{
  "type": "Domain",
  "indicator": "aptracking1.com",
  "general": {
    "sections": [
      "general",
      "geo",
      "url_list",
      "passive_dns",
      "malware",
      "whois",
      "http_scans"
    ],
    "whois": "http://whois.domaintools.com/aptracking1.com",
    "alexa": "http://www.alexa.com/siteinfo/aptracking1.com",
    "indicator": "aptracking1.com",
    "type": "domain",
    "type_title": "Domain",
    "validation": [],
    "base_indicator": {
      "id": 3635667071,
      "indicator": "aptracking1.com",
      "type": "domain",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 50,
      "pulses": [
        {
          "id": "69e434769e2a43c088066ca2",
          "name": "Kraddare \u2022 Agent Tesla \u2022 CVE Jar clone credit octoseek",
          "description": "",
          "modified": "2026-04-19T07:36:41.138000",
          "created": "2026-04-19T01:48:38.335000",
          "tags": [
            "heur",
            "cisco umbrella",
            "site",
            "alexa top",
            "malware",
            "million",
            "xcnfe",
            "maltiverse",
            "malware site",
            "safe site",
            "malicious",
            "trojan",
            "artemis",
            "vidar",
            "redline stealer",
            "raccoon",
            "keylogger",
            "riskware",
            "agent tesla",
            "remcos",
            "stealer",
            "miner",
            "hacktool",
            "bank",
            "agenttesla",
            "agent",
            "unknown",
            "downloader",
            "unsafe",
            "detplock",
            "networm",
            "win64",
            "service",
            "smokeloader",
            "dropper",
            "crack",
            "alexa",
            "trojanspy",
            "detection list",
            "blacklist https",
            "kyriazhs1975",
            "noname057",
            "tag count",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "blacklist",
            "cyber threat",
            "united",
            "engineering",
            "phishing",
            "covid19",
            "facebook",
            "phishing site",
            "paypal",
            "njrat",
            "emotet",
            "nanocore rat",
            "meterpreter",
            "azorult",
            "download",
            "msil",
            "bladabindi",
            "mirai",
            "pony",
            "nanocore",
            "bradesco",
            "cobalt strike",
            "cve201711882",
            "redline",
            "ssl certificate",
            "tsara brashears",
            "cyberstalking",
            "spyware",
            "apple ios",
            "quasar",
            "ransomware",
            "malware norad",
            "cry kill",
            "attack",
            "installer",
            "formbook",
            "lockbit",
            "open",
            "banker",
            "bazarloader",
            "core",
            "ransomexx",
            "name verdict",
            "pattern match",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "misc attack",
            "script",
            "beginstring",
            "ascii text",
            "null",
            "date",
            "error",
            "span",
            "refresh",
            "class",
            "generator",
            "critical",
            "body",
            "look",
            "verify",
            "restart",
            "meta",
            "hybrid",
            "general",
            "click",
            "strings",
            "tools",
            "as141773",
            "as63932",
            "moved",
            "passive dns",
            "search",
            "entries",
            "gmt content",
            "type",
            "keep alive",
            "scan endpoints",
            "all octoseek",
            "pulse pulses",
            "as17806 mango",
            "blacklist http",
            "phishtank",
            "malicious site",
            "apple",
            "blockchain",
            "runescape",
            "twitter",
            "qakbot",
            "asyncrat",
            "team",
            "internet storm",
            "generic",
            "union",
            "bazaloader",
            "media",
            "generic malware",
            "hostname",
            "suppobox",
            "netwire rc",
            "installcore",
            "conduit",
            "iobit",
            "mediaget",
            "outbreak",
            "acint",
            "installpack",
            "phish",
            "rostpay",
            "fakeinstaller",
            "spyrixkeylogger",
            "bitminer",
            "loadmoney",
            "filetour",
            "wacatac",
            "fusioncore",
            "dapato",
            "cleaner",
            "softonic",
            "encpk",
            "qbot",
            "predator",
            "swrort",
            "kraddare",
            "systweak",
            "dllinject",
            "driverpack",
            "iframe",
            "downldr",
            "presenoker",
            "as61317",
            "asnone united",
            "urls",
            "files",
            "next",
            "as15169 google",
            "japan unknown",
            "as17506 arteria",
            "as32244 liquid",
            "as49505",
            "russia unknown",
            "expired",
            "domain",
            "falcon",
            "as19969",
            "ipv4",
            "ransom",
            "encrypt",
            "file",
            "windows nt",
            "indicator",
            "response",
            "appdata",
            "gmt contenttype",
            "png image",
            "local",
            "contacted",
            "fali malicious",
            "dropped",
            "communicating",
            "referrer",
            "fali contacted",
            "silk road",
            "immediate",
            "cymulate2",
            "tsara brashears",
            "malvertizing"
          ],
          "references": [
            "https://wallpapers-nature.com/tsara-brashears/urlscan-io",
            "alohatube.xyz",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "http://alohatube.xyz/search/tsara-brashears",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "ww.google.com.uy",
            "https://alohatube.xyz/search/tsara-brashears",
            "https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
            "https://polling.portal.gov.bd/js/npc.script.js",
            "polling.portal.gov.bd",
            "https://polling.portal.gov.bd/js/npop.script.js",
            "http://watchhers.net/index.php",
            "https://brandyallen.com/2022/11/23/sexy",
            "m.pornsexer.xxx.3.1.adiosfil.roksit.net",
            "http://park.above.com/jr.php?gz=DjDNgvDQ0WlpBALxevxSvkF3jBH95b5riUvmgFjb1tbPDV06suYFlRcPA34ufLE5UZ8spiM7ya7tRXR8nLUgk920DSaIXniiR5hkoveznG%20mez7OU5R%20HKIczV475LuRwxm3J1pcRSpQcePtF/4aD%20frLO%205mYc0Maj8Z1IwBeAMESc9Gk3BzCkGUHNVeCAZ9vZrQhEeVvN%20QVBAu1boZNJTnvCAP0lB5ebMSP92bFHD/ItyL53LoVDSYWMd64KTNMMJaXE0kZVqQn/%20STriQbrA6cmW3Xj4sAJ3XXEbNNJzTbIvgsy00PlKWInEUK/iXzVecaBsXg3vkUcvkeM3HPPIajaBexXO7ATYz/qTeKAksI9l2IoDAsn0S9BYCTuP8uTYdgJAv0LO%20MkNBOrSqJnFQzTlNxG4NRSP6K4VDWklVPpCwQc/s/AfrwIdLcdrV6CQDLaluG1naOjXDc",
            "http://nhrc.portal.gov.bd/sites/default/files/files/nhrc.portal.gov.bd/page/348ec5eb_22f8_4754_bb62_6a0d15ba1513/Study-Report-on-Sexual-Offences_Final.pdf",
            "https://twitter.com/PORNO_SEXYBABES",
            "https://alohatube.xyz/search/sex-mom-dog-animal",
            "https://www.colorfulbox.jp/",
            "Hybrid Analysis",
            "Any.run",
            "OTX AlienVault",
            "Urlscan",
            "UrlVoid",
            "http://emrd.gov.bd/dead.php",
            "http://titasgas.portal.gov.bd/dead.php",
            "http://mincom.gov.bd/dead.php",
            "http://cabinet.gov.bd/dead.php"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Malaysia",
            "Bangladesh"
          ],
          "malware_families": [
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Racoon Stealer",
              "display_name": "Racoon Stealer",
              "target": null
            },
            {
              "id": "Ransomexx",
              "display_name": "Ransomexx",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "njRAT - S0385",
              "display_name": "njRAT - S0385",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Bazaar Loader",
              "display_name": "Bazaar Loader",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Detplock",
              "display_name": "Detplock",
              "target": null
            },
            {
              "id": "WannaCry Kill Switch",
              "display_name": "WannaCry Kill Switch",
              "target": null
            },
            {
              "id": "Ghandi",
              "display_name": "Ghandi",
              "target": null
            },
            {
              "id": "Systweak",
              "display_name": "Systweak",
              "target": null
            },
            {
              "id": "Swort",
              "display_name": "Swort",
              "target": null
            },
            {
              "id": "Silk Road",
              "display_name": "Silk Road",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:PUA:Win32/SpyrixKeylogger",
              "display_name": "ALF:HeraklezEval:PUA:Win32/SpyrixKeylogger",
              "target": null
            },
            {
              "id": "Trojan:Win32/Wacatac",
              "display_name": "Trojan:Win32/Wacatac",
              "target": "/malware/Trojan:Win32/Wacatac"
            },
            {
              "id": "RansomEXX",
              "display_name": "RansomEXX",
              "target": null
            },
            {
              "id": "noname057",
              "display_name": "noname057",
              "target": null
            },
            {
              "id": "Nanocore RAT",
              "display_name": "Nanocore RAT",
              "target": null
            },
            {
              "id": "Worm:VBS/Dapato",
              "display_name": "Worm:VBS/Dapato",
              "target": "/malware/Worm:VBS/Dapato"
            },
            {
              "id": "Kraddare",
              "display_name": "Kraddare",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1110",
              "name": "Brute Force",
              "display_name": "T1110 - Brute Force"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1571",
              "name": "Non-Standard Port",
              "display_name": "T1571 - Non-Standard Port"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1491",
              "name": "Defacement",
              "display_name": "T1491 - Defacement"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "654a7a53317c717d1f4fee7f",
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2522,
            "FileHash-SHA1": 862,
            "FileHash-SHA256": 2855,
            "URL": 7963,
            "domain": 1168,
            "hostname": 3181,
            "CVE": 13,
            "email": 2,
            "IPv4": 1
          },
          "indicator_count": 18567,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 47,
          "modified_text": "15 hours ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69e1d9cd805ecfc463bed935",
          "name": "BlackNet RAT clone credit octoseek",
          "description": "",
          "modified": "2026-04-18T00:51:09.427000",
          "created": "2026-04-17T06:57:17.378000",
          "tags": [
            "united",
            "heur",
            "bank",
            "covid19 scam",
            "anonymizer",
            "malicious site",
            "telefonica peru",
            "cyber threat",
            "proxy",
            "malware",
            "phishing",
            "zbot",
            "suppobox",
            "team",
            "trojanx",
            "service",
            "facebook",
            "win64",
            "trojan",
            "artemis",
            "cisco umbrella",
            "site",
            "alexa top",
            "million",
            "safe site",
            "engineering",
            "download",
            "microsoft",
            "generic",
            "union",
            "bazaloader",
            "media",
            "runescape",
            "blacklist https",
            "generic malware",
            "metro",
            "tmobile",
            "on us",
            "mls season",
            "home internet",
            "shop",
            "autopay",
            "free",
            "metro store",
            "limit",
            "pass",
            "close",
            "galaxy",
            "easy",
            "back",
            "stream",
            "find",
            "twitter",
            "intnavfnav",
            "conditions",
            "service url",
            "search live",
            "api blog",
            "docs pricing",
            "september",
            "instagram url",
            "facebook url",
            "value",
            "variables",
            "visitor object",
            "alpine object",
            "cookies",
            "taq boolean",
            "get h2",
            "kb script",
            "b xhr",
            "post h2",
            "frame",
            "b image",
            "kb image",
            "redirect chain",
            "frame c0bc",
            "kb stylesheet",
            "covid19",
            "phishing site",
            "malicious",
            "cve201711882",
            "cobalt strike",
            "squirrelwaffle",
            "pony",
            "binder",
            "virut",
            "ramnit",
            "dropper",
            "formbook",
            "azorult",
            "bambernek",
            "alexa",
            "unsafe",
            "opencandy",
            "downldr",
            "irata",
            "dbatloader",
            "vidar",
            "outbreak",
            "downloader",
            "blocker",
            "ransom",
            "autoit",
            "bladabindi",
            "emotet",
            "blacknet rat",
            "stealer",
            "presenoker",
            "fusioncore",
            "cleaner",
            "wacatac",
            "riskware",
            "coinminer",
            "xrat",
            "swrort",
            "installcore",
            "trojanspy",
            "mbydkqdhtu0h",
            "pbiptbmvd0k4",
            "pbzpdldtg",
            "detection list",
            "glelexoputyh",
            "linkid252669",
            "s2okorbdpt2x",
            "el9km",
            "mtap2vnnnpj",
            "blacklist",
            "x22x22",
            "x22scriptx22",
            "x22dntx22",
            "date",
            "u002d2",
            "linkcode u002d",
            "srclang",
            "urllang",
            "srcurl",
            "qzid",
            "pattern match",
            "intnavtnav",
            "q0o0mahttp",
            "login",
            "windows nt",
            "bad traffic",
            "et info",
            "tls handshake",
            "failure",
            "http traffic",
            "http",
            "suricata alerts",
            "event category",
            "description sid",
            "external",
            "logo",
            "av detection",
            "default browser",
            "guest system",
            "professional",
            "general",
            "file",
            "get fwlink",
            "geckohost",
            "suidm",
            "edgev1",
            "srchdafnoform",
            "srchuidv2",
            "edgesf1",
            "malware site",
            "agent",
            "exploit",
            "mimikatz",
