute Force: Password Guessing)",
        "Spellbinding! Indeed. SpellEditor.exe",
        "Yara Detections: MS_Visual_Basic_6_0",
        "Yara Detections: MacSync_AppleScript_Stealer",
        "https://wallpapers-nature.com/tsara-brashears/urlscan-io   https://www.sweetheartvideo.com/tsara-brashears",
        "https://mypornvid.fun/videos/3/o00vnGgcVx0/dude-sex-fuck-a-deer-wapporn-video-com/fuck-deer",
        "Domains Contacted: c.cnzz.com crl.comodoca4.com ocsp2.globalsign.com a.exdynsrv.com",
        "msoid.applemanic.com \u2022 msoid.giftcardapple.shop \u2022 msoid.appleportconsulting.com",
        "Antivirus Detections: Win.Trojan.Agent-1190546",
        "IDS Detections: Matches rule MALWARE-CNC Win.Trojan.Scudy outbound connection",
        "IDS Detections: Win32/Tofsee.AX google.com connectivity check",
        "WHOIS data anchors administrative and technical operations for prioritywirreles.com in Los Angeles, CA (90064) via Namecheap infrastructure. Following its 2020 expiration, the domain has transitioned into redemptionPeriod/pendingDelete status, signaling the formal decommissioning of this C2 asset.",
        "https://info.sabeydatacenters.com/listUnsubscribeHeader/u/404532/732bdcab2311714bb73d4d507e6508d215afb4dbc5111a8fc49a4265fe14697",
        "Apple 'that's my boy' Dan: https://cdn1.dan.com/assets/icons/touch",
        "Matches rule Suspicious Network Connection to IP Lookup Service APIs by Janantha Marasinghe, Nasreddine Bencherchali (Nextron Systems)",
        "AS24940 hetzner online gmbh |78.46.218.253\t | static.253.218.46.78.clients.your-server.de | Germany",
        "http://pixelrz.com/lists/keywords/tsara-brashears-assaulted-by-jeffrey-reimer  http://pixelrz.com/lists/keywords/brashears-tsara-buzz-news",
        "sso.dev.applemarketingtools.com",
        "Musiclab, LLC",
        "Whitelisted IP Address 204.79.197.212 Location  United States ASN AS8068 microsoft corporation Nameservers ns4-205.azure-dns.info. ,  ns1-205.azure-dns.com. More WHOIS Registrar: MarkMonitor, Inc.,   Creation Date: Mar 26, 1996 Related Pulses OTX User-Created Pulses (50) Related Tags 2025 Related Tags 4328 ,  5943 ,  80211 ,  #supportsitewebsiteabuse #rootcertificatefailure #cryptographicf ,  The dynamics of the mudoSOSIntersectalign with sophisticated adv More Indicator Facts 982 malicious files communicat",
        "https://polling.portal.gov.bd/js/npop.script.js",
        "invalid2.invalid   4259517cd4e48a289d332ab3f0ab52a366322824",
        "autodiscover.webcompanion.com || avc-gft-dashboard.apple.com || cac1-wwfde-wave.apple.com || demo27.apple.com",
        "http://onlyindianporn2.com/videos/vichatter-young-11//title/0.7292669771257236",
        "FileHash - SHA256 001f0ebe975b5f5a7e5272f53455635cc938a5a0129417f7e79c39df6cf65657 | Yara Detections: stack_string",
        "http://watchhers.net/index.php",
        "Tulach: 114.114.114.114",
        "Researcher msudosos posits a strategic exploitation of Root Certificate Validation Failures, where the adversary leverages an expired trust chain to bypass heuristic security filters and establish persistence.",
        "Exploit Source: 210.64.137.210 | IP\u4f4d\u5740\u8cc7\u8a0a\uff08210.64.0.0 tw.ntunhs.net)",
        "Matches rule User with Privileges Logon by frack113",
        "http://www.sexpornimages.com/tsara/tsara-lynn-brashears-porn/7x56y.html",
        "CS Sigma rules: Matches rule Suspicious Manipulation Of Default Accounts by Nasreddine Bencherchali (Nextron Systems)",
        "Researcher msudosos suggests the VirusTotal (Tencent HABO) behavior report may indicate a potential execution path from volatile storage at /tmp/EB93A6/996E.elf.",
        "ELF contains segments with high entropy indicating compressed/encrypted content",
        "eversource.com (IP: 159.108.5.46, ASN: AS2024) has 2 flagged malicious files within its infrastructure, despite being whitelisted. The domain hosts 95 subdomains and maintains an active SPF record, indicating potential security risks under an otherwise trusted facade.",
        "Will sort to identify malware",
        "http://hghltd.yandex.net/yandbtm?fmode=inject&url=http://siteinlink.d1.cnbd.net/search/tsara-brashears-assaulted-by-jeffrey-reimer",
        "Alerts: anomalous_deletefile antisandbox_sleep dead_connect dynamic_function_loading",
        "Nameservers: dns5.disa.mil. ,  dns4.disa.mil. ,  squad.navo.mil. ,  crnaone.navy.mil. ,  dns1.disa.mil.",
        "Alerts: antidebug_setunhandledexceptionfilter stealth_timeout language_check_registry",
        "This ELF 32-bit LSB artifact is a sophisticated GoBrut/StealthWorker agent, compiled via Golang 1.10 and stripped to obfuscate its high-velocity service-bruting logic. VirusTotal confirms a critical threat profile with 44/65 security vendors flagging the file, which leverages a unique Go BuildID (nGYES3pajdOm...) and a Telfhash (t1f303a0...) for architectural fingerprinting. The binary orchestrates decentralized Command and Control (C2) through an expansive infrastructure of 797 unique IPs and 1,834 domains",
        "https://twitter.com/PORNO_SEXYBABES",
        "https://clockoutbox.es/password",
        "onlyindianporn.tv | sexpornimages.com | http://www.sexpornimages.com/hillary/hillary-clinton",
        "http://pixelrz.com/lists/keywords/tsara-brashears-assaulted-at-concentra/   http://pornohata.com/mov/tsara-brashears/",
        "https://encore360.omeclk.com/portal/wts/ug^cnOmfy6edod--a.gif",
        "IP\u2019s Contacted:  8.8.8.8  78.46.218.253  74.208.229.157  192.5.41.40",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/  Domain mom2fuck.mobi   https://youjizz.sex/tsara-brashears.html   https://youjizz.sex",
        "dlvr.it \u2022 securityaffairs.com \u2022 wscript.shell",
        "https://encore360.omeclk.com/portal/wts/ug^cnOmfy6efyLw9|dod--a | (205.162.40.0/21) (Omeda Communications )",
        "https://thebrotherssabey.com/2018/12/05/nature | https://thebrotherssabey.com/2017/04/17/truth",
        "Matches rule Local System Accounts Discovery - Linux by Alejandro Ortuno, oscd.community",
        "mc.yandex.com/metrika/ \u2022 mc.yandex.com/watch/99885987/",
        "http://wapwon.live/category/tsara-brashears-assaulted-by-jeffrey-reimerAccept-Language  http://www.music-forum.",
        "Alerts:  injection_write_process reads_self stealth_window injection_rwx uses_windows_utilities",
        "151-80-200-88.palantir.events \u2022 196-196-19-74.palantir.events",
        "IP\u2019s Contacted: 103.23.108.110  103.23.108.112  103.23.108.114  103.23.108.124  103.23.108.140",
        "http://nhrc.portal.gov.bd/sites/default/files/files/nhrc.portal.gov.bd/page/348ec5eb_22f8_4754_bb62_6a0d15ba1513/Study-Report-on-Sexual-Offences_Final.pdf",
        "Germany, Austria, and Switzerland GmbH",
        "Alerts: procmem_yara static_pe_anomaly deletes_executed_files injection_runpe",
        "https://otx.alienvault.com/pulse/69b65d6a27024117a4cd3540 [credit msudosos]",
        "Alerts: packer_unknown_pe_section_name script_tool_executed",
        "https://SafeBae.org |  https://www.sweetheartvideo.com/tsara-brashearsAccept-Language",
        "Alerts: mouse_movement_detect dynamic_function_loading resumethread_remote_process",
        "https://oauth2.admin.p4d-1.p4d.aks.lightops.cloud.slb-ds.com/lightops-auth/callback&response_type=code&scope=openid+email+profile&state=uJZE80MW6TdJQjbI0RWXhnF3SpYZXckLkfafnEHgr_I:",
        "FileHash-SHA256: cef164b4d6d29e1bff2bad9e49abaf143593a07d8a6e584f472b545b9e0c5631",
        "Win.Malware.Salat-10058846-0",
        "http://pornbitter.com/storage/tsara-brashears/  http://www.gdsl-pallemoebler.info/seach/tsara-brashears/ advocate-smyslova.ru",
        "CVE-2023-22518\tCVE-2018-10562\t CVE-2024-6387\tCVE-2025-20393",
        "Domains Contacted: microsoft.com microsoft-com.mail.protection.outlook.com vanaheim.cn yahoo.com mta6.am0.yahoodns.net 13.205.167.198.dnsbl.sorbs.net 13.205.167.198.bl.spamcop.net 13.205.167.198.zen.spamhaus.org 13.205.167.198.sbl-xbl.spamhaus.org 13.205.167.198.cbl.abuseat.org",
        "Alerts: origin_langid creates_exe injection_process_search multiple_useragents",
        "Alerts: console_output antivm_memory_available pe_features",
        "https://info.sabeydatacenters.com/emailPreference/epc/404532/EcSDdxFsTp4vgdAzwbcD5rWn7oROwp5s8Buq0L48dF0/732bdcab2311714bb73d4d507e6508d215afb4dbc511",
        "Ransom Demands: Like other ransomware, it demands payment (often in cryptocurrency) to restore access to files or the system.",
        "https://www.sweetheartvideo.com/tsara-brashears/ | https://www.sweetheartvideo.com/tsara-brashearsAccept-Language",
        "Alerts: multiple_useragents dumped_buffer networkdyndns_checkip network_http allocates_rwx",
        "https://www.cybercom.mil/Portals/56/Documents/Strategy/DoD_Cyber_Strategy_2023.pdf",
        "http://cabinet.gov.bd/dead.php",
        "Backdoor:Win32/Simda.gen!B: FileHash-SHA256 fc9ef718314979909ec27998697e32731d551e2b1b713b5e39e60c1ea60af1ef",
        "Win32:Crypt-SKC\\ [Trj] ,  Win.Malware.Delf-6899401-0 ,  Worm:Win32/AutoRun!atmn",
        "IDS Detections: Terse Unencrypted Request for Google - Likely Connectivity Check",
        "porn.nonstopvideos.pl \u2022 xxx-xvideo.com \u2022 essexmetals.com",
        "Matches rule ET POLICY External IP Lookup ipinfo.io",
        "Matches rule Suspicious DNS Query for IP Lookup Service APIs by Brandon George (blog post), Thomas Patzke",
        "virustotalcloud.firebaseapp.com \u2022 firebaseapp.com \u2022 firebase.google.com \u2022 dns-admin@google.com",
        "Alerts: deletes_self injection_runpe persistence_ads suspicious_command_tools",
        "feestzalenvanvlaanderen.be  www.gdsl-pallemoebler.info  http://anybunny.tv/search/tsara-brashears-submission-on-august-27-via-manual.html&us",
        "http://www.net-chinese.com.tw \u2022 pixanalytics.com \u2022 pixnet.cc \u2022 pixnet.tv",
        "this.target",
        "Unix.Trojan.Mirai-6981169-0: FileHash - SHA256  fe00b364b6b8342e3ce0dd146902ac3330ab976e87aca6be666efde39ea485da",
        "https://brandyallen.com/2022/11/23/sexy",
        "FileVersion: 2013.10.10.100 Company Name: \u7cbe\u7075\u8f6f\u4ef6 Comments: \u6d41\u91cf\u7cbe\u7075(1094) ProductName: \u6d41\u91cf\u7cbe\u7075",
        "https://thebrotherssabey.wordpress.com/wp-admin/customize.php?url=https://thebrotherssabey.wordpress.com/",