            "quasar rat",
            "iframe",
            "beach research",
            "sgeneric",
            "static engine",
            "umbrella",
            "malware service",
            "exploit source",
            "scanning host",
            "Command and Control",
            "malicious url",
            "team malicious",
            "tor known",
            "tor relayrouter",
            "exit",
            "node tcp",
            "traffic",
            "bad traffic"
          ],
          "references": [
            "https://metro-tmo.com/",
            "Hybrid Analysis",
            "Alienvault OTX",
            "Data Analysis"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "South Africa",
            "Japan"
          ],
          "malware_families": [
            {
              "id": "TrojanDownloader:O97M/BazaLoader",
              "display_name": "TrojanDownloader:O97M/BazaLoader",
              "target": "/malware/TrojanDownloader:O97M/BazaLoader"
            },
            {
              "id": "SuppoBox",
              "display_name": "SuppoBox",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Zbot",
              "display_name": "Backdoor:Win32/Zbot",
              "target": "/malware/Backdoor:Win32/Zbot"
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Beach Research",
              "display_name": "Beach Research",
              "target": null
            },
            {
              "id": "BlackNET RAT",
              "display_name": "BlackNET RAT",
              "target": null
            },
            {
              "id": "Backdoor:MSIL/Bladabindi",
              "display_name": "Backdoor:MSIL/Bladabindi",
              "target": "/malware/Backdoor:MSIL/Bladabindi"
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "MimiKatz",
              "display_name": "MimiKatz",
              "target": null
            },
            {
              "id": "Squirrelwaffle",
              "display_name": "Squirrelwaffle",
              "target": null
            },
            {
              "id": "Pony - S0453",
              "display_name": "Pony - S0453",
              "target": null
            },
            {
              "id": "TrojanDropper:VBS/Swrort",
              "display_name": "TrojanDropper:VBS/Swrort",
              "target": "/malware/TrojanDropper:VBS/Swrort"
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "Virus:DOS/Metro",
              "display_name": "Virus:DOS/Metro",
              "target": "/malware/Virus:DOS/Metro"
            },
            {
              "id": "Metro",
              "display_name": "Metro",
              "target": null
            },
            {
              "id": "Virut",
              "display_name": "Virut",
              "target": null
            },
            {
              "id": "Vidar",
              "display_name": "Vidar",
              "target": null
            },
            {
              "id": "AZORult",
              "display_name": "AZORult",
              "target": null
            },
            {
              "id": "Ramnit",
              "display_name": "Ramnit",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Outbreak",
              "display_name": "Backdoor:Win32/Outbreak",
              "target": "/malware/Backdoor:Win32/Outbreak"
            },
            {
              "id": "ALF:PUA:Win32/OpenCandy",
              "display_name": "ALF:PUA:Win32/OpenCandy",
              "target": null
            },
            {
              "id": "IRATA",
              "display_name": "IRATA",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "Cobalt Strike - S0154",
              "display_name": "Cobalt Strike - S0154",
              "target": null
            },
            {
              "id": "ALF:PUA:Win32/FusionCore",
              "display_name": "ALF:PUA:Win32/FusionCore",
              "target": null
            },
            {
              "id": "ALF:Trojan:O97M/Emotet",
              "display_name": "ALF:Trojan:O97M/Emotet",
              "target": null
            },
            {
              "id": "Trojan:Win32/InstallCore",
              "display_name": "Trojan:Win32/InstallCore",
              "target": "/malware/Trojan:Win32/InstallCore"
            }
          ],
          "attack_ids": [
            {
              "id": "T1550",
              "name": "Use Alternate Authentication Material",
              "display_name": "T1550 - Use Alternate Authentication Material"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            }
          ],
          "industries": [
            "Food",
            "Gas",
            "Entertainment"
          ],
          "TLP": "white",
          "cloned_from": "650d0c66e0b02a6dde4a8b7a",
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 781,
            "FileHash-SHA256": 3085,
            "domain": 528,
            "URL": 3130,
            "CVE": 6,
            "FileHash-MD5": 610,
            "FileHash-SHA1": 368
          },
          "indicator_count": 8508,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 49,
          "modified_text": "1 day ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69d586108786e7be59439809",
          "name": "Bot.io",
          "description": "",
          "modified": "2026-04-07T22:32:48.996000",
          "created": "2026-04-07T22:32:48.996000",
          "tags": [
            "added active",
            "related pulses",
            "found",
            "zergeca botnet",
            "zergeca",
            "upx packer",
            "khtml",
            "gecko",
            "united",
            "ids detections",
            "yara detections",
            "https domain",
            "tls sni",
            "ip lookup",
            "external ip",
            "malware",
            "encrypt",
            "techniques",
            "modify system",
            "process",
            "https",
            "performs dns",
            "tls version",
            "reads cpu",
            "proc indicative",
            "urls",
            "downloads",
            "persistence",
            "data upload",
            "extraction",
            "find s",
            "failed",
            "typ don",
            "ipv4 url",
            "canreb",
            "type ipv4",
            "url domail",
            "domail showing",
            "elf conta",
            "typ url",
            "zercega",
            "enter sc",
            "type",
            "include",
            "review",
            "n1 exclude",
            "suggestedincc",
            "a50 typ",
            "ipv4",
            "matches yara",
            "dete data",
            "yara detectea",
            "cro intormation",
            "exclude sugges",
            "sc car",
            "extra lte",
            "referen",
            "l extraction",
            "droo anv",
            "extr referen",
            "lte all",
            "je matches",
            "yara detel",
            "yara dete",
            "include review",
            "exchange lte",
            "je elf",
            "passive dns",
            "certificate",
            "files",
            "trojan",
            "related tags",
            "worm",
            "medium",
            "write c",
            "write",
            "high",
            "binary",
            "yara rule",
            "default",
            "moved",
            "schaan",
            "as834 ipxo",
            "dynamicloader",
            "program",
            "ee fc",
            "users",
            "ff d5",
            "python",
            "windows",
            "autoit",
            "confuserex",
            "stream",
            "guard",
            "launcher",
            "updater",
            "global",
            "america flag",
            "ashburn",
            "america related",
            "tags",
            "indicator facts",
            "historical otx",
            "controller fake",
            "akamai rank",
            "russia",
            "present nov",
            "aaaa",
            "link",
            "a domains",
            "ip address",
            "meta",
            "cve -2014-2321",
            "handle",
            "address range",
            "cidr",
            "network name",
            "allocation type",
            "pa status",
            "whois server",
            "included iocs",
            "manually add",
            "iocs o",
            "iocs",
            "sugges",
            "stop show",
            "types",
            "external",
            "ripe",
            "pa abusec",
            "neterra",
            "sofia",
            "bulgaria phone",
            "filtered person",
            "neven dilkov",
            "bg phone",
            "filtered route",
            "a5ip",
            "aa2023",
            "aamirai",
            "a2scanner",
            "apple inc",
            "issuer",
            "valid",
            "algorit",
            "thum",
            "name",
            "a9 a8",
            "status",
            "macho",
            "macho 64bit",
            "mac os",
            "x macho",
            "intel",
            "typ no",
            "td td",
            "td tr",
            "a td",
            "dynamic dns",
            "date",
            "name servers",
            "arial",
            "error",
            "null",
            "enough",
            "hosts",
            "win32",
            "fast",
            "contacted",
            "MacSync_AppleScript_Stealer",
            "cve-2018-10562",
            "source",
            "roboto",
            "robotodraft",
            "helvetica",
            "iframe",
            "manually ada",
            "review iocs",
            "abv0",
            "qaeaav0",
            "cptbdev",
            "w4uninitialized",
            "qaeaav01",
            "abv01",
            "qaexn",
            "qbenxz",
            "phoneidentify",
            "qbepaxxz"
          ],
          "references": [
            "https://apple.k8s.joewa.com/\u2022 https://com.apple \u2022 freedns.afraid.org",
            "IPv4 188.114.96.1 In CDN range: provider=cloudflare \u2022 dns.google \u2022 push.apple.com",
            "Zercega \u2022 IPv4 84.54.51.82",
            "Zercega \u2022  http://bot.hamsterrace.space:5966/",
            "Zercega \u2022  multi-user.target",
            "Zercega \u2022  ootheca.pw",
            "CVE-2023-22518\tCVE-2018-10562\t CVE-2024-6387\tCVE-2025-20393",
            "Crowdsourced IDS rules: 6b81d548c0fbd7a2275bb0d29deca0de96c1584ce7aadaf4f5dac3cb28ee9c29",
            "Matches rule Suspicious DNS Query for IP Lookup Service APIs by Brandon George (blog post), Thomas Patzke",
            "Matches rule Suspicious Network Connection to IP Lookup Service APIs by Janantha Marasinghe, Nasreddine Bencherchali (Nextron Systems)",
            "Matches rule Local System Accounts Discovery - Linux by Alejandro Ortuno, oscd.community",
            "Crowdsourced IDS rules:",
            "Matches rule ET POLICY External IP Lookup ipinfo.io",
            "Matches rule ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io)",
            "Matches rule ET INFO External IP Check (checkip .amazonaws .com)",
            "Matches rule SERVER-OTHER Squid HTTP Vary response header denial of service attempt",
            "Matches rule ET INFO Observed Cloudflare DNS over HTTPS Domain (cloudflare-dns .com in TLS SNI) Unique rule identifier: This rule belongs to a private collection.",
            "Yara detected: Xmrig cryptocurrency miner",
            "Yara detected: Reads CPU information from /proc indicative of miner or evasive malware Compliance",
            "meta.com \u2022 meta.com.apple",
            "geomi.service \u2022 74b23c7dc3cca50a6d78e18116e31ca189a4549de35ff49903af2c4c0bd06a63",
            "ELF contains segments with high entropy indicating compressed/encrypted content",
            "/etc/systemd/system/geomi.service File type: ASCII text",
            "http://www.bing.lt/search?q=",
            "Win.Malware.Salat-10058846-0",
            "Yara Detections: MacSync_AppleScript_Stealer",
            "Alerts: antisandbox_unhook hardware_id_profiling ntdll_memory_unhooking binary_yara",
            "Alerts: recon _fingerprint registers_vectored_exception_handler creates_suspended_process",
            "Alerts: resumethread_remote_process enumerates_running_processes reads_self",
            "Alerts: packer_unknown_pe_section_name script_tool_executed",
            "Alerts: queries_computer_name queries_keyboard_layout queries_locale_api",
            "Alerts: antidebug_setunhandledexceptionfilter stealth_timeout language_check_registry",
            "Contacted:  188.114.96.1 Domains Contacted dns.google",
            "distracted-chebyshev.84-54-51-82.plesk.page \u2022 domain plesk.page"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Zergeca",
              "display_name": "Zergeca",
              "target": null
            },
            {
              "id": "AutoIT",
              "display_name": "AutoIT",
              "target": null
            },
            {
              "id": "Win.Malware.Salat-10058846-0",
              "display_name": "Win.Malware.Salat-10058846-0",
              "target": null
            },
            {
              "id": "ALF:JASYP:TrojanDownloader:Win32/SmallAgent!",
              "display_name": "ALF:JASYP:TrojanDownloader:Win32/SmallAgent!",
              "target": null
            },
            {
              "id": "Win.Trojan.Emotet-9850453-0",
              "display_name": "Win.Trojan.Emotet-9850453-0",
              "target": null
            },
            {
              "id": "Worm:Win32/AutoRun!atmn",
              "display_name": "Worm:Win32/AutoRun!atmn",
              "target": "/malware/Worm:Win32/AutoRun!atmn"
            },
            {
              "id": "Win.Trojan.Tofsee-7102058-0\tBackdoor:Win32/Tofsee.T",
              "display_name": "Win.Trojan.Tofsee-7102058-0\tBackdoor:Win32/Tofsee.T",
              "target": "/malware/Win.Trojan.Tofsee-7102058-0\tBackdoor:Win32/Tofsee.T"
            },
            {
              "id": "CVE-2023-22518",
              "display_name": "CVE-2023-22518",
              "target": null
            },
            {
              "id": "CVE-2024-6387",
              "display_name": "CVE-2024-6387",
              "target": null
            },
            {
              "id": "CVE-2025-20393",
              "display_name": "CVE-2025-20393",
              "target": null
            },
            {
              "id": "CVE-2014-2321",
              "display_name": "CVE-2014-2321",
              "target": null
            },
            {
              "id": "Botnet",
              "display_name": "Botnet",
              "target": null
            },
            {
              "id": "CVE-2018-10562",
              "display_name": "CVE-2018-10562",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1543",
              "name": "Create or Modify System Process",
              "display_name": "T1543 - Create or Modify System Process"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "T1543.002",
              "name": "Systemd Service",
              "display_name": "T1543.002 - Systemd Service"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "TA0005",
              "name": "Defense Evasion",
              "display_name": "TA0005 - Defense Evasion"
            },
            {
              "id": "T1222",
              "name": "File and Directory Permissions Modification",
              "display_name": "T1222 - File and Directory Permissions Modification"
            },
            {
              "id": "T1222.002",
              "name": "Linux and Mac File and Directory Permissions Modification",
              "display_name": "T1222.002 - Linux and Mac File and Directory Permissions Modification"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1016",
              "name": "System Network Configuration Discovery",
              "display_name": "T1016 - System Network Configuration Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1571",
              "name": "Non-Standard Port",
              "display_name": "T1571 - Non-Standard Port"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1070.004",
              "name": "File Deletion",
              "display_name": "T1070.004 - File Deletion"
            },
            {
              "id": "T1518.001",
              "name": "Security Software Discovery",
              "display_name": "T1518.001 - Security Software Discovery"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1037.002",
              "name": "Logon Script (Mac)",
              "display_name": "T1037.002 - Logon Script (Mac)"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "69d5859750dfad7fe7989ef4",
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "IPv4": 169,
            "URL": 1871,
            "domain": 393,
            "hostname": 925,
            "FileHash-MD5": 391,
            "FileHash-SHA1": 390,
            "FileHash-SHA256": 2452,
            "CVE": 1,
            "SSLCertFingerprint": 1,
            "IPv6": 9,
            "email": 4,
            "CIDR": 1
          },
          "indicator_count": 6607,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "12 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69d5859750dfad7fe7989ef4",
          "name": "Apple / Cloud/ Data Network within Zergeca / Zerg Botnet \u2022 MacSync_AppleScript_Stealer",
          "description": "",
          "modified": "2026-04-07T22:30:47.312000",
          "created": "2026-04-07T22:30:47.312000",
          "tags": [
            "added active",
            "related pulses",
            "found",
            "zergeca botnet",
            "zergeca",
            "upx packer",
            "khtml",
            "gecko",
            "united",
            "ids detections",
            "yara detections",
            "https domain",
            "tls sni",
            "ip lookup",
            "external ip",
            "malware",
            "encrypt",
            "techniques",
            "modify system",
            "process",
            "https",
            "performs dns",
            "tls version",
            "reads cpu",
            "proc indicative",
            "urls",
            "downloads",
            "persistence",
            "data upload",
            "extraction",
            "find s",
            "failed",
            "typ don",
            "ipv4 url",
            "canreb",
            "type ipv4",
            "url domail",
            "domail showing",
            "elf conta",
            "typ url",
            "zercega",
            "enter sc",
            "type",
            "include",
            "review",
            "n1 exclude",
            "suggestedincc",
            "a50 typ",
            "ipv4",
            "matches yara",
            "dete data",
            "yara detectea",
            "cro intormation",
            "exclude sugges",
            "sc car",
            "extra lte",
            "referen",
            "l extraction",
            "droo anv",
            "extr referen",
            "lte all",
            "je matches",
            "yara detel",
            "yara dete",
            "include review",
            "exchange lte",
            "je elf",
            "passive dns",
            "certificate",
            "files",
            "trojan",
            "related tags",
            "worm",
            "medium",
            "write c",
            "write",
            "high",
            "binary",
            "yara rule",
            "default",
            "moved",
            "schaan",
            "as834 ipxo",
            "dynamicloader",
            "program",
            "ee fc",
            "users",
            "ff d5",
            "python",
            "windows",
            "autoit",
            "confuserex",
            "stream",
            "guard",
            "launcher",
            "updater",
            "global",
            "america flag",
            "ashburn",
            "america related",
            "tags",
            "indicator facts",
            "historical otx",
            "controller fake",
            "akamai rank",
            "russia",
            "present nov",
            "aaaa",
            "link",
            "a domains",
            "ip address",
            "meta",
            "cve -2014-2321",
            "handle",
            "address range",
            "cidr",
            "network name",
            "allocation type",
            "pa status",
            "whois server",
            "included iocs",
            "manually add",
            "iocs o",
            "iocs",
            "sugges",
            "stop show",
            "types",
            "external",
            "ripe",
            "pa abusec",
            "neterra",
            "sofia",
            "bulgaria phone",
            "filtered person",
            "neven dilkov",
            "bg phone",
            "filtered route",
            "a5ip",
            "aa2023",
            "aamirai",
            "a2scanner",
            "apple inc",
            "issuer",
            "valid",
            "algorit",
            "thum",
            "name",
            "a9 a8",
            "status",
            "macho",
            "macho 64bit",
            "mac os",
            "x macho",
            "intel",
            "typ no",
            "td td",
            "td tr",
            "a td",
            "dynamic dns",
            "date",
            "name servers",
            "arial",
            "error",
            "null",
            "enough",
            "hosts",
            "win32",
            "fast",
            "contacted",
            "MacSync_AppleScript_Stealer",
            "cve-2018-10562",
            "source",
            "roboto",
            "robotodraft",
            "helvetica",
            "iframe",
            "manually ada",
            "review iocs",
            "abv0",
            "qaeaav0",
            "cptbdev",
            "w4uninitialized",
            "qaeaav01",
            "abv01",
            "qaexn",
            "qbenxz",
            "phoneidentify",
            "qbepaxxz"
          ],
          "references": [
            "https://apple.k8s.joewa.com/\u2022 https://com.apple \u2022 freedns.afraid.org",
            "IPv4 188.114.96.1 In CDN range: provider=cloudflare \u2022 dns.google \u2022 push.apple.com",
            "Zercega \u2022 IPv4 84.54.51.82",
            "Zercega \u2022  http://bot.hamsterrace.space:5966/",
            "Zercega \u2022  multi-user.target",
            "Zercega \u2022  ootheca.pw",
            "CVE-2023-22518\tCVE-2018-10562\t CVE-2024-6387\tCVE-2025-20393",
            "Crowdsourced IDS rules: 6b81d548c0fbd7a2275bb0d29deca0de96c1584ce7aadaf4f5dac3cb28ee9c29",
            "Matches rule Suspicious DNS Query for IP Lookup Service APIs by Brandon George (blog post), Thomas Patzke",
            "Matches rule Suspicious Network Connection to IP Lookup Service APIs by Janantha Marasinghe, Nasreddine Bencherchali (Nextron Systems)",
            "Matches rule Local System Accounts Discovery - Linux by Alejandro Ortuno, oscd.community",
            "Crowdsourced IDS rules:",
            "Matches rule ET POLICY External IP Lookup ipinfo.io",
            "Matches rule ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io)",
            "Matches rule ET INFO External IP Check (checkip .amazonaws .com)",
            "Matches rule SERVER-OTHER Squid HTTP Vary response header denial of service attempt",
            "Matches rule ET INFO Observed Cloudflare DNS over HTTPS Domain (cloudflare-dns .com in TLS SNI) Unique rule identifier: This rule belongs to a private collection.",
            "Yara detected: Xmrig cryptocurrency miner",
            "Yara detected: Reads CPU information from /proc indicative of miner or evasive malware Compliance",
            "meta.com \u2022 meta.com.apple",
            "geomi.service \u2022 74b23c7dc3cca50a6d78e18116e31ca189a4549de35ff49903af2c4c0bd06a63",
            "ELF contains segments with high entropy indicating compressed/encrypted content",
            "/etc/systemd/system/geomi.service File type: ASCII text",
            "http://www.bing.lt/search?q=",
            "Win.Malware.Salat-10058846-0",
            "Yara Detections: MacSync_AppleScript_Stealer",
            "Alerts: antisandbox_unhook hardware_id_profiling ntdll_memory_unhooking binary_yara",
            "Alerts: recon _fingerprint registers_vectored_exception_handler creates_suspended_process",
            "Alerts: resumethread_remote_process enumerates_running_processes reads_self",
            "Alerts: packer_unknown_pe_section_name script_tool_executed",
            "Alerts: queries_computer_name queries_keyboard_layout queries_locale_api",
            "Alerts: antidebug_setunhandledexceptionfilter stealth_timeout language_check_registry",
            "Contacted:  188.114.96.1 Domains Contacted dns.google",
            "distracted-chebyshev.84-54-51-82.plesk.page \u2022 domain plesk.page"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Zergeca",
              "display_name": "Zergeca",
              "target": null
            },
            {
              "id": "AutoIT",
              "display_name": "AutoIT",
              "target": null
            },
            {
              "id": "Win.Malware.Salat-10058846-0",
              "display_name": "Win.Malware.Salat-10058846-0",
              "target": null
            },
            {
              "id": "ALF:JASYP:TrojanDownloader:Win32/SmallAgent!",
              "display_name": "ALF:JASYP:TrojanDownloader:Win32/SmallAgent!",
              "target": null
            },
            {
              "id": "Win.Trojan.Emotet-9850453-0",
              "display_name": "Win.Trojan.Emotet-9850453-0",
              "target": null
            },
            {
              "id": "Worm:Win32/AutoRun!atmn",
              "display_name": "Worm:Win32/AutoRun!atmn",
              "target": "/malware/Worm:Win32/AutoRun!atmn"
            },
            {
              "id": "Win.Trojan.Tofsee-7102058-0\tBackdoor:Win32/Tofsee.T",
              "display_name": "Win.Trojan.Tofsee-7102058-0\tBackdoor:Win32/Tofsee.T",
              "target": "/malware/Win.Trojan.Tofsee-7102058-0\tBackdoor:Win32/Tofsee.T"
            },
            {
              "id": "CVE-2023-22518",
              "display_name": "CVE-2023-22518",
              "target": null
            },
            {
              "id": "CVE-2024-6387",
              "display_name": "CVE-2024-6387",
              "target": null
            },
            {
              "id": "CVE-2025-20393",
              "display_name": "CVE-2025-20393",
              "target": null
            },
            {
              "id": "CVE-2014-2321",
              "display_name": "CVE-2014-2321",
              "target": null
            },
            {
              "id": "Botnet",
              "display_name": "Botnet",
              "target": null
            },
            {
              "id": "CVE-2018-10562",
              "display_name": "CVE-2018-10562",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1543",
              "name": "Create or Modify System Process",
              "display_name": "T1543 - Create or Modify System Process"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "T1543.002",
              "name": "Systemd Service",
              "display_name": "T1543.002 - Systemd Service"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "TA0005",
              "name": "Defense Evasion",
              "display_name": "TA0005 - Defense Evasion"
            },
            {
              "id": "T1222",
              "name": "File and Directory Permissions Modification",
              "display_name": "T1222 - File and Directory Permissions Modification"
            },
            {
              "id": "T1222.002",
              "name": "Linux and Mac File and Directory Permissions Modification",
              "display_name": "T1222.002 - Linux and Mac File and Directory Permissions Modification"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1016",
              "name": "System Network Configuration Discovery",
              "display_name": "T1016 - System Network Configuration Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1571",
              "name": "Non-Standard Port",
              "display_name": "T1571 - Non-Standard Port"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1070.004",
              "name": "File Deletion",
              "display_name": "T1070.004 - File Deletion"
            },
            {
              "id": "T1518.001",
              "name": "Security Software Discovery",
              "display_name": "T1518.001 - Security Software Discovery"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1037.002",
              "name": "Logon Script (Mac)",
              "display_name": "T1037.002 - Logon Script (Mac)"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "IPv4": 169,
            "URL": 1871,
            "domain": 393,
            "hostname": 925,
            "FileHash-MD5": 391,
            "FileHash-SHA1": 390,
            "FileHash-SHA256": 2452,
            "CVE": 1,
            "SSLCertFingerprint": 1,
            "IPv6": 9,
            "email": 4,
            "CIDR": 1
          },
          "indicator_count": 6607,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "12 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6958780c8479a9d69920c3d8",
          "name": "Telnet - Mirai \u2022 Dark Nexus BusyBox iOS Attack",
          "description": "There\u2019s enough here to cause an outage. I will stop here. Illegal activities to silence victim and block her from financial settlement award for permanent injuries under workers compensation in a premise and healthcare worker assault scenario. Attorneys estimated her case to be above $100 million but knew she\u2019d be tampered with. Mark Montano MD  forewarned her but is culpable. Still attacking family of victim.\n[ True- otx auto generated: Adversaries may be able to gain access to a victim's network through a drive-by attack, as well as using a short-term SSL certificate, in order to target the victim.] |||\nPositive:\nT1140 - Deobfuscate/Decode Files or Information\nSuspicious IP Address\n104.21.51.140, 172.67.181.41\nLocation United States ASN\nModif AS13335 cloudflare\nAutomate Nameservers:\nns1.colocrossing.com.",
          "modified": "2026-02-02T01:02:46.327000",
          "created": "2026-01-03T01:59:40.530000",
          "tags": [
            "united",
            "moved",
            "title",
            "passive dns",
            "ipv4 add",
            "urls",
            "files",
            "hosting",
            "reverse dns",
            "location united",
            "hash avast",
            "avg clamav",
            "msdefender mar",
            "read c",
            "create c",
            "medium",
            "search",
            "memcommit",
            "high",
            "checks",
            "windows",
            "execution",
            "dock",
            "write",
            "persistence",
            "capture",
            "local",
            "ref b",
            "wed may",
            "backdoor",
            "mtb aug",
            "next associated",
            "mtb dec",
            "twitter",
            "smoke loader",
            "malware",
            "virtool",
            "hacktool",
            "data upload",
            "present dec",
            "mtb apr",
            "win32",
            "trojan",