        "https://vtbehaviour.commondatastorage.googleapis.com/1af55649a731abb95d71e2e49693a7bcf87270eb4f8712b747f7e04a0a2a3031_VirusTotal%20Jujubox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1776404928&Signature=tWjsWqqnoY%2FioSmCeqIaZY4021%2Bm6UFV%2BEiTdTHnMx6FcCgc4YRDjhGLoV24Vk%2Bq8%2Fz0qx1OAHNDq3adCrUxmP%2BTR0vYWjYEiuy%2F6hg7oSF9eiX%2BAEgRS7vQzZdiOy7%2BoKaLRFGet0HWmKoQkMYLyrY9Yu4k5mnQmOG4oecchl9baESpYfESVVfol0t7Xn%2FZCVd%2FH5gn%2BCysfY7lTC07sxIs0Cc6%2F%",
        "containers-oceanus.palantirsec.com",
        "Researcher msudosos: This activity appears to facilitate a preliminary reconnaissance phase, possibly utilizing system commands to query /proc/cpuinfo and /proc/version for architectural profiling purposes.",
        "https://videolal.co/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-massage-nearby.html. |",
        "IP\u2019s Contacted: 172.217.3.163  172.217.3.202  172.217.3.206  173.194.69.94",
        "tsara-brashears-deadspin-twitter-suspended-account-help.ht  videolal.com  wallpapers-nature.com   www.sweetheartvideo.com",
        "Y2K",
        "This is part of a Prometheus Intelligence Technology (PIT) Palantir Attack",
        "remote.files.downloadnow-1.com | remote.sabeydatacenters.com | poczta.sabeydatacenters.com | pop.sabeydatacenters.com",
        "/etc/systemd/system/geomi.service File type: ASCII text",
        "authsmtp.sabeydatacenters.com | go.sabey.com | thebrotherssabey.com | mx5.sabeydatacenters.com | posta.sabeydatacenters.com",
        "Palantir\u2019s PIT - Prometheus Intelligence Technology Damaging Spyware distribution, AI Man in the Middle Attacks",
        "Remediation: Long. Expire the certs. Block the IP for exfiltration 53. Audit 'badge' usage, ASAP.",
        "https://perigon-one.au.itglue.com/password_shared_links/52f082d3-d889-4db5-ae03-c7bfcbe5aa21",
        "http://videolal.com/jeffrey-reimer-dpt-assaulted-tsara-brashears-medical.html",
        "https://thebrotherssabey.com/2015/08/24/why | https://thebrotherssabey.com/20 | https://thebrotherssabey.com | https://thebrotherssabey.com",
        "http://siteinlink.d1.cnbd.net/search/tsara-brashears-assaulted-by-jeffrey-reimer/",
        "https://wallpapers-nature.com/tsara-brashears/urlscan-io",
        "Observed hosting and routing telemetry indicates the delivery infrastructure is operating through AS209242 (Cloudflare London LLC), suggesting the actor is leveraging Cloudflare\u2019s transit layer for resilience and to reduce direct exposure of origin infrastructure.",
        "Alerts: applcation_raises_exception creates_exe suspicious_process stealth_window uses_",
        "PE Version Information :  LegalCopyright: Copyright 2012 Spiritsoft All Rights Reserved. InternalName\tjingling.exe",
        "http://emrd.gov.bd/dead.php",
        "Emotet: FileHash-SHA1  00533ac38b0b61ad6bd8c821337b9d2e6cc97a55",
        "google.pl | aplikacja.ceidg.gov.pl | imaginecup.pl | microsoft.pl",
        "Win.Trojan.Tofsee-7102058-0 ,  Backdoor:Win32/Tofsee.T",
        "Alerts: dead_host nids_malware_alert network_icmp nolookup_communication",
        "https://info.sabeydatacenters.com/webmail/404532/1590752290/6c9ed1e0b6b364689835e8c6bd51ed2198f99ee8ec7fa1924787e4e9b6382872",
        "External Hosts: COUNTRY ASN 142.251.33.206\tgoogle.com |google.comUnited StatesAS15169 google llc",
        "xn--cloud-4sa.com",
        "023097.palantir.events \u2022 palantir.events \u2022 url3561.palantir.events",
        "DoD related:  192.5.41.40 scanning_host\t140.19.33.126 \u2022 199.9.2.136 \u2022 214.23.15.26",
        "Zercega \u2022 IPv4 84.54.51.82",
        "https://alohatube.xyz/search/sex-mom-dog-animal",
        "https://airline.cmntgoyq.com/  | Prometheus Intelligence Technology",
        "distracted-chebyshev.84-54-51-82.plesk.page \u2022 domain plesk.page",
        "Domains Contacted: www.youtube.com www.google.co.ck www.google.com ocsp.pki.goog",
        "Alerts: persistence_autorun persistence_autorun_tasks procmem_yara static_pe_anomaly",
        "MITRE ATT&CK: Process Hollowing (T1055.012): Documentation on the RunPE injection method used by the payload to achieve a fileless state in RWX memory. RFC 5652 - Cryptographic Message Syntax (CMS): This standard defines the structure of the digital signatures that this campaign's \"Broken Seal\" exploit bypasses.",
        "Double User-Agent (User-Agent User-Agent)",
        "IP\u2019s Contacted: 104.16.132.229  104.31.4.167  108.177.126.101  108.177.126.94  13.107.21.200  172.217.14.227",
        "By operating through WhoisGuard-protected infrastructure and exploiting XOR 0x20 obfuscation, the adversary effectively suppresses telemetry into skim space, successfully bypassing DMARC and Microsoft-integrated trust-chain validation.",
        "Hostname aninditaannisa.blogspot.com No Expiration\t0\t  URL aninditaannisa.blogspot.com/2019/02/tsara-brashears-porn.html  billpay.stcu.org",
        "OTX AlienVault",
        "AS15169 google llc  | 8.8.8.8\t| dns.google | United States",
        "nationalgrid.com \u2014 Whitelisted domain (US, AS13335 Cloudflare) with 500+ passive DNS entries, 692 URLs, 195 subdomains, and 2 malicious files hosted on IP 104.17.1.192, which is concerning given the infrastructure and trust level.",
        "www.palantir.events  \u2022 Email cirt@palantir.com \u2022 0055-b2b-nonprod-bigip1.palantir.events \u2022",
        "mc.yandex.com \u2022 mc.yandex.ru \u2022 yandex.com \u2022 yandex.ru",
        "https://thebrotherssabey.com/2015/08/24/why  | https://thebrotherssabey.com/2016/03/12/how | https://thebrotherssabey.com/2017/04/17/truth",
        "https://kompoz2.com/tv/454575/blonde-slut-sara-jay-with-big-ass-is-fucked-in-doggy-style.html",
        "Alerts: process_creation_suspicious_location injection_write_exe_process persistence_autorun",
        "http://go.sabey.com http://vpn2.sabey.com | http://resources.sabeydatacenters.com | http://root.sabeydatacenters.com |",
        "https://securityaffairs.com/144927/cyber-crime/qbot-campaign-april-2023.html",
        "http://sabey.com/construction/ | https://tulach.cc/ | sabeydatacenters.com | https://thebrotherssabey.com | http://root.sabeydatacenters.com/ No Expiration\t0\t  URL http://server1.sabeydatacenters.com No Expiration\t0\t  URL http://smtp1.sabeydatacenters.com No Expiration\t http://smtps.sabeydatacenters.com | http://smtpseguro.sabeydatacenters.com | http://staging.sabeydatacenters.com",
        "192.5.41.40 scanning_host\t\u2022 74.208.229.157 scanning_host",
        "Yara detected: Xmrig cryptocurrency miner",
        "meta.com \u2022 meta.com.apple",
        "Alerts: procmem_yara injection_inter_process creates_largekey network_bind persistence_autorun antivm_generic_disk",
        "Alerts: network_http nids_alert suspicious_tld allocates_rwx antisandbox_foregroundwindows",
        "http://sexiezpics.com/tsara-brashears-hardcore-porn http://mypornvid.com/videos/27/x510fb2/white-dpt-jeffrey-reimer-loves-pretty-indian-patient-forces-sex-3gp-video-tsara-brashears/caillou-finger-family",
        "http://videolal.co/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-concentra-medical-center",
        "c6pPVZhf.exe FileHash-SHA256 99e60fbd12fa9cffb9e84b4f8fa53169cd9eb965f083337de1995926a5ed83f1",
        "Any.run",
        "Alerts: dead_host network_icmp tcp_syn_scan nolookup_communication writes_to_stdout",
        "Primary Hash (SHA256): cd3989830da99a69380901769fd78902efb3cd8ba5c9390e94bd4333b7fad186",
        "Crowdsourced Research from multiple sources",
        "DDoS:Linux/Gafgyt : FileHash - SHA256  358c2bd5b9e925dc23894dec18ce486c03d743cde766ce298ac1e2f00d86f0b2",
        "https://thebrotherssabey.com/2016/03/12/how | https://thebrotherssabey.com/2016/01/18/ballroom",
        "Alerts: antidebug_setunhandledexceptionfilter dll_load_uncommon_file_types",
        "http://pornstarsporno.net/tsara-brashears.html  http://vtwctr.org/explore/inmate-tsara-brashears/",
        "www.pornhubselect.com | pornhub.software",
        "http://www.bukaporn.net/trend/tsara-brashears/  http://onlyindianporn.tv/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-concentra",
        "https://alohatube.xyz/search/tsara-brashears",
        "bridge-websocket-evolosciuc.devint01.goodleap.com",
        "Conversely, Port 443 remains accessible, serving a WordPress-based interface backed by a freshly issued Google Trust Services certificate (Feb 4, 2026). This asymmetric configuration ensures that the structurally invalid X.509 \"Broken Seal\" is only delivered via encrypted channels, while the gated Port 80 tier prevents the discovery of the underlying Zeppelin/Bloat-A redirection logic by non-human-interacted sessions.",
        "Yara Detections: Armadillov171",
        "storage.ladys.one ladys.one: | http://photos.ladys.one ladys.one: | http://porno.ladys.one ladys.one: | http://storage.ladys.one ladys.one: | http://xxx-videos.ladys.one ladys.one:",
        "Alerts: queries_computer_name queries_keyboard_layout queries_locale_api",
        "https://thebrotherssabey.com/category/pregnancy | https://thebrotherssabey.com/discourse | onlyindianporn2.com",
        "Yara Detections: UPX",
        "Alerts: antiav_servicestop persistence_autorun network_bind antivirus_virustotal network_http",
        "https://identity.prd-cdc.jemena.com.au/pages/jemena-reset-password",
        "africa.konnect.com",
        "13.32.178.127 \u2022 023097.palantir.events \u2022 palantir.events \u2022 Email admin@dnstinations.com",
        "https://thebrotherssabey.com | https://thebrotherssabey.com/2015/08/24/why | staging.sabeydatacenters.com |",
        "IDS Detections Win32/Tofsee.AX google.com connectivity check Observed Telegram Domain (t .me in TLS SNI)",
        "Alerts: dumped_buffer network_cnc_http network_http network_http_post suspicious_tld",
        "Monitor DGA Shifts: Track new domains registered through NAMECHEAP INC using the current WhoisGuard patterns to identify the next cluster before it goes active. Analyze Telfhash Clusters: Use the Telfhash (t1f303a0...) to pivot and find if the adversary has updated to 64-bit ELF or ARM architectures. Harden DMARC: Ensure your environment moves from \"p=none\" to \"p=reject\" to mitigate the internal spoofing loops exploited by this botnet's telemetry suppression.",
        "https://kompoz.me/find/tsara-brashears-submission-on-august-27-via-manual/  sexiezpics.com",
        "http://www.xvxx.me/clips/nadia-ali-hardcore/199530/",
        "Alerts:  queries_user_name queries_keyboard_layout queries_locale_api",