            "worm",
            "lowfi",
            "cybota",
            "expiration date",
            "name servers",
            "ipv4",
            "url analysis",
            "port",
            "destination",
            "telnet login",
            "bad login",
            "gpl telnet",
            "suspicious path",
            "busybox",
            "tcp syn",
            "et telnet",
            "path",
            "mirai",
            "filehash",
            "av detections",
            "ids detections",
            "yara detections",
            "alerts",
            "analysis date",
            "file score",
            "america",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "learn",
            "t1179 hooking",
            "installs",
            "t1035 service",
            "adversaries",
            "msie",
            "windows nt",
            "slcc2",
            "media center",
            "y013",
            "flag",
            "span",
            "accept",
            "core",
            "february",
            "hybrid",
            "malicious",
            "general",
            "click",
            "strings",
            "roboto",
            "next",
            "usa windows",
            "finished",
            "queueprogress",
            "timestamp input",
            "threat level",
            "october",
            "september",
            "hwp support",
            "fresh",
            "win64",
            "khtml",
            "gecko",
            "brand",
            "microsoft edge",
            "programfiles",
            "comspec",
            "model",
            "iframe",
            "form",
            "listeners",
            "initial access",
            "t1590 gather",
            "victim network",
            "ssl certificate",
            "quasi government",
            "jeffrey reimer",
            "palantir",
            "Regis university",
            "otx hp",
            "apple",
            "pegasus",
            "h5 data center",
            "florence colorado",
            "brian sabey",
            "target : Tsara Brasheaers",
            "aig",
            "industry and commerce",
            "united states",
            "State of Colorado.",
            "date",
            "status",
            "domain",
            "hostname add",
            "pulse pulses",
            "files ip",
            "address",
            "url https",
            "url http",
            "hostname",
            "show",
            "type indicator",
            "source hostname",
            "entries",
            "Prometheus Intelligence Technology",
            "pulse submit",
            "america flag",
            "body",
            "dynamicloader",
            "microsoft azure",
            "tls issuing",
            "named pipe",
            "json",
            "ascii text",
            "lredmond",
            "Apple",
            "Telnet",
            "BusyBox",
            "Pegasus",
            "Colorado State Fixer: Christopher P. Ahmann",
            "Hijacker: Brian Sabey",
            "For: Concentra",
            "Protecting Assaulter: Jeffrey Reimer",
            "For: AIG",
            "For Industry and Commerce",
            "For: Quasi Government",
            "For: Workers Compensation",
            "Authorities",
            "Law Enforcement Dark",
            "Silencing",
            "Tampering with a Victim",
            "Meta",
            "Palantir",
            "Google",
            "Bing",
            "Microsoft",
            "ColoCrossing",
            "Associates",
            "hit men"
          ],
          "references": [
            "ET Telnet |  https://www.colocrossing.com | velocity servers",
            "https://www.endgamesystems.com/\t This is not a game. This is about people\u2019s lives",
            "TELNET SUSPICIOUS Path to BusyBox\", TELNET login failed\", is__elf \u007fELF dead_host",
            "Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually)",
            "(legitimate services will remain up-and-running usually) High |  ID dead_host",
            "ELF:Mirai-GH\\ [Trj] ,  Unix.Trojan.DarkNexus-7679166-0",
            "IDS Detections SUSPICIOUS Path to BusyBox TELNET login failed Bad Login",
            "Yara Detections is__elf",
            "Alerts dead_host network_icmp tcp_syn_scan nolookup_communication nids_alert writes_to_stdout",
            "Yara Detections is__elf ,  ELFHighEntropy ,  elf_empty_sections",
            "http://appleid.apple.com.msg206.site/   http://www.icloud.com.msg206.site/   https://appleid.apple.com.msg206.site/",
            "https://colocrossing.com/ \u2022 https://www.colocrossing.com/colocation\t l",
            "https://prometheussteakhouse.lupi.delivery/ Thanks! I\u2019m heavy into Picinha. 2 Brazilian roasts please!",
            "https://www.colocrossing.com/",
            "(TLI did you do her that dirty?) Why\u2019SCS\u2019? Pure shame on you.",
            "In all seriousness. The severity of  injuries and outcomes 1 victim had is aligned cyber attacks by Q.Gov",
            "104.21.51.140, 172.67.181.41",
            "Detections Win.Packed.ImminentMonitorRAT-9892275-0 ,  HackTool:MSIL/Boilod.C!bit",
            "IDS Detections: Observed Cloudflare DNS over HTTPS Domain (cloudflare-dns .com in TLS SNI)",
            "Alerts: procmem_yara injection_inter_process ransomware_file_modifications stack_pivot",
            "stealth_file cape_detected_threat injection_process_hollowing antiav_detectfile  injection_runpe",
            "Alerts: cape_extracted_content infostealer_cookies recon_fingerprint powershell_download",
            "Alerts: dynamic_function_loading ipc_namedpipe  createtoolhelp32snapshot_module_enumeration",
            "IP\u2019s Contacted: 142.250.147.101  88.221.104.56  13.33.141.29  35.186.249.72  151.101.1.192",
            "IP\u2019s Contacted 178.249.97.99  178.249.97.98  178.249.97.23  84.53.172.74  88.221.104.82",
            "Domains Contacted: accounts.google.com chrome.cloudflare-dns.com clients2.googleusercontent.com",
            "This is hard to comprehend or put into indelible words."
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Unix.Trojan.DarkNexus-7679166-0",
              "display_name": "Unix.Trojan.DarkNexus-7679166-0",
              "target": null
            },
            {
              "id": "HackTool:MSIL/Boilod.C!bit",
              "display_name": "HackTool:MSIL/Boilod.C!bit",
              "target": "/malware/HackTool:MSIL/Boilod.C!bit"
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "T1035",
              "name": "Service Execution",
              "display_name": "T1035 - Service Execution"
            },
            {
              "id": "T1179",
              "name": "Hooking",
              "display_name": "T1179 - Hooking"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1189",
              "name": "Drive-by Compromise",
              "display_name": "T1189 - Drive-by Compromise"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1147",
              "name": "Hidden Users",
              "display_name": "T1147 - Hidden Users"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1080",
              "name": "Taint Shared Content",
              "display_name": "T1080 - Taint Shared Content"
            },
            {
              "id": "T1098",
              "name": "Account Manipulation",
              "display_name": "T1098 - Account Manipulation"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1557",
              "name": "Man-in-the-Middle",
              "display_name": "T1557 - Man-in-the-Middle"
            },
            {
              "id": "T1185",
              "name": "Man in the Browser",
              "display_name": "T1185 - Man in the Browser"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1583.001",
              "name": "Domains",
              "display_name": "T1583.001 - Domains"
            },
            {
              "id": "T1204.001",
              "name": "Malicious Link",
              "display_name": "T1204.001 - Malicious Link"
            },
            {
              "id": "T1553.002",
              "name": "Code Signing",
              "display_name": "T1553.002 - Code Signing"
            },
            {
              "id": "T1518.001",
              "name": "Security Software Discovery",
              "display_name": "T1518.001 - Security Software Discovery"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1204.002",
              "name": "Malicious File",
              "display_name": "T1204.002 - Malicious File"
            },
            {
              "id": "T1462",
              "name": "Malicious Software Development Tools",
              "display_name": "T1462 - Malicious Software Development Tools"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "TA0037",
              "name": "Command and Control",
              "display_name": "TA0037 - Command and Control"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1459",
              "name": "Device Unlock Code Guessing or Brute Force",
              "display_name": "T1459 - Device Unlock Code Guessing or Brute Force"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            }
          ],
          "industries": [
            "Technology",
            "Healthcare",
            "Insurance",
            "Civil Society"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 6390,
            "domain": 723,
            "hostname": 1978,
            "FileHash-SHA256": 1912,
            "FileHash-MD5": 410,
            "FileHash-SHA1": 306,
            "email": 3,
            "SSLCertFingerprint": 28,
            "CVE": 3
          },
          "indicator_count": 11753,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 142,
          "modified_text": "76 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "68a956460f257cf96c454071",
          "name": "Piracy \u2022 Cloudfront \u2022 Ransom \u2022 Code Overlaps \u2022 Unrelenting attacks.",
          "description": "Indie songwriter , publisher,  promoter, producer & her artists affected by years long copyright infringement , hacking & reputation damage. Website now downed.\n\nBrashears had been involved in music under  pseudonyms for decades as a was songwriter , ghostwriter, sold catalogs , charting singles,  chops was sponsored. In this instance music was grossly pirated. Initially asked for hook rights then told  hook would be used without her permission. Believed dispute resolved verbally + copyright.\n\nTsara learned from an insider/s her hook was pirated & used by artists listed. Modifications  make songs pirated samples.\nBrashears song written in 2010 later vaulted in a  private catalog later released by her artist.  YouTube audio quality tampering on pirated song. \n\nBrashears loved music, not the industry as an artist; preferring business. Always held her  privacy to remain unknown. Tsara lived 10 lives at once.\n\nLikely involves male who contacted her @ by email as mentioned in earlier pulse.\n#trulymissed",
          "modified": "2025-09-21T21:03:28.771000",
          "created": "2025-08-23T05:48:54.534000",
          "tags": [
            "domains",
            "hashes",
            "passive dns",
            "urls",
            "url add",
            "http",
            "hostname",
            "files domain",
            "files related",
            "related tags",
            "a domains",
            "entries",
            "next associated",
            "files show",
            "date hash",
            "avast avg",
            "trojanspy",
            "entries http",
            "scans show",
            "search",
            "body",
            "body doctype",
            "dynamicloader",
            "medium",
            "reg add",
            "regsz d",
            "high",
            "windows",
            "audio drivers",
            "write c",
            "virtool",
            "copy",
            "write",
            "june",
            "united",
            "unknown ns",
            "samsara",
            "new york",
            "city ny",
            "ip address",
            "record value",
            "meta",
            "date",
            "music",
            "encrypt",
            "win32",
            "dangeroussig",
            "lowfi",
            "msie",
            "chrome",
            "precondition",
            "trojan",
            "title",
            "canada unknown",
            "unknown cname",
            "domain add",
            "files",
            "location united",
            "hostname add",
            "verdict",
            "domain",
            "files ip",
            "address",
            "asn as13335",
            "hash avast",
            "avg clamav",
            "msdefender feb",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "spawns",
            "mitre att",
            "ck techniques",
            "file",
            "size",
            "ascii text",
            "pattern match",
            "august",
            "hybrid",
            "general",
            "path",
            "click",
            "strings",
            "roboto",
            "mozilla",
            "contact",
            "t1179 hooking",
            "installs",
            "t1035 service",
            "crlf line",
            "runtime process",
            "malicious",
            "unknown",
            "ssl certificate",
            "defense evasion",
            "amazon02",
            "americachicago",
            "windows nt",
            "win64",
            "khtml",
            "gecko",
            "veryhigh",
            "found",
            "geo menifee",
            "california",
            "as30148",
            "us note",
            "route",
            "ptr record",
            "information",
            "t1053",
            "taskjob",
            "t1055",
            "injection",
            "t1082",
            "t1112",
            "modify registry",
            "t1119",
            "t1129",
            "service",
            "capture",
            "url http",
            "url https",
            "type indicator",
            "role title",
            "added active",
            "related pulses",
            "showing",
            "ipv6",
            "ipv4",
            "dicator role",
            "title added",
            "active related",
            "sweden",
            "netherlands",
            "scan",
            "iocs",
            "learn more",
            "types of",
            "kingdom",
            "united kingdom",
            "denmark",
            "icator role",
            "malware attacks",
            "find encrypted",
            "t1021",
            "remote",
            "t1068",
            "ta0043",
            "t1016",
            "discovery",
            "t1221",
            "nobody love",
            "tori",
            "kelley",
            "dj khaled",
            "justin bieber",
            "sophos video",
            "x rack",
            "x frame",
            "october",
            "songculture",
            "song culture",
            "tsara brashears",
            "jess 4",
            "queryfoundry",
            "beyond sampling",
            "pirated",
            "youtube",
            "spotify",
            "twitter",
            "spy",
            "tracking"
          ],
          "references": [
            "https://songculture.com/tsara-brashears-music | Cloudfront below was attached to body of work",
            "https://d3jjg4nf4bbybe.cloudfront.net/u/210425/397f80d871fe6dla1704cela4b712e387ed8a48a/large/kedence-out-of-my-sight",
            "\"Nobody Love\" Tori Kelley \"'m the One\" DJ Khaled ft Justin Bieber (Pirated Hook)",
            "8-25-220-162-static.reverse.queryfoundry.net",
            "http://117-114-251-162-static.reverse.queryfoundry.net/ - queryfoundry.net",
            "https://www.youtube.com/watch?v=bJWJbOqg9cM - Falsely flagged to demonetize and not rank",
            "Dr.Web violence/adult content (False) ThreatSeeker social web - youtube",
            "music.apple.com \u2022 linktr.ee \u2022 sentient.industries?  samsara has been showing up often.",
            "There is money in the industry for well established , \u2018souled\u2019 out artists. It\u2019s a racket! T signed & exited early",
            "Worked at some studios attacked by Lazarus Group who allegedly attacked Sony Music",
            "I apologize if you don\u2019t like my background stories",
            "\u2018Passin\u2019 I deleted the pulses you asked me to. Your links were malicious. I haven\u2019t weaponize anything  I\u2019ve learned... yet"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Nivdort",
              "display_name": "Nivdort",
              "target": null
            },
            {
              "id": "Virtool",
              "display_name": "Virtool",
              "target": null
            },
            {
              "id": "Evo",
              "display_name": "Evo",
              "target": null
            },
            {
              "id": "Trojanspy",
              "display_name": "Trojanspy",
              "target": null
            },
            {
              "id": "Malware",
              "display_name": "Malware",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "TrojanSpy:Win32/Nivdort",
              "display_name": "TrojanSpy:Win32/Nivdort",
              "target": "/malware/TrojanSpy:Win32/Nivdort"
            },
            {
              "id": "Ransom",
              "display_name": "Ransom",
              "target": null
            },
            {
              "id": "Malware Gen",
              "display_name": "Malware Gen",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1590",
              "name": "Gather Victim Network Information",
              "display_name": "T1590 - Gather Victim Network Information"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1035",
              "name": "Service Execution",
              "display_name": "T1035 - Service Execution"
            },
            {
              "id": "T1179",
              "name": "Hooking",
              "display_name": "T1179 - Hooking"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "T1016",
              "name": "System Network Configuration Discovery",
              "display_name": "T1016 - System Network Configuration Discovery"
            },
            {
              "id": "T1021",
              "name": "Remote Services",
              "display_name": "T1021 - Remote Services"
            },
            {
              "id": "T1022",
              "name": "Data Encrypted",
              "display_name": "T1022 - Data Encrypted"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1221",
              "name": "Template Injection",
              "display_name": "T1221 - Template Injection"
            },
            {
              "id": "T1222",
              "name": "File and Directory Permissions Modification",
              "display_name": "T1222 - File and Directory Permissions Modification"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1593.001",
              "name": "Social Media",
              "display_name": "T1593.001 - Social Media"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1486",
              "name": "Data Encrypted for Impact",
              "display_name": "T1486 - Data Encrypted for Impact"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            }
          ],
          "industries": [
            "Media",
            "Technology",
            "Telecommunications"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 33,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1833,
            "hostname": 902,
            "domain": 386,
            "FileHash-MD5": 406,
            "FileHash-SHA1": 402,
            "FileHash-SHA256": 1437,
            "email": 2,
            "SSLCertFingerprint": 5,
            "CIDR": 2
          },
          "indicator_count": 5375,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 144,
          "modified_text": "210 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6647908c09468f42bc1249f1",
          "name": "University of Alberta Azure/Entra Compromised Tenant Compromized Institution",
          "description": "Update: Academic/Non-Academic Staff Unions, 3rd party org, & some profs/students/alumni tried raising concerns to Admins/President/IST & CISO => Maintaining position they will not be looking into reported problems re: Cybersecurity under any circumstances = more time more problems? Attempts to advocate -> Harrass./Discrim./De-humanizing responses from admins (representing all folks - recorded). \nTenant ID: 718b8a9b-44d8-441a-a344-4294ea842172 = This pulse is 1 example (small) of problems.\n\nPrimary domain\nualbertaca.onmicrosoft.com\nCustom Domain Names\nualberta.ca\nVerified\nualbertaca.onmicrosoft.com",
          "modified": "2025-03-01T04:59:57.222000",
          "created": "2024-05-17T17:14:52.317000",
          "tags": [
            "false",
            "true",
            "visible",
            "application",
            "microsoft teams",
            "microsoft azure",
            "office",
            "service",
            "dynamics",
            "hidden",
            "android",
            "explorer",
            "write",
            "connector",
            "test",
            "sharepoint",
            "live",
            "meister",
            "tools",
            "desktop",
            "spark",
            "front",
            "enterprise",
            "designer",
            "atlas",
            "premium",
            "assistant",
            "allow",
            "azureadmyorg",
            "game",
            "verify",
            "microsoft power",
            "channelsurfcli",
            "mtd1",
            "file transfer",
            "magnus",
            "microsoft crm",
            "youth"
          ],
          "references": [
            "All - EnterpriseAppsList.csv",
            "AppRegistrationList.csv",
            "https://tria.ge/240517-vc7c1shc62/behavioral1",
            "https://tria.ge/240517-vdwb5shc71/behavioral1",
            "https://tria.ge/240517-vqxezaaa33/behavioral1",
            "https://tria.ge/240517-t9pc2ahb2t",
            "https://www.virustotal.com/graph/embed/g9453a2f58a3340f18120987c2b4d710dbb44ded88c434abf8894458a98c7bd4b?theme=dark",
            "https://www.virustotal.com/gui/collection/b84a19d60ec7cd6d546a3f145dff8987128d0f499161118b46de22718d4713cd/iocs",
            "https://www.virustotal.com/gui/collection/b84a19d60ec7cd6d546a3f145dff8987128d0f499161118b46de22718d4713cd/graph",
            "https://www.virustotal.com/gui/collection/b84a19d60ec7cd6d546a3f145dff8987128d0f499161118b46de22718d4713cd/summary",
            "https://www.filescan.io/uploads/66479b483313f70f0afe3dbb",
            "https://www.filescan.io/uploads/664799c9d5c40bffee6106d7",
            "Thor Scan: S-I9VvMTB6cZU",
            "https://www.filescan.io/uploads/664ba368d5c40bffee63b1ee/reports/31817751-6b5d-45df-8813-472aa6c756a3/overview",
            "https://www.filescan.io/uploads/664ba8a20663ff3c2ec6428a/reports/09d3d82a-7ec1-4804-93e5-5ae691fbb7f2/overview",
            "https://imp0rtp3.wordpress.com/2021/08/12/tetris/",
            "https://www.filescan.io/uploads/664bb0cd7c9fb1468fc610c5/reports/00c78e4d-2156-4906-a106-ebf7e2723251/overview",
            "https://www.filescan.io/uploads/664bb40fbc04dffa92240ca2/reports/398074f2-c7b6-40e9-9b5c-4225cc990473/overview",
            "https://www.filescan.io/uploads/664bb683bc04dffa92241015/reports/92b70fd6-97d7-4386-8465-f3fd79043843/overview",
            "https://tria.ge/240521-q4s79agb25/static1",
            "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/664f906322f5af13cdfb50be",
            "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/664f906222f5af13cdfb5093",
            "https://www.filescan.io/uploads/666d69ff6b8dba248b414767/reports/dda2c8a1-96fd-4c00-9cbc-c64c4685a804/overview",
            "https://www.filescan.io/uploads/666d69ff6b8dba248b414767",
            "https://viz.greynoise.io/analysis/33e9b33b-b932-4c43-9be1-3e2d6f9cb4b3",
            "https://viz.greynoise.io/analysis/e51d9a15-d802-4d51-9a70-17803dc2693a",
            "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d01d2b67682d81c00f37b",
            "Above Malcore Strings: All - EnterpriseAppsList, AppRegistration, EnterpriseAppslist, exportGroup, exportUsers, HiddenApps - EnterpriseAppsList****",
            "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d00975ea31558d54fceea",
            "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667cff1a5ea31558d54fcbf6",
            "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d0107b44401771de9ebf2",
            "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d00356dd8f43b723a915a",
            "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667cffec5ea31558d54fcda2",
            "https://www.hudsonrock.com/search?domain=ualberta.ca",
            "https://www.criminalip.io/domain/report?scan_id=13798622",
            "https://viz.greynoise.io/analysis/9635144c-db8f-47ab-a83a-5785602244cf - 07.03.24",
            "https://urlscan.io/search/#ualberta.ca",
            "https://www.virustotal.com/gui/collection/0ca12fcdd125ec5a5055180ee828b98d47b8b2e920660be559c2b602266b6b1d/iocs",
            "https://sitereport.netcraft.com/?url=http://ualberta.ca",
            "https://www.wordfence.com/blog/2022/10/threat-advisory-monitoring-cve-2022-42889-text4shell-exploit-attempts/",
            "https://tenantresolution.pingcastle.com/Search - Tenant still active (07.19.24) - Good jobs ya'll",
            "https://www.virustotal.com/graph/embed/gf1d5aa209c7f4fd086e4cb17dcd0af52421ea4bae87d49fe9b4076b382612f0e?theme=dark",
            "https://viz.greynoise.io/query/AS36351%20classification:%22malicious%22",
            "https://viz.greynoise.io/query/AS60068%20classification:%22malicious%22",
            "https://viz.greynoise.io/query/AS8075%20classification:%22malicious%22",
            "https://viz.greynoise.io/query/AS15169%20classification:%22malicious%22",
            "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d01d2b67682d81c00f37b - https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d01d2b67682d81c00f37b = Hidden Apps - Enterprise Apps List"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Canada"
          ],
          "malware_families": [],
          "attack_ids": [],
          "industries": [
            "Education",
            "Technology",
            "Healthcare",
            "Telecommunications",
            "Government"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 25,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 7,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Disable_Duck",
            "id": "244325",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1703,
            "FileHash-SHA256": 90472,
            "URL": 99185,
            "domain": 82954,
            "hostname": 39041,
            "FileHash-SHA1": 1624,
            "email": 4658,
            "CVE": 12
          },
          "indicator_count": 319649,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "414 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65eb9b25110526c6b2a0ada5",
          "name": "VirTool:MSIL/CryptInject.CF!MTB | Rexxfield? Weird stuff",
          "description": "",
          "modified": "2024-03-08T23:11:33.426000",
          "created": "2024-03-08T23:11:33.426000",
          "tags": [
            "threat",
            "feeds ioc",
            "new ioc",
            "teams api",
            "contact",
            "paste",
            "iocs",
            "analyze",
            "ssl certificate",
            "whois record",
            "historical ssl",
            "resolutions",
            "referrer",
            "whois whois",
            "communicating",
            "contacted",
            "family",
            "roots",
            "lolkek",
            "redline stealer",
            "hacktool",
            "html info",
            "title rexxfield",
            "services",
            "identify",
            "meta tags",
            "rexxfield cyber",
            "investigation",
            "divi child",
            "site kit",
            "google",
            "united",
            "unknown",
            "as24940 hetzner",
            "germany unknown",
            "passive dns",
            "urls",
            "title",
            "moved",
            "scan endpoints",
            "all octoseek",
            "body",
            "cyber stalking",
            "pornographer",
            "urls url",
            "files",
            "ip address",
            "execution",
            "metro",
            "medium",
            "show",
            "search",
            "ids detections",
            "yara detections",
            "win32",
            "ppi useragent",
            "installcapital",
            "http",
            "packing t1045",
            "malware",
            "write",
            "obsession",
            "malvertizing",
            "masquerading",
            "ipv4",
            "pulse submit",
            "url analysis",
            "cookie",
            "status",
            "domain",
            "creation date",
            "trojan",
            "date",
            "expiration date",
            "name servers",
            "trojanclicker",
            "encrypt",
            "error",
            "ransomware",
            "malware generator",
            "meta",
            "for privacy",
            "aaaa",
            "komodo",
            "asnone united",
            "alfper",
            "as22612",
            "nxdomain",
            "gmt x",
            "ransom",
            "virtool",
            "log id",
            "gmtn",
            "digicert tls",
            "rsa sha256",
            "tls web",
            "full name",
            "digicert inc",
            "california",
            "false",
            "pulse pulses",
            "location united",
            "as16276",
            "as14061",
            "code",
            "next",
            "url http",
            "hostname",
            "files domain",
            "files related",
            "ghost rat",
            "webtoolbar",
            "nanocore rat",
            "gamehack",
            "cobalt strike",
            "redlinestealer",
            "installcore",
            "installbrain",
            "emotet",
            "tofsee",
            "bradesco",
            "agent tesla",
            "trojanspy",
            "suppobox",
            "occamy",
            "dnspionage",
            "stealer",
            "networm",
            "as13414 twitter",
            "as32934",
            "script urls",
            "a domains",
            "worm",
            "entries",
            "meta http",
            "window",
            "select contact",
            "domain holder",
            "nexus category",
            "tackle company",
            "postal code",
            "component loop",
            "apache",
            "pragma",
            "value0",
            "ioc search",
            "threat analyzer",
            "hostnames",
            "dangerous",
            "target",
            "targeting",
            "hacker profile",
            "cybercrime",
            "fraud services",
            "strange",
            "tsara brashears",
            "michael roberts",
            "tracey richter",
            "voyeurism",
            "slander",
            "password",
            "hijacker"
          ],