        "Win32:InstallMonstr-MA: FileHash-MD5 70007c3aedf9f1685d266a67cfed80af",
        "www.sexpornimages.com http://hicksandchicks.org/ju/tsara-brashears/  hlebo.mobi  pornpx.com  www.potnhub.org",
        "https://exchange.simply.ms/owa/auth/logon.aspx?url=https://exchange.simply.ms/owa/&reason=0",
        "www.sweetheartvideo.com || https://www.sweetheartvideo.com/tsara-brashears/",
        "Alerts: suricata_alert antivm_generic_services physical_drive_access deletes_executed_files",
        "http://videolal.com/tsara-brashears-assaulted-by-jeffrey-reimer.html  http://videolal.com/tsara-brashears-dead-or-alive-song-rap.html",
        "http://pixelrz.com/lists/keywords/tsara-brashears-massage-misconduct-misconception  http://pixelrz.com/lists/keywords/tsara-brashears-dead/  http://orangeporntube.net/tsara-brashears.html",
        "Matches rule ET INFO Observed Cloudflare DNS over HTTPS Domain (cloudflare-dns .com in TLS SNI) Unique rule identifier: This rule belongs to a private collection.",
        "https://www.lalal.ai/privacy-policy/InvalidOutputFolderErrorQAndroidJniObject",
        "www.wwwgitlab.gitlab.git.git.gitlab.git.128-199-7-137.cprapid.com",
        "Apple: Look at Devs around Aug 20-sept 15 2025 abnormalities",
        "IPv4 188.114.96.1 In CDN range: provider=cloudflare \u2022 dns.google \u2022 push.apple.com",
        "Alerts: persistence_autorun_tasks spawns_dev_util cape_detected_threat injection_process_hollowing",
        "The AlienVault OTX report for flypdx.com documents 11 related tags, including ids detections and av detections, across 4 active AWS IP addresses (3.175.34.30\u2013.106). These indicators confirm the airport's network has been flagged for unauthorized activity, specifically pointing to a bridge between their web infrastructure and internal passenger tracking. The display of PII on aviation hardware during my June flight matches a known data-bleeding pattern where Personally Identifiable Information (PII) leaks fr",
        "IDS Detection: Observed Suspicious UA (Hello-World) Suspicious Activity potential UPnProxy",
        "http://cr-malware.testpanw.com/url",
        "Patched3_c.AKRV -> https://otx.alienvault.com/indicator/file/444ea032708bb0d940de0ef72b944244",
        "IDS Detections: D-Link Devices Home Network Administration Protocol Command Execution",
        "logstream-mystifying-tharp-7si72pw.cribl.cloud",
        "http://videolal.co/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-concentra-medic",
        "https://urlscan.io/domain/cdn2e-videos2.yjcontentdelivery.com | http://videolal.com/jeffrey-reimer-dpt-assaulted-tsara-brashears-denver.html",
        "Urlscan",
        "https://tulach.cc/ | tulach.cc |",
        "euw-serp-dev-testing19.duck.ai",
        "https://in2it.itglue.com/password_shared_links/9b0e2a1d-b554-4f0c-a333-390e41defe8e",
        "https://tulach.cc/ || tulach.cc || www-temp.metrobyt-mobile.com",
        "https://videolal.co/videos/jeffrey-reimer-dpt-assaulted-tsara%20-brashears-massage-nearby.html",
        "api-cookie.click",
        "http://videolal.com/jeffrey-reimer-dpt-assaulted-tsara-brashears-denver.html",
        "LBresearcher: msudosos notes: The campaign's use of T1110.001 (Password Guessing) is specifically tuned to exhaust credentials across SSH, MySQL, and CMS backends, effectively recruiting server infrastructure into a global \"zombie\" network.",
        "https://otx.alienvault.com/pulse/69af3fd8db2ede31abda6c14",
        "Install: https://otx.alienvault.com/otxapi/indicators/file/screenshot/669a87ee497aefdbeedfff72455a32511c458714fc6d6817efb7ad792095606e",
        "fmx32.aig.com \u2022  167.230.105.81",
        "Alerts: antisandbox_sleep hardware_id_profiling physical_drive_access suspicious_iocontrol_codes",
        "System Impact: Slows down system performance.",
        "http://142.251.33.206/ phishing",
        "Matches rule Suspicious Eventlog Clear or Configuration Using Wevtutil by Ecco, Daniil Yugoslavskiy, oscd.community",
        "Alerts: allocates_rwx antivm_disk_size creates_exe creates_service suspicious_process",
        "Zercega \u2022  ootheca.pw",
        "Antivirus Detections: Win32:Shiz-JT\\ [Trj] ,\u00a0Win.Trojan.Generic-6323528-0 ,\u00a0Backdoor:Win32/Simda.gen!B",
        "Alerts: resumethread_remote_process enumerates_running_processes reads_self",
        "http://browntubeporn.com/tsara-brashears.html  browntubeporn.com  http://pornvideoj.com/tsara-brashears.htm",
        "http://onlyindianporn2.com/videos/tsara-brashears/   onlyindianporn2.com-porn.html   aninditaannisa.blogspot.com   porno-trash.net",
        "Emotet - CnC IP's: 104.131.58.132 | 14.160.93.230 | 163.172.40.218 | 186.15.83.52  | 190.17.42.79 | 72.29.55.174 | 82.8.232.51  91.204.163.19 command_and_control",
        "For Record: This is not singular blame, while the origin of this root is the problem. It is not isolated.",
        "http://staging.sabeydatacenters.com | https://sabey.com/careers/ | https://vpn2.sabey.com | https://www.sabey.com | https://www.vpn.sabey.com |",
        "https://hybrid-analysis.com/sample/9e7bfc9fb60aa3e3f3c5b91f84ebf8b07e35893e1491149420535cd494bb8a32/69b1b467625a11ce330587db",
        "Alerts: network_icmp deletes_executed_files injection_resumethread dumped_buffer",
        "https://darkconsultants.com/brent-kimball",
        "IDS Detection: Mirai Variant User-Agent (Inbound) WebShell Generic - wget http - POST",
        "https://thebrotherssabey.com/comments/feed/ | mail2.sabeydatacenters.com | mails.sabeydatacenters.com | newmail.sabeydatacenters.com",
        "Yara Detections: is__elf ,  DemonBot",
        "Tofsee: 'google.com' |  https://www.gov50.icu |",
        "Domains Contacted: pki.goog www.microsoft.com ocsp.pki.goog freedns.afraid.org",
        "apple-reactivate.com | appleweb-aem.apple.com | apple.com | revoked-aprtr1-tr1g1.apple.com | network-framework.apple.com",
        "thebrotherssabey.wordpress.com | https://hallrender.com/attorney/brian-sabey",
        "https://otx.alienvault.com/indicator/url/https://gossip.thedirty.com/cdn-cgi/l/chk_jschl?s=04e9c17f33a895764287ae3918f54f016b353177-1551745661-1800-AWU4eGCIAWcUFRuFo2RAigESClCdCQ/9FJquPKplzHISR2zmIZSTluV/jEDBqANqdDORIXIACOwCScDYumaSt5kRHUKVAK4z6Wlo0HzAhetn",
        "Backdoor:Win32/Simda.gen!B: FileHash-MD5 fd9849e8e0b6234ea49551d73b2cb8fe",
        "Zercega \u2022  multi-user.target",
        "Alerts: modifies_proxy_wpad multiple_useragents packer_polymorphic process_interest ransomware_mass_file_delete",
        "Alerts: network_icmp dumped_buffer2 allocates_execute_remote_process antiav_detectfile antidbg_windows antivm_generic_bios",
        "The local environment exhibits advanced telemetry suppression within specialized skim memory regions, effectively neutralizing standard DMARC validation and Microsoft-integrated defensive protocols.",
        "http://console.applemarketingtools.com/",
        "IP\u2019s Contacted: 104.21.72.117  172.66.156.195  157.240.200.174  141.193.213.20",
        "Alerts: creates_service network_http antivm_queries_computername moves_self packer_entropy",
        "1a8fc49a4265fe146976/1523680312 |  https://thebrotherssabey.com/2018/04/22/the  |  https://thebrotherssabey.com/2019/07/08/suffering",
        "Matches rule COM Hijacking For Persistence With Suspicious Locations by Nasreddine Bencherchali",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian | www.pornhub.com",
        "amazon.com \u2022 pki.goog \u2022 google-analytics.com",
        "https://vtbehaviour.commondatastorage.googleapis.com/1af55649a731abb95d71e2e49693a7bcf87270eb4f8712b747f7e04a0a2a3031_Zenbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1776404830&Signature=xTx%2BpDgPVcC%2F9bas7r9zOD2cjhR8moW2kepUI6Dfmz5WrCrWqUpFCtn3pgbDYZqdfFa8HCluzOBpUA8ULheNBisUcHil3cplF57DdYR1C1d9uPgSqqOrjpYXoL3OtlzZFv8X00%2Ft7xwGwRgS9BohRtLi8EFvJTAJ7RC7EOm9FpG49dFxcnvjNDFSixUo2g9P0f4m0li3fkcR9onjdL2WmM1vSmAJBiaVxCMHhG8K49Ro3AwUrT9AV2uG9CnH%2Bu",
        "anybunny.tv | http://anybunny.tv/search/eva-lisa | http://anybunny.tv/search/tsara-brashears-submission-on-august-27-via-manual.html&us",
        "The domain prioritywirreles.com (registered via NAMECHEAP INC) shows a 4/93 detection ratio, confirming it is a live but \"low-noise\" C2 node used to avoid broad-spectrum blacklisting",
        "Alerts: network_cnc_http network_http_post allocates_rwx antisandbox_foregroundwindows",
        "Amazon- Check new cert subscribers on or around Sept 15 2025",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "By maintaining a hollowed root posture, the sample facilitates persistent, low-signal synchronization with external cloud infrastructure while bypassing traditional heuristic trust-chain verification.",
        "http://kompoz.me/find/tsara-brashears-submission-on-august-27-via-manual/  http://redpornvideos.net/tsara-brashears.html",
        "http://www.gdsl-pallemoebler.info/seach/tsara-brashears/ advocate-smyslova.ru  feestzalenvanvlaanderen.be www.gdsl-pallemoebler.info",
        "Spy.Bancos.OQI Checkin",
        "http://park.above.com/jr.php?gz=DjDNgvDQ0WlpBALxevxSvkF3jBH95b5riUvmgFjb1tbPDV06suYFlRcPA34ufLE5UZ8spiM7ya7tRXR8nLUgk920DSaIXniiR5hkoveznG%20mez7OU5R%20HKIczV475LuRwxm3J1pcRSpQcePtF/4aD%20frLO%205mYc0Maj8Z1IwBeAMESc9Gk3BzCkGUHNVeCAZ9vZrQhEeVvN%20QVBAu1boZNJTnvCAP0lB5ebMSP92bFHD/ItyL53LoVDSYWMd64KTNMMJaXE0kZVqQn/%20STriQbrA6cmW3Xj4sAJ3XXEbNNJzTbIvgsy00PlKWInEUK/iXzVecaBsXg3vkUcvkeM3HPPIajaBexXO7ATYz/qTeKAksI9l2IoDAsn0S9BYCTuP8uTYdgJAv0LO%20MkNBOrSqJnFQzTlNxG4NRSP6K4VDWklVPpCwQc/s/AfrwIdLcdrV6CQDLaluG1naOjXDc",
        "http://www.aerix.com/__media__/js/netsoltrademark.php?d=www.pornxxxgals.info/latex-porn/",
        "test-ssa.pineapples.dev",
        "https://oauth2.admin.p4d-1.p4d.aks.lightops.cloud.slb-ds.com/lightops-auth/callback",
        "IDS Detections: URLSpirit Spyware Checkin Observed DNS Query to Suspicious Domain adz2you[.]com",
        "Crowdsourced IDS rules:",
        "IDS Detections: WGET Command Specifying Output in HTTP Headers",
        "AVDetections:  Patched3_c.AKRV",
        "Domains Contacted: www.virustotal.com www.gstatic.com fonts.googleapis.com",
        "http://thebrotherssabey.com/2018 | https://thebrotherssabey.com/2019/01/20/miracle/ | https://thebrotherssabey.com/2019/07/08/suffering",
        "kaiser-friedrich-halle.de | kurma.hosting-mexico.net",
        "Incredibly false information, white screens , pink screens and chat erasure",