          "references": [
            "https://rexxfield.com/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian | OS & iOS Password and Password Cracker",
            "www.akhaltsikhe.gov.ge [Germany?]",
            "screencasts.rexxfield.com",
            "https://rexxfield.com [ hmmm...inc.legal] is Alienvault a subsidiary of Rexxfields unwarranted investigation/spy campaign? Confused",
            "https://www.akhaltsikhe.gov.ge/ | GMT Server LiteSpeed location",
            "94.130.71.173 [scanning host]",
            "http://www.objectaid.com/update/current/p2.index [AIN Phishing IOC's]",
            "https://www.couriermail.com.au/ipad/custody-bid-strands-family/news-story/23c2c9a5fc984edc04d29655c641f484",
            "Michael Roberts Australia, Germany, Iowa, New York Friend of Ben",
            "Michael Roberts - murder suspect, victim, hacker, PI",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [text, email, collection]",
            "https://ladys.one/xxx/a-tsara-brashears-zafira-porn",
            "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net [BitCoinAussie ?]",
            "98cc05d9c12c214deadfe71af22cd3862e7417c0 [backdoor | PPI User-Agent (InstallCapital)]",
            "a.nel.cloudflare.com / api.w.org",
            "miles.ns.cloudflare.com",
            "https://otx.alienvault.com/indicator/url/https://media.toxtren.com/redirect.aspx?pid=272789&&bid=1971&&lpid=2119&&subid=18b8dh9scxi7sbl11f&&sref=inhousecpa&&inhousecpa=Kiev_Dima_BR_Setki",
            "https://www.google.com/?authuser=0"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "LolKek",
              "display_name": "LolKek",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "RedLine Stealer",
              "display_name": "RedLine Stealer",
              "target": null
            },
            {
              "id": "TrojanClicker",
              "display_name": "TrojanClicker",
              "target": null
            },
            {
              "id": "Win32:Malware-gen",
              "display_name": "Win32:Malware-gen",
              "target": null
            },
            {
              "id": "ALFPER:InstallCapital",
              "display_name": "ALFPER:InstallCapital",
              "target": null
            },
            {
              "id": "VirTool:MSIL/CryptInject.CF!MTB",
              "display_name": "VirTool:MSIL/CryptInject.CF!MTB",
              "target": "/malware/VirTool:MSIL/CryptInject.CF!MTB"
            },
            {
              "id": "Win.Malware.Downloadguide-6803841-0",
              "display_name": "Win.Malware.Downloadguide-6803841-0",
              "target": null
            },
            {
              "id": "Win.Packed.kkrunchy-7049457-1",
              "display_name": "Win.Packed.kkrunchy-7049457-1",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:SoftwareBundler:Win32/Prepscram",
              "display_name": "ALF:HeraklezEval:SoftwareBundler:Win32/Prepscram",
              "target": null
            },
            {
              "id": "TrojanDownloader:Win32/Upatre.A",
              "display_name": "TrojanDownloader:Win32/Upatre.A",
              "target": "/malware/TrojanDownloader:Win32/Upatre.A"
            },
            {
              "id": "Trojan:Win32/Qbot.R!MTB",
              "display_name": "Trojan:Win32/Qbot.R!MTB",
              "target": "/malware/Trojan:Win32/Qbot.R!MTB"
            },
            {
              "id": "ALF:HeraklezEval:Trojan:BAT/Musecador",
              "display_name": "ALF:HeraklezEval:Trojan:BAT/Musecador",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Wabot.A",
              "display_name": "Backdoor:Win32/Wabot.A",
              "target": "/malware/Backdoor:Win32/Wabot.A"
            },
            {
              "id": "Ransom:Win32/G And Crab!rfn",
              "display_name": "Ransom:Win32/G And Crab!rfn",
              "target": "/malware/Ransom:Win32/G And Crab!rfn"
            },
            {
              "id": "Ransom:Win32/WannaCrypt.A!rsm",
              "display_name": "Ransom:Win32/WannaCrypt.A!rsm",
              "target": "/malware/Ransom:Win32/WannaCrypt.A!rsm"
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "#Lowfi:FOP:VirTool:Win32/Injector",
              "display_name": "#Lowfi:FOP:VirTool:Win32/Injector",
              "target": null
            },
            {
              "id": "Nanocore RAT",
              "display_name": "Nanocore RAT",
              "target": null
            },
            {
              "id": "Worm:Win32/Fesber.A",
              "display_name": "Worm:Win32/Fesber.A",
              "target": "/malware/Worm:Win32/Fesber.A"
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "#LowFi:HSTR:TrojanSpy:Win32/Xtrat",
              "display_name": "#LowFi:HSTR:TrojanSpy:Win32/Xtrat",
              "target": null
            },
            {
              "id": "InstallBrain",
              "display_name": "InstallBrain",
              "target": null
            },
            {
              "id": "InstallCore",
              "display_name": "InstallCore",
              "target": null
            },
            {
              "id": "Ghost RAT",
              "display_name": "Ghost RAT",
              "target": null
            },
            {
              "id": "Cobalt Strike",
              "display_name": "Cobalt Strike",
              "target": null
            },
            {
              "id": "SuppoBox",
              "display_name": "SuppoBox",
              "target": null
            },
            {
              "id": "Occamy",
              "display_name": "Occamy",
              "target": null
            },
            {
              "id": "Agent Tesla",
              "display_name": "Agent Tesla",
              "target": null
            },
            {
              "id": "TrojanSpy:Win32/Bradesco",
              "display_name": "TrojanSpy:Win32/Bradesco",
              "target": "/malware/TrojanSpy:Win32/Bradesco"
            },
            {
              "id": "ALF:HeraklezEval:TrojanClicker:JS/Faceliker",
              "display_name": "ALF:HeraklezEval:TrojanClicker:JS/Faceliker",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1415",
              "name": "URL Scheme Hijacking",
              "display_name": "T1415 - URL Scheme Hijacking"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1122",
              "name": "Component Object Model Hijacking",
              "display_name": "T1122 - Component Object Model Hijacking"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1100",
              "name": "Web Shell",
              "display_name": "T1100 - Web Shell"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1030",
              "name": "Data Transfer Size Limits",
              "display_name": "T1030 - Data Transfer Size Limits"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "65a342310ab3d2c69778d608",
          "export_count": 53,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 143,
            "FileHash-SHA1": 130,
            "FileHash-SHA256": 1524,
            "URL": 3340,
            "domain": 1735,
            "hostname": 1398,
            "CVE": 1,
            "email": 6,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 8279,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "772 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65eb98d47b74b50cf8ce6797",
          "name": "VirTool:Win32/AccessMe | Ghost RAT",
          "description": "",
          "modified": "2024-03-08T23:01:40.129000",
          "created": "2024-03-08T23:01:40.129000",
          "tags": [
            "threat",
            "feeds ioc",
            "new ioc",
            "teams api",
            "contact",
            "paste",
            "iocs",
            "analyze",
            "ssl certificate",
            "whois record",
            "historical ssl",
            "resolutions",
            "referrer",
            "whois whois",
            "communicating",
            "contacted",
            "family",
            "roots",
            "lolkek",
            "redline stealer",
            "hacktool",
            "html info",
            "title rexxfield",
            "services",
            "identify",
            "meta tags",
            "rexxfield cyber",
            "investigation",
            "divi child",
            "site kit",
            "google",
            "united",
            "unknown",
            "as24940 hetzner",
            "germany unknown",
            "passive dns",
            "urls",
            "title",
            "moved",
            "scan endpoints",
            "all octoseek",
            "body",
            "cyber stalking",
            "pornographer",
            "urls url",
            "files",
            "ip address",
            "execution",
            "metro",
            "medium",
            "show",
            "search",
            "ids detections",
            "yara detections",
            "win32",
            "ppi useragent",
            "installcapital",
            "http",
            "packing t1045",
            "malware",
            "write",
            "obsession",
            "malvertizing",
            "masquerading",
            "ipv4",
            "pulse submit",
            "url analysis",
            "cookie",
            "status",
            "domain",
            "creation date",
            "trojan",
            "date",
            "expiration date",
            "name servers",
            "trojanclicker",
            "encrypt",
            "error",
            "ransomware",
            "malware generator",
            "meta",
            "for privacy",
            "aaaa",
            "komodo",
            "asnone united",
            "alfper",
            "as22612",
            "nxdomain",
            "gmt x",
            "ransom",
            "virtool",
            "log id",
            "gmtn",
            "digicert tls",
            "rsa sha256",
            "tls web",
            "full name",
            "digicert inc",
            "california",
            "false",
            "pulse pulses",
            "location united",
            "as16276",
            "as14061",
            "code",
            "next",
            "url http",
            "hostname",
            "files domain",
            "files related",
            "ghost rat",
            "webtoolbar",
            "nanocore rat",
            "gamehack",
            "cobalt strike",
            "redlinestealer",
            "installcore",
            "installbrain",
            "emotet",
            "tofsee",
            "bradesco",
            "agent tesla",
            "trojanspy",
            "suppobox",
            "occamy",
            "dnspionage",
            "stealer",
            "networm",
            "as13414 twitter",
            "as32934",
            "script urls",
            "a domains",
            "worm",
            "entries",
            "meta http",
            "window",
            "select contact",
            "domain holder",
            "nexus category",
            "tackle company",
            "postal code",
            "component loop",
            "apache",
            "pragma",
            "value0",
            "ioc search",
            "threat analyzer",
            "hostnames",
            "dangerous",
            "target",
            "targeting",
            "hacker profile",
            "cybercrime",
            "fraud services",
            "strange",
            "tsara brashears",
            "michael roberts",
            "tracey richter",
            "voyeurism",
            "slander",
            "password",
            "hijacker"
          ],
          "references": [
            "https://rexxfield.com/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian | OS & iOS Password and Password Cracker",
            "www.akhaltsikhe.gov.ge [Germany?]",
            "screencasts.rexxfield.com",
            "https://rexxfield.com [ hmmm...inc.legal] is Alienvault a subsidiary of Rexxfields unwarranted investigation/spy campaign? Confused",
            "https://www.akhaltsikhe.gov.ge/ | GMT Server LiteSpeed location",
            "94.130.71.173 [scanning host]",
            "http://www.objectaid.com/update/current/p2.index [AIN Phishing IOC's]",
            "https://www.couriermail.com.au/ipad/custody-bid-strands-family/news-story/23c2c9a5fc984edc04d29655c641f484",
            "Michael Roberts Australia, Germany, Iowa, New York Friend of Ben",
            "Michael Roberts - murder suspect, victim, hacker, PI",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [text, email, collection]",
            "https://ladys.one/xxx/a-tsara-brashears-zafira-porn",
            "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net [BitCoinAussie ?]",
            "98cc05d9c12c214deadfe71af22cd3862e7417c0 [backdoor | PPI User-Agent (InstallCapital)]",
            "a.nel.cloudflare.com / api.w.org",
            "miles.ns.cloudflare.com",
            "https://otx.alienvault.com/indicator/url/https://media.toxtren.com/redirect.aspx?pid=272789&&bid=1971&&lpid=2119&&subid=18b8dh9scxi7sbl11f&&sref=inhousecpa&&inhousecpa=Kiev_Dima_BR_Setki",
            "https://www.google.com/?authuser=0"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "LolKek",
              "display_name": "LolKek",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "RedLine Stealer",
              "display_name": "RedLine Stealer",
              "target": null
            },
            {
              "id": "TrojanClicker",
              "display_name": "TrojanClicker",
              "target": null
            },
            {
              "id": "Win32:Malware-gen",
              "display_name": "Win32:Malware-gen",
              "target": null
            },
            {
              "id": "ALFPER:InstallCapital",
              "display_name": "ALFPER:InstallCapital",
              "target": null
            },
            {
              "id": "VirTool:MSIL/CryptInject.CF!MTB",
              "display_name": "VirTool:MSIL/CryptInject.CF!MTB",
              "target": "/malware/VirTool:MSIL/CryptInject.CF!MTB"
            },
            {
              "id": "Win.Malware.Downloadguide-6803841-0",
              "display_name": "Win.Malware.Downloadguide-6803841-0",
              "target": null
            },
            {
              "id": "Win.Packed.kkrunchy-7049457-1",
              "display_name": "Win.Packed.kkrunchy-7049457-1",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:SoftwareBundler:Win32/Prepscram",
              "display_name": "ALF:HeraklezEval:SoftwareBundler:Win32/Prepscram",
              "target": null
            },
            {
              "id": "TrojanDownloader:Win32/Upatre.A",
              "display_name": "TrojanDownloader:Win32/Upatre.A",
              "target": "/malware/TrojanDownloader:Win32/Upatre.A"
            },
            {
              "id": "Trojan:Win32/Qbot.R!MTB",
              "display_name": "Trojan:Win32/Qbot.R!MTB",
              "target": "/malware/Trojan:Win32/Qbot.R!MTB"
            },
            {
              "id": "ALF:HeraklezEval:Trojan:BAT/Musecador",
              "display_name": "ALF:HeraklezEval:Trojan:BAT/Musecador",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Wabot.A",
              "display_name": "Backdoor:Win32/Wabot.A",
              "target": "/malware/Backdoor:Win32/Wabot.A"
            },
            {
              "id": "Ransom:Win32/G And Crab!rfn",
              "display_name": "Ransom:Win32/G And Crab!rfn",
              "target": "/malware/Ransom:Win32/G And Crab!rfn"
            },
            {
              "id": "Ransom:Win32/WannaCrypt.A!rsm",
              "display_name": "Ransom:Win32/WannaCrypt.A!rsm",
              "target": "/malware/Ransom:Win32/WannaCrypt.A!rsm"
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "#Lowfi:FOP:VirTool:Win32/Injector",
              "display_name": "#Lowfi:FOP:VirTool:Win32/Injector",
              "target": null
            },
            {
              "id": "Nanocore RAT",
              "display_name": "Nanocore RAT",
              "target": null
            },
            {
              "id": "Worm:Win32/Fesber.A",
              "display_name": "Worm:Win32/Fesber.A",
              "target": "/malware/Worm:Win32/Fesber.A"
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "#LowFi:HSTR:TrojanSpy:Win32/Xtrat",
              "display_name": "#LowFi:HSTR:TrojanSpy:Win32/Xtrat",
              "target": null
            },
            {
              "id": "InstallBrain",
              "display_name": "InstallBrain",
              "target": null
            },
            {
              "id": "InstallCore",
              "display_name": "InstallCore",
              "target": null
            },
            {
              "id": "Ghost RAT",
              "display_name": "Ghost RAT",
              "target": null
            },
            {
              "id": "Cobalt Strike",
              "display_name": "Cobalt Strike",
              "target": null
            },
            {
              "id": "SuppoBox",
              "display_name": "SuppoBox",
              "target": null
            },
            {
              "id": "Occamy",
              "display_name": "Occamy",
              "target": null
            },
            {
              "id": "Agent Tesla",
              "display_name": "Agent Tesla",
              "target": null
            },
            {
              "id": "TrojanSpy:Win32/Bradesco",
              "display_name": "TrojanSpy:Win32/Bradesco",
              "target": "/malware/TrojanSpy:Win32/Bradesco"
            },
            {
              "id": "ALF:HeraklezEval:TrojanClicker:JS/Faceliker",
              "display_name": "ALF:HeraklezEval:TrojanClicker:JS/Faceliker",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1415",
              "name": "URL Scheme Hijacking",
              "display_name": "T1415 - URL Scheme Hijacking"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1122",
              "name": "Component Object Model Hijacking",
              "display_name": "T1122 - Component Object Model Hijacking"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1100",
              "name": "Web Shell",
              "display_name": "T1100 - Web Shell"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1030",
              "name": "Data Transfer Size Limits",
              "display_name": "T1030 - Data Transfer Size Limits"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "65acace20c18a7d6c5da2e27",
          "export_count": 43,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 143,
            "FileHash-SHA1": 130,
            "FileHash-SHA256": 1524,
            "URL": 3340,
            "domain": 1735,
            "hostname": 1398,
            "CVE": 1,
            "email": 6,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 8279,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 228,
          "modified_text": "772 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65acace20c18a7d6c5da2e27",
          "name": "VirTool:Win32/AccessMe | Ghost RAT",
          "description": "",
          "modified": "2024-02-13T00:04:59.507000",
          "created": "2024-01-21T05:34:26.800000",
          "tags": [
            "threat",
            "feeds ioc",
            "new ioc",
            "teams api",
            "contact",
            "paste",
            "iocs",
            "analyze",
            "ssl certificate",
            "whois record",
            "historical ssl",
            "resolutions",
            "referrer",
            "whois whois",
            "communicating",
            "contacted",
            "family",
            "roots",
            "lolkek",
            "redline stealer",
            "hacktool",
            "html info",
            "title rexxfield",
            "services",
            "identify",
            "meta tags",
            "rexxfield cyber",
            "investigation",
            "divi child",
            "site kit",
            "google",
            "united",
            "unknown",
            "as24940 hetzner",
            "germany unknown",
            "passive dns",
            "urls",
            "title",
            "moved",
            "scan endpoints",
            "all octoseek",
            "body",
            "cyber stalking",
            "pornographer",
            "urls url",
            "files",
            "ip address",
            "execution",
            "metro",
            "medium",
            "show",
            "search",
            "ids detections",
            "yara detections",
            "win32",
            "ppi useragent",
            "installcapital",
            "http",
            "packing t1045",
            "malware",
            "write",
            "obsession",
            "malvertizing",
            "masquerading",
            "ipv4",
            "pulse submit",
            "url analysis",
            "cookie",
            "status",
            "domain",
            "creation date",
            "trojan",
            "date",
            "expiration date",
            "name servers",
            "trojanclicker",
            "encrypt",
            "error",
            "ransomware",
            "malware generator",
            "meta",
            "for privacy",
            "aaaa",
            "komodo",
            "asnone united",
            "alfper",
            "as22612",
            "nxdomain",
            "gmt x",
            "ransom",
            "virtool",
            "log id",
            "gmtn",
            "digicert tls",
            "rsa sha256",
            "tls web",
            "full name",
            "digicert inc",
            "california",
            "false",
            "pulse pulses",
            "location united",
            "as16276",
            "as14061",
            "code",
            "next",
            "url http",
            "hostname",
            "files domain",
            "files related",
            "ghost rat",
            "webtoolbar",
            "nanocore rat",
            "gamehack",
            "cobalt strike",
            "redlinestealer",
            "installcore",
            "installbrain",
            "emotet",
            "tofsee",
            "bradesco",
            "agent tesla",
            "trojanspy",
            "suppobox",
            "occamy",
            "dnspionage",
            "stealer",
            "networm",
            "as13414 twitter",
            "as32934",
            "script urls",
            "a domains",
            "worm",
            "entries",
            "meta http",
            "window",
            "select contact",
            "domain holder",
            "nexus category",
            "tackle company",
            "postal code",
            "component loop",
            "apache",
            "pragma",
            "value0",
            "ioc search",
            "threat analyzer",
            "hostnames",
            "dangerous",
            "target",
            "targeting",
            "hacker profile",
            "cybercrime",
            "fraud services",
            "strange",
            "tsara brashears",
            "michael roberts",
            "tracey richter",
            "voyeurism",
            "slander",
            "password",
            "hijacker"
          ],
          "references": [
            "https://rexxfield.com/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian | OS & iOS Password and Password Cracker",
            "www.akhaltsikhe.gov.ge [Germany?]",
            "screencasts.rexxfield.com",
            "https://rexxfield.com [ hmmm...inc.legal] is Alienvault a subsidiary of Rexxfields unwarranted investigation/spy campaign? Confused",
            "https://www.akhaltsikhe.gov.ge/ | GMT Server LiteSpeed location",
            "94.130.71.173 [scanning host]",
            "http://www.objectaid.com/update/current/p2.index [AIN Phishing IOC's]",
            "https://www.couriermail.com.au/ipad/custody-bid-strands-family/news-story/23c2c9a5fc984edc04d29655c641f484",
            "Michael Roberts Australia, Germany, Iowa, New York Friend of Ben",
            "Michael Roberts - murder suspect, victim, hacker, PI",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [text, email, collection]",
            "https://ladys.one/xxx/a-tsara-brashears-zafira-porn",
            "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net [BitCoinAussie ?]",
            "98cc05d9c12c214deadfe71af22cd3862e7417c0 [backdoor | PPI User-Agent (InstallCapital)]",
            "a.nel.cloudflare.com / api.w.org",
            "miles.ns.cloudflare.com",
            "https://otx.alienvault.com/indicator/url/https://media.toxtren.com/redirect.aspx?pid=272789&&bid=1971&&lpid=2119&&subid=18b8dh9scxi7sbl11f&&sref=inhousecpa&&inhousecpa=Kiev_Dima_BR_Setki",
            "https://www.google.com/?authuser=0"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "LolKek",
              "display_name": "LolKek",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "RedLine Stealer",
              "display_name": "RedLine Stealer",
              "target": null
            },
            {
              "id": "TrojanClicker",
              "display_name": "TrojanClicker",
              "target": null
            },
            {
              "id": "Win32:Malware-gen",
              "display_name": "Win32:Malware-gen",
              "target": null
            },
            {
              "id": "ALFPER:InstallCapital",
              "display_name": "ALFPER:InstallCapital",
              "target": null
            },
            {
              "id": "VirTool:MSIL/CryptInject.CF!MTB",
              "display_name": "VirTool:MSIL/CryptInject.CF!MTB",
              "target": "/malware/VirTool:MSIL/CryptInject.CF!MTB"
            },
            {
              "id": "Win.Malware.Downloadguide-6803841-0",
              "display_name": "Win.Malware.Downloadguide-6803841-0",
              "target": null
            },
            {
              "id": "Win.Packed.kkrunchy-7049457-1",
              "display_name": "Win.Packed.kkrunchy-7049457-1",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:SoftwareBundler:Win32/Prepscram",
              "display_name": "ALF:HeraklezEval:SoftwareBundler:Win32/Prepscram",
              "target": null
            },
            {
              "id": "TrojanDownloader:Win32/Upatre.A",
              "display_name": "TrojanDownloader:Win32/Upatre.A",
              "target": "/malware/TrojanDownloader:Win32/Upatre.A"
            },
            {
              "id": "Trojan:Win32/Qbot.R!MTB",
              "display_name": "Trojan:Win32/Qbot.R!MTB",
              "target": "/malware/Trojan:Win32/Qbot.R!MTB"
            },
            {
              "id": "ALF:HeraklezEval:Trojan:BAT/Musecador",
              "display_name": "ALF:HeraklezEval:Trojan:BAT/Musecador",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Wabot.A",
              "display_name": "Backdoor:Win32/Wabot.A",
              "target": "/malware/Backdoor:Win32/Wabot.A"
            },
            {
              "id": "Ransom:Win32/G And Crab!rfn",
              "display_name": "Ransom:Win32/G And Crab!rfn",
              "target": "/malware/Ransom:Win32/G And Crab!rfn"
            },
            {
              "id": "Ransom:Win32/WannaCrypt.A!rsm",
              "display_name": "Ransom:Win32/WannaCrypt.A!rsm",
              "target": "/malware/Ransom:Win32/WannaCrypt.A!rsm"
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "#Lowfi:FOP:VirTool:Win32/Injector",
              "display_name": "#Lowfi:FOP:VirTool:Win32/Injector",
              "target": null
            },
            {
              "id": "Nanocore RAT",
              "display_name": "Nanocore RAT",
              "target": null
            },
            {
              "id": "Worm:Win32/Fesber.A",
              "display_name": "Worm:Win32/Fesber.A",
              "target": "/malware/Worm:Win32/Fesber.A"
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "#LowFi:HSTR:TrojanSpy:Win32/Xtrat",
              "display_name": "#LowFi:HSTR:TrojanSpy:Win32/Xtrat",
              "target": null
            },
            {
              "id": "InstallBrain",
              "display_name": "InstallBrain",
              "target": null
            },
            {
              "id": "InstallCore",
              "display_name": "InstallCore",
              "target": null
            },
            {
              "id": "Ghost RAT",
              "display_name": "Ghost RAT",
              "target": null
            },
            {
              "id": "Cobalt Strike",
              "display_name": "Cobalt Strike",
              "target": null
            },
            {
              "id": "SuppoBox",
              "display_name": "SuppoBox",
              "target": null
            },
            {
              "id": "Occamy",
              "display_name": "Occamy",
              "target": null
            },
            {
              "id": "Agent Tesla",
              "display_name": "Agent Tesla",
              "target": null
            },
            {
              "id": "TrojanSpy:Win32/Bradesco",
              "display_name": "TrojanSpy:Win32/Bradesco",
              "target": "/malware/TrojanSpy:Win32/Bradesco"
            },
            {
              "id": "ALF:HeraklezEval:TrojanClicker:JS/Faceliker",
              "display_name": "ALF:HeraklezEval:TrojanClicker:JS/Faceliker",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1415",
              "name": "URL Scheme Hijacking",
              "display_name": "T1415 - URL Scheme Hijacking"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1122",
              "name": "Component Object Model Hijacking",
              "display_name": "T1122 - Component Object Model Hijacking"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1100",
              "name": "Web Shell",
              "display_name": "T1100 - Web Shell"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1030",
              "name": "Data Transfer Size Limits",
              "display_name": "T1030 - Data Transfer Size Limits"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "65a342310ab3d2c69778d608",
          "export_count": 24,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 143,
            "FileHash-SHA1": 130,
            "FileHash-SHA256": 1524,
            "URL": 3340,
            "domain": 1735,
            "hostname": 1398,
            "CVE": 1,
            "email": 6,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 8279,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "796 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65a342310ab3d2c69778d608",
          "name": "VirTool:MSIL/CryptInject.CF!MTB | Rexxfield? Weird stuff",
          "description": "Remotely accessed device. Alleges Relationship to OTX? What I know is what I've read. Michael Roberts of Rexxfield supposedly assists, attorneys, law enforcement & helps doctors cover their crimes, injects malicious code, honeypots the web, terrorizing SA victims/allegers. Roberts is allegedly a hacker mastermind who shows his face or one of the many profiles of a hacker group targeting Tsara Brashears and https://SafeBae.org. Brashears is linked in malicious websites, Roberts suspect with ex-wife Tracey Richter alleged murderer. This is all crazy, still;  Brashears is a real person in danger. I don't get it. I'm stupid",
          "modified": "2024-02-13T00:04:59.507000",
          "created": "2024-01-14T02:08:49.638000",
          "tags": [
            "threat",
            "feeds ioc",