        "https://otx.alienvault.com/indicator/file/8550f80522c90177b58eecc3c31b8e82cfbc0a10283c888a45da497b2b5ddca5",
        "Suspicious Manipulation Of Default Accounts Detects suspicious manipulations of default accounts such as 'administrator' and 'guest'. For example 'enable' or 'disable' accounts or change the password...etc Sigma Integrated Rule Set (GitHub) - Nasreddine Bencherchali (Nextron Systems)",
        "http://videolal.com/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-massage-sexual-misconduct-miscinception.html",
        "http://vortex-nlb-http2-fed-us-taut-purple.nr-data.net/",
        "The payload (SHA256: dfff54...4af) achieves a fileless execution state via Process Hollowing (RunPE), injecting into RWX memory regions of legitimate system processes to evade disk-based EDR telemetry. Anti-analysis controls\u2014including Bochs artifact checks, geofencing logic, and direct CPU clock interrogation\u2014are implemented to validate a high-interaction user environment prior to execution.",
        "Entrust to Sectigo- Review vendors",
        "http://www.tryporno.net/movies/tsara-brashears/  http://www.pixelrz.com/lists/keywords/tsara-brashears/",
        "http://siteinlink.d1.cnbd.net/site/maps.google.com.lb/ | https://www.applefilmaker.com | https://www.applefilmaker.com/1odbU3D",
        "https://billpay.stcu.org/csp/ws/ALKAMI-S5M/html/PC_Remote_Role_Due_XP_Help/role1_faq_email_notifications.html  billpay.stcu.org",
        "tick.usno.navy.mil , navy.mil: trojan:Win32/Tiggre!rfn Win.Trojan.Rootkit-4668 Win32:Agent-ALXE\\ [Rtk] Win32:Malware-gen",
        "TrojanDownloader:Win32/Umbald.A\tMalware infection",
        "https://www.colorfulbox.jp/",
        "Alerts: modifies_proxy_wpad  ransomware_dropped_files ransomware_mass_file_delete",
        "https://thebrotherssabey.com/2018/12/05/nature | https://thebrotherssabey.com/2019/01/20/miracle/ | https://thebrotherssabey.com/20",
        "https://thebrotherssabey.com/feed/ | https://thebrotherssabey.com/discourse | https://thebrotherssabey.com/comments/feed/",
        "Email: d4@thinkman.com",
        "Matches rule ET INFO External IP Check (checkip .amazonaws .com)",
        "http://scratch-mit-edu.027.cloudns.asia/users/alessandrito123",
        "Domains Contacted: xred.mooo.com www.download.windowsupdate.com docs.google.com",
        "IDS Detection: Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound",
        "Obfuscation: XOR-based String Encryption (0x20)",
        "Yara Detections compromised_site_redirector_fromcharcode ,  Delphi",
        "IP\u2019s Contacted: 47.43.26.4  195.35.13.119  149.154.167.99  185.138.56.214  142.250.147.26  81.88.48.101",
        "Emotet: FileHash-SHA256  0b0cc210943913d7afcbc007c3d0eb3ead6b8bedcaae2c3104a20eb872527127",
        "http://alohatube.xyz/search/tsara-brashears",
        "Alerts: stealth_window packer_entropy uses_windows_utilities",
        "Domain: navy.mil DNS Files IP Address: 192.5.41.40 Location: United States",
        "DISTINCTIO8.pdf",
        "APKMirror https://www.apkmirror.com",
        "UrlVoid",
        "CA DMV- 2020 exploits, if even exist in your records, may be related.",
        "Alerts: process_creation_suspicious_location infostealer_browser apc_injection persistence_autorun",
        "AS27064 DOD Network Information Center? |  192.5.41.40 | tick.usno.navy.mil tick.usno.navy.mil | United States",
        "www.anyxxxtube.net | sv2.mypornvid.fun | www.porn100.tv | www.redporn.video | https://www.anyxxxtube.net/search-porn/tsara-brashears/ phishing |",
        "Yara Detections: Tofsee",
        "URLSpirit Spyware",
        "Further threat mapping indicates the root of this lies at 52.123.250.[180]. The",
        "This document might expose someone, more than another.",
        "System Impact: Once active, it typically: Encrypts user data and locks the screen.",
        "https://thebrotherssabey.com/author/thebrotherssabey/  | https://thebrotherssabey.com/author/dbsabey/",
        "geomi.service \u2022 74b23c7dc3cca50a6d78e18116e31ca189a4549de35ff49903af2c4c0bd06a63",
        "Alerts: persistence_autorun_tasks binary_yara procmem_yara suricata_alert antivm_bochs_keys",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ | www.anyxxxtube.net",
        "Hybrid Analysis",
        "HCA | https://www.healthonecares.com/physicians/profile/Dr-Brent-Y-Kimball-MD | Neurosurgeons state failed surgery performed on target/others",
        "IDS Detections: DNS Query for Suspicious .cf Domain HTTP Request to a *.xyz domain",
        "thebrotherssabey.wordpress.com http://www.sabey.com | http://resources.sabeydatacenters.com | http://root.sabeydatacenters.com",
        "IDS Detections: Query to a *.pw domain - Likely Hostile",
        "bfxxxhindi.to  www.bfxxxhindi.to  https://www.bfxxxhindi.to   tsara brashears bfxxxhindi.to https://www.bfxxxhindi.to/trend/eaUvPMTg3NzMytY07Q/",
        "AS8560 1&1 ionos se | 74.208.229.157 | www.thinkman.com\twww.thinkman.com | United States",
        "forceusercontent.com | sabey.com | tulach.cc | http://thebrotherssabey.com/2018m.sabeydatacenters.com | https://www.vpn.sabey.com/",
        "https://www.sweetheartvideo.com/tsara-brashearsAccept-Language | https://wallpapers-nature.com/tsara-brashears/urlscan-io",
        "LBresearcher: msudosos notes: By exploiting Root Certificate Validation Failures, the StealthWorker (GoBrut) agent ensures that its 32-bit ELF binaries bypass the automated reputation checks enforced by major cloud providers.",
        "http://videolal.com/tsara-brashears-pueblo.html , http://videolal.com/tsara-brashears.html",
        "142.250.147.101 \u2022 142.251.33.206 command_and_control",
        "http://mincom.gov.bd/dead.php",
        "The environment leverages prioritywirreles.com as a high-fidelity DGA-derived C2 node, utilizing its historical resolution to Russian-hosted IP space (194.61.24.231) to maintain persistent Stealthworker botnet synchronization.",
        "http://connectivitycheck.gstatic.com/generate_204",
        "* https://github.com/MSUDenverSystemsEngineering/Salt-Instructional-18/tree/master/AppDeployToolkit",
        "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net  https://www.sweetheartvideo.com/tsara-brashears/",
        "polling.portal.gov.bd",
        "Compilation / Toolchain Compiler: Microsoft Visual C++ 2017 Linker: Microsoft Linker 14.16.27032 IDE: Visual Studio 2017 (15.9) Classification: PEBIN TrID: Win64 EXE (32.2%) / Win32 DLL (20.1%) / Win16 NE (15.4%) PE Section Entropy (Suspicion): .data 7.36 \u2192 high (suggests packing/encryption), .reloc 6.66 \u2192 possible runtime modification, .text 6.01, .rdata 5.88, .rsrc 4.72 Imports (Capabilities): CreateRemoteThread, CreateThread, ExitProcess",
        "http://onlyindianporn.tv/videos/jeffrey-reimer-dpt-assaulted-tsara-brashears-concent | http://wapwon.live/category/tsara-brashears-assaulted-by-jeffrey-reimerAccept-Languauge",
        "Alerts: nolookup_communication persistence_autorun bypass_firewall network_http p2p_cnc",
        "authrootstl.cab common file extension",
        "ww.google.com.uy",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian ||  pin.it || https://pin.it/",
        "Emotet: FileHash-MD5  dc8a506286ad0664872a52ce9ce2434f",
        "Amazon.com",
        "IDS Detections: Win32/Tofsee.AX google.com connectivity check Non-DNS or Non-Compliant DNS traffic on DNS port Opcode 8 through 15 set",
        "b9e4e47c3f96846c30581c08acf5bc56.virus",
        "IDS Detections: Andariel Backdoor Activity (Checkin)",
        "People who exploit this put the US at risk. Bottom line.",
        "account-apple.com",
        "Alerts: network_icmp persistence_autorun disables_proxy modifies_certificates",
        "SHA256 3d10374b55a18a2dd90d35d28472600496c680a7efab4e772595f735cb062343 identified as Win.Malware.Vtflooder-9783271-0 / Trojan:Win32/Vflooder.B with UPX/Nrv2x packing YARA hits, IDS detections for Win32/Vflooder.B check-in and DOS behavior, and network C2 indicators including 172.66.0.227 and 34.54.88.138.",
        "As of Feb 13 (early AM) \u2014 Indicators of Compromise: 17K | Types: Email (30), FileHash-SHA256 (2,146), URL (8,070), Hostname (2,755), Domain (3,528), Other (1,110) | Geo: US (233), Canada (15), China (10), Japan (2), Spain (2), Other (13)",
        "http://alohatube.xyz/search/tsara-brashears  http://alohatube.xyz/search/tsara-brashears/",
        "Alerts: dead_host nolookup_communication persistence_autorun removes_zoneid_ads dumped_buffer",
        "LBresearcher: msudosos notes: The threat actor maintains operational longevity by rotating through WhoisGuard-protected nodes like prioritywirreles.com, which historically resolved to Russian-hosted IP space (194.61.24.231) to obfuscate its origin.",
        "spf.google.com",
        "Nameservers: squid.navo. ,  squid.navo.mil. ,  dns2.disa.mil. ,  minnow.navo. ,  navy.mil. ,  dns3.disa.mil.",
        "https://otx.alienvault.com/otxapi/indicators/file/screenshot/8550f80522c90177b58eecc3c31b8e82cfbc0a10283c888a45da497b2b5ddca5",
        "lalal.ai",
        "http://itsupport.sabey.com http://www.sabey.com | http://root.sabeydatacenters.com/ | http://server1.sabeydatacenters.com | http://smtp1.sabeydatacenters.com No Expiration\t http://smtps.sabeydatacenters.com | http://smtpseguro.sabeydatacenters.com",
        "alohatube.xyz",
        "mailbox.co.za",
        "Domains Contacted:: i.ytimg.com encrypted-tbn0.gstatic.com cponline.pw",
        "http://sexiezpics.com/tsara-brashears-hardcore-porn | https://www.sweetheartvideo.com/tsara-brashearsAccept-Language",
        "Alerts: dead_host persistence_autorun disables_proxy injection_createremotethread injection_modifies_memory injection_write_memory",
        "Matches rule ET MALWARE Win32/Ramnit Checkin Unique rule identifier: This rule belongs to a private collection.",
        "https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
        "Contacted:  188.114.96.1 Domains Contacted dns.google",
        "Domains Contacted: www.wanuu2.club xml.admidainsight.com www.gstatic.com .",
        "https://www.cloud.mil/CVRC:/Users/joshua.colliflower/OneDrive/OneDrive%20-%20United%20States%20Department%20of%20the%20Navy/Documents/Archive%20Miscellaneous",
        "https://xlxx.mobi phishing\thttps://2beeg.me   https://2beeg.net  https://www.redporn.video   https://youjizz.sex  2beeg.me xlxx.mobi ladys.one",
        "US, Philippines, Ukraine, Iran, China. Alberta."
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": []
        },
        "other": {
          "adversary": [
            "State of Colorado",
            "StealthWorker/GoBrut (The adversary demonstrates advanced telemetry suppression within specialized s",
            "pi, pdfkit.net",
            "Brian Sabey | Tulach | Sabey Data Centers"
          ],
          "malware_families": [
            "Cve-2017-17215",
            "Racoon stealer",
            "M1",
            "Crypt3.bxmj",
            "Nanocore rat",
            "Noname057",
            "Win.trojan.rootkit-4668",
            "Worm:vbs/dapato",
            "Win.malware.qshell-9875653-0",
            "Backdoor:win32/simda.gen!b",
            "Njrat - s0385",
            "Crypt3.bxvc",
            "Alf:jasyp:trojandownloader:win32/smallagent!",
            "Win.virus.polyransom-5704625-0",
            "Detplock",
            "Urlspirit",
            "Trojandownloader:win32/tasekjom.a",
            "Trojan:win32/neurevt",
            "Systweak",
            "Ransomexx",
            "Wannacry kill switch",
            "Swort",
            "Ransom",
            "Trojan.click1.19227",
            "Trojan:win32/zombie.a",
            "Trojan.downloader12.43161",
            "Emotet",
            "Unix.trojan.mirai-6981169-0",
            "Trojanspy",
            "Crypt3.bmvu",
            "Cve-2014-2321",
            "Trojan:win32/wacatac",
            "Backdoor:win32/tofsee.t",
            "Phishing.phishinggame",
            "Cve-2018-10562",
            "Md5 hash: f8add7e7161460ea2b1970cf4ca535bf",
            "Cve-2023-22518",
            "Mirai",
            "Tel:createscheduledtask",
            "Exploit:win32/cve-2017-0147",
            "Kraddare",
            "Other malware",
            "Ghandi",
            "Trojan:win32/emotet!mtb",
            "Crypt3.boqd\t\t inject2.bhbw",
            "Win.malware.oxypumper-6900435-0",
            "Win.trojan.installcore-1177",
            "Maltiverse",
            "Zergeca",
            "Alf:heraklezeval:pua:win32/installmonstr",
            "Ransom:win32/haperlock",
            "Win.malware.salat-10058846-0",
            "Malware family: stealthworker / gobrut",
            "Trojandownloader:win32/upatre.a",
            "Backdoor:win32/tofsee",
            "Inject2.bive",
            "Tulach",
            "Onelouder",
            "Quasar rat",
            "Trojan:win32/tiggre!rfn",
            "Win32:agent-alxe\\ [rtk]",
            "Win32:malware-gen",
            "Cve-2014-8361",
            "Silk road",
            "Alf:trojan:win64/psbanker",
            "Win.trojan.sarwent-10012602-0",
            "Alf:heraklezeval:pua:win32/spyrixkeylogger",
            "Ddos:linux/gafgyt.ya!mtb",
            "Win32/tofsee.ax",
            "Autoit",
            "Nids",
            "Cve-2025-20393",
            "Tofsee",
            "Win.packed.bandook-9882274-1",
            "Botnet",
            "Win.trojan.tofsee-7102058-0",
            "Win.trojan.emotet-9850453-0",
            "Trojandownloader:win32/cutwail",
            "Trojan:win32/muldrop",
            "Redline",
            "Patched3_c.akrv",
            "Cve-2023-27350",
            "Crypt3.chzw",
            "Virus:win32/sivis.a",
            "Cve-2024-6387",
            "Heur/unsec",
            "Bazaar loader",
            "Win32/searchsuite",
            "Tulach malware",
            "Trojandownloader:win32/umbald.a",
            "Malware",
            "Trojan.scar.lzt",
            "Et trojan",
            "Trojan:o97m/madeba.a!det",
            "Win32.application.bearshare.a",
            "Win32:trojan-gen",
            "Worm:win32/autorun!atmn",
            "Formbook",
            "Win.trojan.tofsee-7102058-0\tbackdoor:win32/tofsee.t"
          ],
          "industries": [
            "Military",
            "Insurance",
            "Civilian society",
            "Healthcare",
            "Technology",
            "Government",
            "Telecommunications",
            "Defense",
            "Legal, financial, healthcare, government, municipal, real-estate, enterprise-technology, critical-in"
          ]
        }
      }
    },
    "false_positive": []
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 50,
  "pulses": [
    {
      "id": "69a02837827feb0b78fa3ad2",
      "name": "The Belasco Chain",
      "description": "The adversary delivers a masterclass in \"Regular Belasco\" stagecraft, utilizing authentic Adobe PIDs to construct a \"living library\" of legitimacy where mundane metadata like SOPHIA.json acts as Gatsby\u2019s \"real but uncut\" volumes to mask a hollowed-out interior. This is a triumph of performative evasion; while researchers marvel at the realism of the set-dressing, MSI50B8.tmp and MSI4F2F.tmp wait in the wings of the Windows\\Installer directory, invisible to the human eye and using NGEN hijacking to bake illicit scripts directly into the OS framework. By employing Cryptnet certificates as \"stage lighting\" to mask C2 handshakes, the malware doesn't just attend the system\u2019s party\u2014it rewrites the invitation to own the house. Unlike the tragic end at West Egg, this Belasco chain is a play that refuses to end; it simply resets the stage, ensuring the performance continues as long as the \"green light\" of the C2 remains active.",
      "modified": "2026-04-19T09:34:35.173000",
      "created": "2026-02-26T11:02:15.932000",
      "tags": [
        "file size",
        "mwdb",
        "bazaar",
        "sha3384",
        "ssdeep",
        "file type",
        "sha1",
        "sha256",
        "crc32",
        "filenames c"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 2,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 2319,
        "FileHash-SHA1": 2376,
        "FileHash-SHA256": 6772,
        "domain": 1789,
        "hostname": 1234,
        "URL": 922,
        "email": 45,
        "CVE": 46,
        "CIDR": 3,
        "YARA": 7,
        "IPv4": 3,
        "JA3": 1
      },
      "indicator_count": 15517,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 53,
      "modified_text": "10 minutes ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "69d967590f40c612c90ce84f",
      "name": "TTB-Chained (Tehran-Transversal Belasco Chain) - Clone of My Own Post. Updated",
      "description": "TTB-Chained executes a systemic collapse of the cryptographic chain of trust. Exploiting DNSSEC-unsigned protocols and .net edge nodes, it injects C++ payloads into the resolution chain prior to verification. Remediating via certificate expiration is ineffective; the architecture leverages systemic flaws in DMARC/SPF/DKIM and cryptographic handshake protocols to lock \"Hollow Library\" assets into the environment pre-enforcement, ensuring total detection evasion. The conduit utilizes a multi-umbrella transit strategy: Lumen (AS3356) + RIPE (37.97.254.27) + Fastly (151.101.130.159). These 63.16 KB \"hollowed\" assets masquerade as signed updates for total penetration. TTB-chained executes high-speed wipers targeting firmware/boot sectors, triggering complete corruption of hardware beyond restore. Once the root hosted in IP {53.xxx] is compromised and the pre-verified environment is saturated, the hardware is physically neutralized. -msudosos. See Belasco Chain for more.",
      "modified": "2026-04-19T09:05:10.432000",
      "created": "2026-04-10T21:10:49.749000",
      "tags": [
        "malicious",
        "Microsoft",
        "intent: reckless",
        "wiper",
        "Transip",
        "bankers document gone rogue",
        "Tehran",
        "pdfkit.net",
        "United",
        "broken Docusign seal",
        "esign violation",
        "us lawyers",
        "Iran",
        "IP Abuse US",
        "Spreader",
        "corruption that spread",
        "52.123.250.180",
        "Mass Data Loss and exfiltration",
        "Docusign exploited by insecure workflows",
        "Adobe exploited by insecure workflows",
        "threat map",
        "Infra / healthcare / more at risk from this negligence",
        "remediation: long. expire the certs. block 53..",
        "accountability, NOW.",
        "Burned",
        "Kitplay",
        "iOS",
        "Watering hole",
        "Webkit",
        "Religious Regime",
        "MS Office",
        "Compliance Hold Purgatory",
        "WIN EXE.32",
        "Firmware neutral",
        "Trusted Insider",
        "DKIM, SPF, DMARC Failures",
        "APKmirror",
        "ILOVEYOUBABY",
        "No Problems",
        "Christmas Tree EXEC Code Red worm Computer virus Nimda",
        "Wanna Cry",
        "APK",
        "DC RAT",
        "Emotnet",
        "Redline Swiper",
        "Open Door",
        "Bankers Document",
        "Y2K",
        "wsscript.exe, VBE",
        "Compliance Lock Trap",
        "Globalsign 2020 (potentially exploited)",
        "Heuristic Smear",
        "Gatsby Library Loader DLL",
        "w31999",
        "UofA"
      ],
      "references": [
        "The source of corruption stems from a US wiper/trust bypass doc resting an in Iranian node for C+C. Prelim Data supports this 'may' be misused by [some US lawyer, lower gov]  for suppression and sale to Iran. I want to be explicit in saying, this is a few bad apples, not the majority.",
        "People who exploit this put the US at risk. Bottom line.",
        "Further threat mapping indicates the root of this lies at 52.123.250.[180]. The",
        "For Record: This is not singular blame, while the origin of this root is the problem. It is not isolated.",
        "This is reckless. This is dangerous. Us actors should be ashamed of themselves. #spreader",
        "",
        "IMPACT: https://www.virustotal.com/graph/g92989765f2d44094a4f25307e33fdef026650fe364c640f894bef43f2646a815",
        "This document might expose someone, more than another.",
        "Remediation: Long. Expire the certs. Block the IP for exfiltration 53. Audit 'badge' usage, ASAP.",
        "Other Recs: Pull every Micro Compliance Hold Email. This is a trap. The problem likely resides there.",
        "Micro - Dates to look for specific: April/May/June 2025",
        "Sectigo- Check abnormal patterns Sept 8, 2025 and ADT check alarms that went off",
        "Amazon- Check new cert subscribers on or around Sept 15 2025",
        "Entrust to Sectigo- Review vendors",
        "Apple: Look at Devs around Aug 20-sept 15 2025 abnormalities",
        "CA DMV- 2020 exploits, if even exist in your records, may be related.",
        "Digi/Global Sign - audit 2020 digital intersect",
        "Proton.me/Zenbox: Audit July 2025",
        "Google- look at 202 to Icloud docs likely feb 2025 but possible Dec 24, jan 25 up until June 2025",
        "APKMirror https://www.apkmirror.com",
        "Google Docs 1.25.202.02 APK Download by Google LLC",
        "The ILOVEYOU virus, released on May 4, 2000, - PDKIT.net May 4, 2025.",
        "Y2K",
        "US, Philippines, Ukraine, Iran, China. Alberta.",
        "France",
        "Germany, Austria, and Switzerland GmbH",
        "Gatsby Library Loader, DLL",
        "Spellbinding! Indeed. SpellEditor.exe"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [
        "Government",
        "Telecommunications"
      ],
      "TLP": "green",
      "cloned_from": "69a82c54067ca1d502b1eb6c",
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 3516,
        "hostname": 1614,
        "CVE": 7,
        "URL": 1806,
        "domain": 1416,
        "IPv4": 888,
        "FileHash-MD5": 731,
        "FileHash-SHA1": 787,
        "CIDR": 6,
        "email": 27,
        "IPv6": 10,
        "JA3": 2
      },
      "indicator_count": 10810,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 48,
      "modified_text": "39 minutes ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "698e93e1ab02db8c49e8c3ed",
      "name": "\u201cBroken Seal\u201d DocuSign-themed Delivery with Fileless Process Hollowing (Zeppelin/Bloat-A)",
      "description": "Forensic analysis indicates a DocuSign-themed phishing campaign using a deliberately invalid X.509 PKI seal (\u201cBroken Seal\u201d) to trigger fail-open verification logic in automated handlers. The delivery mechanism bypasses Secure Email Gateway (SEG) reputation checks by using encrypted channels and human-gated infrastructure. The payload is a fileless Process Hollowing (RunPE) malware that injects into RWX memory of legitimate processes to evade disk-based EDR.",
      "modified": "2026-04-19T08:11:41.130000",
      "created": "2026-02-13T03:00:49.872000",
      "tags": [
        "Zeppelin, Bloat-A, W32.Bloat-A, Zero-Day-Delivery, Protocol-Devi",
        "9698f46495ce9401c8bcaf9a2afe1598",
        "Imphash: 9698f46495ce9401c8bcaf9a2afe1598 | Imports (additional)",
        "MD5: b47266fef17ad4b2e4ca6ee1d06c39a7 SHA-1: cb92796715c799d7e71",
        "Filename: b47266fef17ad4b2e4ca6ee1d06c39a7.virus File Type: Win3",
        "Compilation / Toolchain Compiler: Microsoft Visual C++ 2017 Link",
        "DocuSign-themed phishing lure Invalid X.509 seal (\u201cBroken Seal\u201d)"
      ],
      "references": [
        "Conversely, Port 443 remains accessible, serving a WordPress-based interface backed by a freshly issued Google Trust Services certificate (Feb 4, 2026). This asymmetric configuration ensures that the structurally invalid X.509 \"Broken Seal\" is only delivered via encrypted channels, while the gated Port 80 tier prevents the discovery of the underlying Zeppelin/Bloat-A redirection logic by non-human-interacted sessions.",
        "Imphash: 9698f46495ce9401c8bcaf9a2afe1598 | Imports (additional): GdipSetSmoothingMode, I_UuidCreate, RpcStringFreeW, UuidCreate, UuidToStringW, InternetCheckConnectionW | Resource: RT_MANIFEST (1, ENGLISH US, SHA-256 4bb79dcea0a901f7d9eac5aa05728ae92acb42e0cb22e5dd14134f4421a3d8df, XML, entropy 4.91)",
        "Observed hosting and routing telemetry indicates the delivery infrastructure is operating through AS209242 (Cloudflare London LLC), suggesting the actor is leveraging Cloudflare\u2019s transit layer for resilience and to reduce direct exposure of origin infrastructure.",
        "Research into the gogetlife.co telemetry confirms a dual-port obfuscation strategy designed to bypass multi-layer security indexing. Forensic HTTP scans identify a Port 80 \"Fail-Closed\" state, where standard web traffic is gated by a Cloudflare-managed 403 Forbidden challenge, effectively neutralizing automated crawlers. Conversely, Port 443 remains accessible, serving a WordPress-based interface backed by a freshly issued Google Trust Services certificate (Feb 4, 2026). This asymmetric configuration ensure",
        "Compilation / Toolchain Compiler: Microsoft Visual C++ 2017 Linker: Microsoft Linker 14.16.27032 IDE: Visual Studio 2017 (15.9) Classification: PEBIN TrID: Win64 EXE (32.2%) / Win32 DLL (20.1%) / Win16 NE (15.4%) PE Section Entropy (Suspicion): .data 7.36 \u2192 high (suggests packing/encryption), .reloc 6.66 \u2192 possible runtime modification, .text 6.01, .rdata 5.88, .rsrc 4.72 Imports (Capabilities): CreateRemoteThread, CreateThread, ExitProcess",
        "Broken Seal exploitation: The invalid X.509 seal appears engineered to exploit verification logic gaps, forcing fail-open behavior and allowing SEG bypass under certain configurations. Human-gated delivery posture: Cloudflare 403 challenges suggest the actor enforces human interaction before payload delivery, reducing automated discovery and sandbox analysis. Industrialized infrastructure: Correlation across thousands of domains and URLs indicates a highly automated, rotating delivery ecosystem.",
        "MITRE ATT&CK: Process Hollowing (T1055.012): Documentation on the RunPE injection method used by the payload to achieve a fileless state in RWX memory. RFC 5652 - Cryptographic Message Syntax (CMS): This standard defines the structure of the digital signatures that this campaign's \"Broken Seal\" exploit bypasses.",
        "As of Feb 13 (early AM) \u2014 Indicators of Compromise: 17K | Types: Email (30), FileHash-SHA256 (2,146), URL (8,070), Hostname (2,755), Domain (3,528), Other (1,110) | Geo: US (233), Canada (15), China (10), Japan (2), Spain (2), Other (13)",
        "Verification failure observed in automated verification handlers during sandbox replay.",
        "The payload (SHA256: dfff54...4af) achieves a fileless execution state via Process Hollowing (RunPE), injecting into RWX memory regions of legitimate system processes to evade disk-based EDR telemetry. Anti-analysis controls\u2014including Bochs artifact checks, geofencing logic, and direct CPU clock interrogation\u2014are implemented to validate a high-interaction user environment prior to execution.",
        "Multiple antivirus engines flagged the sample with generic heuristic names (e.g., Trojan:Win32/Vigorf.A, Win32:Malware-gen, Trojan.Generic), consistent with multi-engine heuristic detection on VirusTotal.",
        "Malicious sample (SHA256: fa8e2ddfe42e77a9771a7c4d6421c7a808cf4508f8cd6dc6f4cf8bd4e2ae7f8f) detected as TrojanDownloader:Win32/Tugspay.A with YARA hits for Win32_PUA_Domaiq, aPLib, PECompact_2xx and IDS alerts including TLS Handshake Failure + 403 Forbidden, contacting 36 domains (e.g., api.123mediaplayer.com, static.sslsecure1.com) and IPs such as 104.18.23.19 and 193.166.255.171.",
        "SHA256 3d10374b55a18a2dd90d35d28472600496c680a7efab4e772595f735cb062343 identified as Win.Malware.Vtflooder-9783271-0 / Trojan:Win32/Vflooder.B with UPX/Nrv2x packing YARA hits, IDS detections for Win32/Vflooder.B check-in and DOS behavior, and network C2 indicators including 172.66.0.227 and 34.54.88.138.",
        "SHA-256: fc1fedce1419d4e2009828aad8644deca78b4eeed176e5b009797e0eb0d7d3ff \u2014 Detected as Win.Malware.Vtflooder / Trojan:Win32/Vflooder; UPX-packed PE32 executable, with 812 IDS hits (including C2 checkin + HTTP EXE upload).",
        "nationalgrid.com \u2014 Whitelisted domain (US, AS13335 Cloudflare) with 500+ passive DNS entries, 692 URLs, 195 subdomains, and 2 malicious files hosted on IP 104.17.1.192, which is concerning given the infrastructure and trust level.",
        "eversource.com (IP: 159.108.5.46, ASN: AS2024) has 2 flagged malicious files within its infrastructure, despite being whitelisted. The domain hosts 95 subdomains and maintains an active SPF record, indicating potential security risks under an otherwise trusted facade.",
        "Whitelisted IP Address 204.79.197.212 Location  United States ASN AS8068 microsoft corporation Nameservers ns4-205.azure-dns.info. ,  ns1-205.azure-dns.com. More WHOIS Registrar: MarkMonitor, Inc.,   Creation Date: Mar 26, 1996 Related Pulses OTX User-Created Pulses (50) Related Tags 2025 Related Tags 4328 ,  5943 ,  80211 ,  #supportsitewebsiteabuse #rootcertificatefailure #cryptographicf ,  The dynamics of the mudoSOSIntersectalign with sophisticated adv More Indicator Facts 982 malicious files communicat",
        "",
        "The AlienVault OTX report for flypdx.com documents 11 related tags, including ids detections and av detections, across 4 active AWS IP addresses (3.175.34.30\u2013.106). These indicators confirm the airport's network has been flagged for unauthorized activity, specifically pointing to a bridge between their web infrastructure and internal passenger tracking. The display of PII on aviation hardware during my June flight matches a known data-bleeding pattern where Personally Identifiable Information (PII) leaks fr"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "China",
        "United States of America",
        "Spain",
        "Japan",
        "Canada"
      ],
      "malware_families": [],
      "attack_ids": [],
      "industries": [
        "Legal, Financial, Healthcare, Government, Municipal, Real-Estate, Enterprise-Technology, Critical-In"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 11,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 27678,
        "FileHash-SHA256": 47676,
        "FileHash-MD5": 42534,
        "FileHash-SHA1": 23213,
        "hostname": 33703,
        "URL": 75433,
        "SSLCertFingerprint": 30,
        "CVE": 7582,
        "email": 313,
        "FileHash-IMPHASH": 8,
        "CIDR": 26205,
        "JA3": 1,
        "IPv4": 80,
        "URI": 5
      },
      "indicator_count": 284461,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 68,
      "modified_text": "1 hour ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "69e434769e2a43c088066ca2",
      "name": "Kraddare \u2022 Agent Tesla \u2022 CVE Jar clone credit octoseek",
      "description": "",
      "modified": "2026-04-19T07:36:41.138000",
      "created": "2026-04-19T01:48:38.335000",
      "tags": [
        "heur",
        "cisco umbrella",
        "site",
        "alexa top",
        "malware",
        "million",
        "xcnfe",
        "maltiverse",
        "malware site",
        "safe site",
        "malicious",
        "trojan",
        "artemis",
        "vidar",
        "redline stealer",
        "raccoon",
        "keylogger",
        "riskware",
        "agent tesla",
        "remcos",
        "stealer",
        "miner",
        "hacktool",
        "bank",
        "agenttesla",
        "agent",
        "unknown",
        "downloader",
        "unsafe",
        "detplock",
        "networm",
        "win64",
        "service",
        "smokeloader",
        "dropper",
        "crack",
        "alexa",
        "trojanspy",
        "detection list",
        "blacklist https",
        "kyriazhs1975",
        "noname057",
        "tag count",
        "threat report",
        "ip summary",
        "url summary",
        "summary",
        "sample",
        "samples",
        "blacklist",
        "cyber threat",
        "united",
        "engineering",
        "phishing",
        "covid19",
        "facebook",
        "phishing site",
        "paypal",
        "njrat",
        "emotet",
        "nanocore rat",
        "meterpreter",
        "azorult",
        "download",
        "msil",
        "bladabindi",
        "mirai",
        "pony",
        "nanocore",
        "bradesco",
        "cobalt strike",
        "cve201711882",
        "redline",
        "ssl certificate",
        "tsara brashears",
        "cyberstalking",
        "spyware",
        "apple ios",
        "quasar",
        "ransomware",
        "malware norad",
        "cry kill",
        "attack",
        "installer",
        "formbook",
        "lockbit",
        "open",
        "banker",
        "bazarloader",
        "core",
        "ransomexx",
        "name verdict",
        "pattern match",
        "et tor",
        "known tor",
        "relayrouter",
        "exit",
        "node traffic",
        "misc attack",
        "script",
        "beginstring",
        "ascii text",
        "null",
        "date",
        "error",
        "span",
        "refresh",
        "class",
        "generator",
        "critical",
        "body",
        "look",
        "verify",
        "restart",
        "meta",
        "hybrid",
        "general",
        "click",
        "strings",
        "tools",
        "as141773",
        "as63932",
        "moved",
        "passive dns",
        "search",
        "entries",
        "gmt content",
        "type",
        "keep alive",
        "scan endpoints",
        "all octoseek",
        "pulse pulses",
        "as17806 mango",
        "blacklist http",
        "phishtank",
        "malicious site",
        "apple",
        "blockchain",
        "runescape",
        "twitter",
        "qakbot",
        "asyncrat",
        "team",
        "internet storm",
        "generic",
        "union",
        "bazaloader",
        "media",
        "generic malware",
        "hostname",
        "suppobox",
        "netwire rc",
        "installcore",
        "conduit",
        "iobit",
        "mediaget",
        "outbreak",
        "acint",
        "installpack",
        "phish",
        "rostpay",
        "fakeinstaller",
        "spyrixkeylogger",
        "bitminer",
        "loadmoney",
        "filetour",
        "wacatac",
        "fusioncore",
        "dapato",
        "cleaner",
        "softonic",
        "encpk",
        "qbot",
        "predator",
        "swrort",
        "kraddare",
        "systweak",
        "dllinject",
        "driverpack",
        "iframe",
        "downldr",
        "presenoker",
        "as61317",
        "asnone united",
        "urls",
        "files",
        "next",
        "as15169 google",
        "japan unknown",
        "as17506 arteria",
        "as32244 liquid",
        "as49505",
        "russia unknown",
        "expired",
        "domain",
        "falcon",
        "as19969",
        "ipv4",
        "ransom",
        "encrypt",
        "file",
        "windows nt",
        "indicator",
        "response",
        "appdata",
        "gmt contenttype",
        "png image",
        "local",
        "contacted",
        "fali malicious",
        "dropped",
        "communicating",
        "referrer",
        "fali contacted",
        "silk road",
        "immediate",
        "cymulate2",
        "tsara brashears",
        "malvertizing"
      ],
      "references": [
        "https://wallpapers-nature.com/tsara-brashears/urlscan-io",
        "alohatube.xyz",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "http://alohatube.xyz/search/tsara-brashears",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "ww.google.com.uy",
        "https://alohatube.xyz/search/tsara-brashears",
        "https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
        "https://polling.portal.gov.bd/js/npc.script.js",
        "polling.portal.gov.bd",
        "https://polling.portal.gov.bd/js/npop.script.js",
        "http://watchhers.net/index.php",
        "https://brandyallen.com/2022/11/23/sexy",
        "m.pornsexer.xxx.3.1.adiosfil.roksit.net",
        "http://park.above.com/jr.php?gz=DjDNgvDQ0WlpBALxevxSvkF3jBH95b5riUvmgFjb1tbPDV06suYFlRcPA34ufLE5UZ8spiM7ya7tRXR8nLUgk920DSaIXniiR5hkoveznG%20mez7OU5R%20HKIczV475LuRwxm3J1pcRSpQcePtF/4aD%20frLO%205mYc0Maj8Z1IwBeAMESc9Gk3BzCkGUHNVeCAZ9vZrQhEeVvN%20QVBAu1boZNJTnvCAP0lB5ebMSP92bFHD/ItyL53LoVDSYWMd64KTNMMJaXE0kZVqQn/%20STriQbrA6cmW3Xj4sAJ3XXEbNNJzTbIvgsy00PlKWInEUK/iXzVecaBsXg3vkUcvkeM3HPPIajaBexXO7ATYz/qTeKAksI9l2IoDAsn0S9BYCTuP8uTYdgJAv0LO%20MkNBOrSqJnFQzTlNxG4NRSP6K4VDWklVPpCwQc/s/AfrwIdLcdrV6CQDLaluG1naOjXDc",
        "http://nhrc.portal.gov.bd/sites/default/files/files/nhrc.portal.gov.bd/page/348ec5eb_22f8_4754_bb62_6a0d15ba1513/Study-Report-on-Sexual-Offences_Final.pdf",
        "https://twitter.com/PORNO_SEXYBABES",
        "https://alohatube.xyz/search/sex-mom-dog-animal",
        "https://www.colorfulbox.jp/",
        "Hybrid Analysis",
        "Any.run",
        "OTX AlienVault",
        "Urlscan",
        "UrlVoid",
        "http://emrd.gov.bd/dead.php",
        "http://titasgas.portal.gov.bd/dead.php",
        "http://mincom.gov.bd/dead.php",
        "http://cabinet.gov.bd/dead.php"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Malaysia",
        "Bangladesh"
      ],
      "malware_families": [
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "RedLine",
          "display_name": "RedLine",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "Racoon Stealer",
          "display_name": "Racoon Stealer",
          "target": null
        },
        {
          "id": "Ransomexx",
          "display_name": "Ransomexx",
          "target": null
        },
        {
          "id": "Quasar RAT",
          "display_name": "Quasar RAT",
          "target": null
        },
        {
          "id": "njRAT - S0385",
          "display_name": "njRAT - S0385",
          "target": null
        },
        {
          "id": "FormBook",
          "display_name": "FormBook",
          "target": null
        },
        {
          "id": "Bazaar Loader",
          "display_name": "Bazaar Loader",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "Detplock",
          "display_name": "Detplock",
          "target": null
        },
        {
          "id": "WannaCry Kill Switch",
          "display_name": "WannaCry Kill Switch",
          "target": null
        },
        {
          "id": "Ghandi",
          "display_name": "Ghandi",
          "target": null
        },
        {
          "id": "Systweak",
          "display_name": "Systweak",
          "target": null
        },
        {
          "id": "Swort",
          "display_name": "Swort",
          "target": null
        },
        {
          "id": "Silk Road",
          "display_name": "Silk Road",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:PUA:Win32/SpyrixKeylogger",
          "display_name": "ALF:HeraklezEval:PUA:Win32/SpyrixKeylogger",
          "target": null
        },
        {
          "id": "Trojan:Win32/Wacatac",
          "display_name": "Trojan:Win32/Wacatac",
          "target": "/malware/Trojan:Win32/Wacatac"
        },
        {
          "id": "RansomEXX",
          "display_name": "RansomEXX",
          "target": null
        },
        {
          "id": "noname057",
          "display_name": "noname057",
          "target": null
        },
        {
          "id": "Nanocore RAT",
          "display_name": "Nanocore RAT",
          "target": null
        },
        {
          "id": "Worm:VBS/Dapato",
          "display_name": "Worm:VBS/Dapato",
          "target": "/malware/Worm:VBS/Dapato"
        },
        {
          "id": "Kraddare",
          "display_name": "Kraddare",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1110",
          "name": "Brute Force",
          "display_name": "T1110 - Brute Force"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1571",
          "name": "Non-Standard Port",
          "display_name": "T1571 - Non-Standard Port"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        },
        {
          "id": "T1491",
          "name": "Defacement",
          "display_name": "T1491 - Defacement"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "654a7a53317c717d1f4fee7f",
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 2522,
        "FileHash-SHA1": 862,
        "FileHash-SHA256": 2855,
        "URL": 7963,
        "domain": 1168,
        "hostname": 3181,
        "CVE": 13,
        "email": 2
      },
      "indicator_count": 18566,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 47,
      "modified_text": "2 hours ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "69bdecb269c9d6fad107de1f",
      "name": "Google - BOT Beacon | Ransomware present | Active phishing campaigns",
      "description": "",
      "modified": "2026-04-19T00:22:55.777000",
      "created": "2026-03-21T00:56:18.458000",
      "tags": [
        "dynamicloader",
        "get na",
        "high",
        "request",
        "google",
        "write c",
        "explorer",
        "malware",
        "virus",
        "polyransom",
        "ransom",
        "phishing",
        "cnc",
        "virlock",
        "system impact",
        "encrypts user",
        "slows",
        "ransom",
        "4 detection",
        "removal modern",
        "kaspersky",
        "3 prevention",
        "tips",
        "modifies itself",
        "polymorphic ransomware",
        "encrypts files",
        "\"parasitic\" virus",
        "modifies existing files",
        "spreader",
        "google llc",
        "file Infection",
        "algorithm",
        "ouno sni",
        "key usage",
        "data",
        "v3 serial",
        "number",
        "public key",
        "info",
        "key algorithm",
        "subject key",
        "self-signed",
        "mitre att",
        "defense evasion",
        "ta0005",
        "software",
        "evasion",
        "artifacts v",
        "full reports",
        "v help",
        "dns resolutions",
        "traffic udp",
        "hashes",
        "trojan",
        "redirects",
        "ms windows",
        "pe32",
        "users",
        "medium",
        "yara rule",
        "cache",
        "search",
        "intel",
        "music",
        "write",
        "unknown",
        "virtool",
        "copy",
        "guard",
        "suspicious",
        "defender",
        "launch",
        "tracker",
        "media",
        "next"
      ],
      "references": [
        "External Hosts: COUNTRY ASN 142.251.33.206\tgoogle.com |google.comUnited StatesAS15169 google llc",
        "IDS Detections: SUSPICIOUS Possible automated connectivity check (www.google.com)",
        "IDS Detections: Terse Unencrypted Request for Google - Likely Connectivity Check",
        "Yara Detections: UPX",
        "Alerts: antisandbox_sleep hardware_id_profiling physical_drive_access suspicious_iocontrol_codes",
        "Alerts: process_creation_suspicious_location infostealer_browser apc_injection persistence_autorun",
        "Alerts: persistence_autorun_tasks binary_yara procmem_yara suricata_alert antivm_bochs_keys",
        "Alerts: antivm_generic_disk deletes_executed_files disables_uac folder_enumeration",
        "Alerts: stealth_hidden_extension stealth_hiddenreg suspicious_command",
        "142.250.147.101 \u2022 142.251.33.206 command_and_control",
        "http://142.251.33.206/ phishing",
        "http://www.forensickb.com/2013/03/file-entropy-explained.html  phishing",
        "invalid2.invalid   4259517cd4e48a289d332ab3f0ab52a366322824",
        "System Impact: Once active, it typically: Encrypts user data and locks the screen.",
        "System Impact: Slows down system performance.",
        "System Impact: Attempts to spread to network shares and cloud storage",
        "Ransom Demands: Like other ransomware, it demands payment (often in cryptocurrency) to restore access to files or the system.",
        "Matches rule MALWARE-CNC Win.Trojan.Ramnit variant outbound detected",
        "Matches rule MALWARE-CNC Win.Malware.Ramnit outbound REGISTER_BOT beacon",
        "Matches rule ET MALWARE Win32/Ramnit Checkin Unique rule identifier: This rule belongs to a private collection."
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Win.Virus.PolyRansom-5704625-0",
          "display_name": "Win.Virus.PolyRansom-5704625-0",
          "target": null
        },
        {
          "id": "Other Malware",
          "display_name": "Other Malware",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1587.001",
          "name": "Malware",
          "display_name": "T1587.001 - Malware"
        },
        {
          "id": "T1044",
          "name": "File System Permissions Weakness",
          "display_name": "T1044 - File System Permissions Weakness"
        },
        {
          "id": "T1222.001",
          "name": "Windows File and Directory Permissions Modification",
          "display_name": "T1222.001 - Windows File and Directory Permissions Modification"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "IPv4": 14,
        "URL": 431,
        "FileHash-MD5": 123,
        "FileHash-SHA1": 33,
        "FileHash-SHA256": 478,
        "domain": 141,
        "hostname": 199,
        "email": 1,
        "CIDR": 1
      },
      "indicator_count": 1421,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "9 hours ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "69bb8ed03ea0d872b77025ef",
      "name": "VerizonBusiness- Telecom",
      "description": "Trojans are found under a Verizon business account as a general consumer. SOS has been blocked multiple times as well as outbound calls. Lifesafety Event.",
      "modified": "2026-04-18T06:00:28.363000",
      "created": "2026-03-19T05:51:12.687000",
      "tags": [
        "united",
        "as701",
        "aaaa",
        "as7046",
        "as3378",
        "as6984 verizon",
        "tollnumcc1",
        "tollfreenumcc1",
        "cname",
        "as703"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 113,
        "FileHash-MD5": 58,
        "FileHash-SHA1": 46,
        "FileHash-SHA256": 458,
        "domain": 5,
        "email": 1,
        "hostname": 91,
        "JA3": 1
      },
      "indicator_count": 773,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 49,
      "modified_text": "1 day ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "699c3b796fcaed878ca94c5c",
      "name": "https://m.vzw.com/wIvzrd8",
      "description": "the wizard",
      "modified": "2026-04-18T05:30:18.690000",
      "created": "2026-02-23T11:35:21.673000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 1818,
        "hostname": 575,
        "URL": 200,
        "FileHash-SHA1": 450,
        "CIDR": 11,
        "domain": 887,
        "email": 7,
        "FileHash-MD5": 402,
        "CVE": 21
      },
      "indicator_count": 4371,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 48,
      "modified_text": "1 day ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "69ba1037c60cb420bf66b46c",
      "name": "docaccess",
      "description": "",
      "modified": "2026-04-18T05:15:12.381000",
      "created": "2026-03-18T02:38:47.338000",
      "tags": [
        "html document",
        "unicode text",
        "utf8 text",
        "crlf",
        "lf line"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 309,
        "FileHash-SHA1": 288,
        "FileHash-SHA256": 545,
        "URL": 117,
        "domain": 108,
        "email": 7,
        "hostname": 44,
        "CVE": 1
      },
      "indicator_count": 1419,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 48,
      "modified_text": "1 day ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "69e2f11d6c64ebb73108a718",
      "name": "Clone from 1 mo ago by me \"motherless.com\"",
      "description": "",
      "modified": "2026-04-18T04:01:08.013000",
      "created": "2026-04-18T02:49:01.477000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": "69b75475235f55af134a852e",
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 130,
        "hostname": 386,
        "URL": 893,
        "FileHash-MD5": 855,
        "FileHash-SHA1": 320,
        "FileHash-SHA256": 320,
        "SSLCertFingerprint": 129
      },
      "indicator_count": 3033,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 47,
      "modified_text": "1 day ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "69e1c911b11a4216f3f8ab83",
      "name": "ReaQta - Hive Behavioral Analysis www.discord.com www.cdn.discord.die-with-a-smile.pdf",
      "description": "<<Here is the full list of details on the VenusEye Sandbox.  \u00c2\u00a31.5m ($2.3m)  -  it was created in the 1990s.>>>\nwww.discord.com www.cdn.discord.die-with-a-smile.pdf.com.com - HIVE",
      "modified": "2026-04-18T00:51:16.315000",
      "created": "2026-04-17T05:45:53.543000",
      "tags": [
        "reaqta",
        "files",
        "registry",
        "basic",
        "file name",
        "file type",
        "pe32 executable",
        "ms windows",
        "intel",
        "file size",
        "utc8 network",
        "pe file",
        "extra info",
        "aslr",
        "downloads",
        "urls",
        "attack network",
        "info processes",
        "zenbox verdict",
        "guest system",
        "ultimate file",
        "code",
        "next",
        "default",
        "settingswpad",
        "registry keys",
        "inprocserver32",
        "mutexes nothing",
        "parent pid",
        "full path",
        "command line",
        "files c",
        "read registry",
        "windows sandbox",
        "calls process"
      ],
      "references": [
        "https://vtbehaviour.commondatastorage.googleapis.com/1af55649a731abb95d71e2e49693a7bcf87270eb4f8712b747f7e04a0a2a3031_ReaQta-Hive.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1776404544&Signature=LCRNjms1qthotVXcKmffBD10Y7DKisr7k%2BlVYrTjCank6HB3%2ByH%2F1sAynrAczQNJMFvSCN5berXjisgbRQS12Ua0xWRr9S8WNELQIpaix5s1ZmT%2F20DZy3aPTFnkYjLEAbwCqct2rNETUFlznOBprz2NuaYDQTMU%2BBIuWQmPBconTM%2Bl3i3R2ijpm8NB74T2%2FHObuJDy9Q6nZLrypCtVXWXhM%2FFXBVbGbSnv8YuAN1knzyCy7",
        "https://vtbehaviour.commondatastorage.googleapis.com/1af55649a731abb95d71e2e49693a7bcf87270eb4f8712b747f7e04a0a2a3031_VenusEye%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1776404740&Signature=UTWPNbGAoA9TgTHQiId%2B2IX5vXvrJW9JEMICUB8TIsjB%2F%2FqCyeDRc4kvJNYPqQxTrStjGw64eO9p5qPWO6VtkqSnCJfMhO67pVlA8pr2ftHKAGXBV5zwKVkKMUZEs45BhHkY1DLOe0o69EkrN5SlNTblrAVGT5Q6ZG54BbmLetpACp804v%2F9sfa7RgSTZBnItoA9xHcNnivoqRtyhreowE%2FTLFAXboIqs9cti95uwbKKhqzb",
        "https://vtbehaviour.commondatastorage.googleapis.com/1af55649a731abb95d71e2e49693a7bcf87270eb4f8712b747f7e04a0a2a3031_Zenbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1776404830&Signature=xTx%2BpDgPVcC%2F9bas7r9zOD2cjhR8moW2kepUI6Dfmz5WrCrWqUpFCtn3pgbDYZqdfFa8HCluzOBpUA8ULheNBisUcHil3cplF57DdYR1C1d9uPgSqqOrjpYXoL3OtlzZFv8X00%2Ft7xwGwRgS9BohRtLi8EFvJTAJ7RC7EOm9FpG49dFxcnvjNDFSixUo2g9P0f4m0li3fkcR9onjdL2WmM1vSmAJBiaVxCMHhG8K49Ro3AwUrT9AV2uG9CnH%2Bu",
        "https://vtbehaviour.commondatastorage.googleapis.com/1af55649a731abb95d71e2e49693a7bcf87270eb4f8712b747f7e04a0a2a3031_CAPE%20Sandbox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1776404848&Signature=WmTL2fYm%2FkDYVa9Qo9Nz9RPF1sK%2BSfCJJtstGHcUos0pBsz0gehytubNXzwSckZACwulvt8Ye%2BDV3Q82C9WedSfmtisHhwbJuUC69xdfCcBiGcZjiEl%2FCDYoT5bQr16cZP7weWAn%2Beg8YFq4S5VWlVp3M7vNlHJSPy%2Bt4RNKiO6O5wHc74tX7b5Hvl08W9i%2F6vQ8iTmB0OFx21UK%2FG4wdLMIrBbhaxVD3zWi81iu0vgOU9",
        "https://vtbehaviour.commondatastorage.googleapis.com/1af55649a731abb95d71e2e49693a7bcf87270eb4f8712b747f7e04a0a2a3031_VirusTotal%20Jujubox.html?GoogleAccessId=758681729565-rc7fgq07icj8c9dm2gi34a4cckv235v1@developer.gserviceaccount.com&Expires=1776404928&Signature=tWjsWqqnoY%2FioSmCeqIaZY4021%2Bm6UFV%2BEiTdTHnMx6FcCgc4YRDjhGLoV24Vk%2Bq8%2Fz0qx1OAHNDq3adCrUxmP%2BTR0vYWjYEiuy%2F6hg7oSF9eiX%2BAEgRS7vQzZdiOy7%2BoKaLRFGet0HWmKoQkMYLyrY9Yu4k5mnQmOG4oecchl9baESpYfESVVfol0t7Xn%2FZCVd%2FH5gn%2BCysfY7lTC07sxIs0Cc6%2F%"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1018",
          "name": "Remote System Discovery",
          "display_name": "T1018 - Remote System Discovery"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1095",
          "name": "Non-Application Layer Protocol",
          "display_name": "T1095 - Non-Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 122,
        "FileHash-SHA1": 139,
        "FileHash-SHA256": 177,
        "IPv4": 79,
        "URL": 213,
        "domain": 226,
        "hostname": 197,
        "FilePath": 1,
        "CVE": 8
      },
      "indicator_count": 1162,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 48,
      "modified_text": "1 day ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "amazon.com",
    "type": "Domain"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "amazon.com",
    "found": false,
    "verdict": "clean",
    "urls": [],
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776591887.7086203
}