            "new ioc",
            "teams api",
            "contact",
            "paste",
            "iocs",
            "analyze",
            "ssl certificate",
            "whois record",
            "historical ssl",
            "resolutions",
            "referrer",
            "whois whois",
            "communicating",
            "contacted",
            "family",
            "roots",
            "lolkek",
            "redline stealer",
            "hacktool",
            "html info",
            "title rexxfield",
            "services",
            "identify",
            "meta tags",
            "rexxfield cyber",
            "investigation",
            "divi child",
            "site kit",
            "google",
            "united",
            "unknown",
            "as24940 hetzner",
            "germany unknown",
            "passive dns",
            "urls",
            "title",
            "moved",
            "scan endpoints",
            "all octoseek",
            "body",
            "cyber stalking",
            "pornographer",
            "urls url",
            "files",
            "ip address",
            "execution",
            "metro",
            "medium",
            "show",
            "search",
            "ids detections",
            "yara detections",
            "win32",
            "ppi useragent",
            "installcapital",
            "http",
            "packing t1045",
            "malware",
            "write",
            "obsession",
            "malvertizing",
            "masquerading",
            "ipv4",
            "pulse submit",
            "url analysis",
            "cookie",
            "status",
            "domain",
            "creation date",
            "trojan",
            "date",
            "expiration date",
            "name servers",
            "trojanclicker",
            "encrypt",
            "error",
            "ransomware",
            "malware generator",
            "meta",
            "for privacy",
            "aaaa",
            "komodo",
            "asnone united",
            "alfper",
            "as22612",
            "nxdomain",
            "gmt x",
            "ransom",
            "virtool",
            "log id",
            "gmtn",
            "digicert tls",
            "rsa sha256",
            "tls web",
            "full name",
            "digicert inc",
            "california",
            "false",
            "pulse pulses",
            "location united",
            "as16276",
            "as14061",
            "code",
            "next",
            "url http",
            "hostname",
            "files domain",
            "files related",
            "ghost rat",
            "webtoolbar",
            "nanocore rat",
            "gamehack",
            "cobalt strike",
            "redlinestealer",
            "installcore",
            "installbrain",
            "emotet",
            "tofsee",
            "bradesco",
            "agent tesla",
            "trojanspy",
            "suppobox",
            "occamy",
            "dnspionage",
            "stealer",
            "networm",
            "as13414 twitter",
            "as32934",
            "script urls",
            "a domains",
            "worm",
            "entries",
            "meta http",
            "window",
            "select contact",
            "domain holder",
            "nexus category",
            "tackle company",
            "postal code",
            "component loop",
            "apache",
            "pragma",
            "value0",
            "ioc search",
            "threat analyzer",
            "hostnames",
            "dangerous",
            "target",
            "targeting",
            "hacker profile",
            "cybercrime",
            "fraud services",
            "strange",
            "tsara brashears",
            "michael roberts",
            "tracey richter",
            "voyeurism",
            "slander",
            "password",
            "hijacker"
          ],
          "references": [
            "https://rexxfield.com/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian | OS & iOS Password and Password Cracker",
            "www.akhaltsikhe.gov.ge [Germany?]",
            "screencasts.rexxfield.com",
            "https://rexxfield.com [ hmmm...inc.legal] is Alienvault a subsidiary of Rexxfields unwarranted investigation/spy campaign? Confused",
            "https://www.akhaltsikhe.gov.ge/ | GMT Server LiteSpeed location",
            "94.130.71.173 [scanning host]",
            "http://www.objectaid.com/update/current/p2.index [AIN Phishing IOC's]",
            "https://www.couriermail.com.au/ipad/custody-bid-strands-family/news-story/23c2c9a5fc984edc04d29655c641f484",
            "Michael Roberts Australia, Germany, Iowa, New York Friend of Ben",
            "Michael Roberts - murder suspect, victim, hacker, PI",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [text, email, collection]",
            "https://ladys.one/xxx/a-tsara-brashears-zafira-porn",
            "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net [BitCoinAussie ?]",
            "98cc05d9c12c214deadfe71af22cd3862e7417c0 [backdoor | PPI User-Agent (InstallCapital)]",
            "a.nel.cloudflare.com / api.w.org",
            "miles.ns.cloudflare.com",
            "https://otx.alienvault.com/indicator/url/https://media.toxtren.com/redirect.aspx?pid=272789&&bid=1971&&lpid=2119&&subid=18b8dh9scxi7sbl11f&&sref=inhousecpa&&inhousecpa=Kiev_Dima_BR_Setki",
            "https://www.google.com/?authuser=0"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "LolKek",
              "display_name": "LolKek",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "RedLine Stealer",
              "display_name": "RedLine Stealer",
              "target": null
            },
            {
              "id": "TrojanClicker",
              "display_name": "TrojanClicker",
              "target": null
            },
            {
              "id": "Win32:Malware-gen",
              "display_name": "Win32:Malware-gen",
              "target": null
            },
            {
              "id": "ALFPER:InstallCapital",
              "display_name": "ALFPER:InstallCapital",
              "target": null
            },
            {
              "id": "VirTool:MSIL/CryptInject.CF!MTB",
              "display_name": "VirTool:MSIL/CryptInject.CF!MTB",
              "target": "/malware/VirTool:MSIL/CryptInject.CF!MTB"
            },
            {
              "id": "Win.Malware.Downloadguide-6803841-0",
              "display_name": "Win.Malware.Downloadguide-6803841-0",
              "target": null
            },
            {
              "id": "Win.Packed.kkrunchy-7049457-1",
              "display_name": "Win.Packed.kkrunchy-7049457-1",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:SoftwareBundler:Win32/Prepscram",
              "display_name": "ALF:HeraklezEval:SoftwareBundler:Win32/Prepscram",
              "target": null
            },
            {
              "id": "TrojanDownloader:Win32/Upatre.A",
              "display_name": "TrojanDownloader:Win32/Upatre.A",
              "target": "/malware/TrojanDownloader:Win32/Upatre.A"
            },
            {
              "id": "Trojan:Win32/Qbot.R!MTB",
              "display_name": "Trojan:Win32/Qbot.R!MTB",
              "target": "/malware/Trojan:Win32/Qbot.R!MTB"
            },
            {
              "id": "ALF:HeraklezEval:Trojan:BAT/Musecador",
              "display_name": "ALF:HeraklezEval:Trojan:BAT/Musecador",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Wabot.A",
              "display_name": "Backdoor:Win32/Wabot.A",
              "target": "/malware/Backdoor:Win32/Wabot.A"
            },
            {
              "id": "Ransom:Win32/G And Crab!rfn",
              "display_name": "Ransom:Win32/G And Crab!rfn",
              "target": "/malware/Ransom:Win32/G And Crab!rfn"
            },
            {
              "id": "Ransom:Win32/WannaCrypt.A!rsm",
              "display_name": "Ransom:Win32/WannaCrypt.A!rsm",
              "target": "/malware/Ransom:Win32/WannaCrypt.A!rsm"
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "#Lowfi:FOP:VirTool:Win32/Injector",
              "display_name": "#Lowfi:FOP:VirTool:Win32/Injector",
              "target": null
            },
            {
              "id": "Nanocore RAT",
              "display_name": "Nanocore RAT",
              "target": null
            },
            {
              "id": "Worm:Win32/Fesber.A",
              "display_name": "Worm:Win32/Fesber.A",
              "target": "/malware/Worm:Win32/Fesber.A"
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "#LowFi:HSTR:TrojanSpy:Win32/Xtrat",
              "display_name": "#LowFi:HSTR:TrojanSpy:Win32/Xtrat",
              "target": null
            },
            {
              "id": "InstallBrain",
              "display_name": "InstallBrain",
              "target": null
            },
            {
              "id": "InstallCore",
              "display_name": "InstallCore",
              "target": null
            },
            {
              "id": "Ghost RAT",
              "display_name": "Ghost RAT",
              "target": null
            },
            {
              "id": "Cobalt Strike",
              "display_name": "Cobalt Strike",
              "target": null
            },
            {
              "id": "SuppoBox",
              "display_name": "SuppoBox",
              "target": null
            },
            {
              "id": "Occamy",
              "display_name": "Occamy",
              "target": null
            },
            {
              "id": "Agent Tesla",
              "display_name": "Agent Tesla",
              "target": null
            },
            {
              "id": "TrojanSpy:Win32/Bradesco",
              "display_name": "TrojanSpy:Win32/Bradesco",
              "target": "/malware/TrojanSpy:Win32/Bradesco"
            },
            {
              "id": "ALF:HeraklezEval:TrojanClicker:JS/Faceliker",
              "display_name": "ALF:HeraklezEval:TrojanClicker:JS/Faceliker",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1415",
              "name": "URL Scheme Hijacking",
              "display_name": "T1415 - URL Scheme Hijacking"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1122",
              "name": "Component Object Model Hijacking",
              "display_name": "T1122 - Component Object Model Hijacking"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1100",
              "name": "Web Shell",
              "display_name": "T1100 - Web Shell"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1030",
              "name": "Data Transfer Size Limits",
              "display_name": "T1030 - Data Transfer Size Limits"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 26,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 143,
            "FileHash-SHA1": 130,
            "FileHash-SHA256": 1524,
            "URL": 3340,
            "domain": 1735,
            "hostname": 1398,
            "CVE": 1,
            "email": 6,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 8279,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "796 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65afc9cf333bbda03a18e03c",
          "name": "VirTool:Win32/AccessMe | Ghost RAT",
          "description": "",
          "modified": "2024-02-13T00:04:59.507000",
          "created": "2024-01-23T14:14:39.725000",
          "tags": [
            "threat",
            "feeds ioc",
            "new ioc",
            "teams api",
            "contact",
            "paste",
            "iocs",
            "analyze",
            "ssl certificate",
            "whois record",
            "historical ssl",
            "resolutions",
            "referrer",
            "whois whois",
            "communicating",
            "contacted",
            "family",
            "roots",
            "lolkek",
            "redline stealer",
            "hacktool",
            "html info",
            "title rexxfield",
            "services",
            "identify",
            "meta tags",
            "rexxfield cyber",
            "investigation",
            "divi child",
            "site kit",
            "google",
            "united",
            "unknown",
            "as24940 hetzner",
            "germany unknown",
            "passive dns",
            "urls",
            "title",
            "moved",
            "scan endpoints",
            "all octoseek",
            "body",
            "cyber stalking",
            "pornographer",
            "urls url",
            "files",
            "ip address",
            "execution",
            "metro",
            "medium",
            "show",
            "search",
            "ids detections",
            "yara detections",
            "win32",
            "ppi useragent",
            "installcapital",
            "http",
            "packing t1045",
            "malware",
            "write",
            "obsession",
            "malvertizing",
            "masquerading",
            "ipv4",
            "pulse submit",
            "url analysis",
            "cookie",
            "status",
            "domain",
            "creation date",
            "trojan",
            "date",
            "expiration date",
            "name servers",
            "trojanclicker",
            "encrypt",
            "error",
            "ransomware",
            "malware generator",
            "meta",
            "for privacy",
            "aaaa",
            "komodo",
            "asnone united",
            "alfper",
            "as22612",
            "nxdomain",
            "gmt x",
            "ransom",
            "virtool",
            "log id",
            "gmtn",
            "digicert tls",
            "rsa sha256",
            "tls web",
            "full name",
            "digicert inc",
            "california",
            "false",
            "pulse pulses",
            "location united",
            "as16276",
            "as14061",
            "code",
            "next",
            "url http",
            "hostname",
            "files domain",
            "files related",
            "ghost rat",
            "webtoolbar",
            "nanocore rat",
            "gamehack",
            "cobalt strike",
            "redlinestealer",
            "installcore",
            "installbrain",
            "emotet",
            "tofsee",
            "bradesco",
            "agent tesla",
            "trojanspy",
            "suppobox",
            "occamy",
            "dnspionage",
            "stealer",
            "networm",
            "as13414 twitter",
            "as32934",
            "script urls",
            "a domains",
            "worm",
            "entries",
            "meta http",
            "window",
            "select contact",
            "domain holder",
            "nexus category",
            "tackle company",
            "postal code",
            "component loop",
            "apache",
            "pragma",
            "value0",
            "ioc search",
            "threat analyzer",
            "hostnames",
            "dangerous",
            "target",
            "targeting",
            "hacker profile",
            "cybercrime",
            "fraud services",
            "strange",
            "tsara brashears",
            "michael roberts",
            "tracey richter",
            "voyeurism",
            "slander",
            "password",
            "hijacker"
          ],
          "references": [
            "https://rexxfield.com/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian | OS & iOS Password and Password Cracker",
            "www.akhaltsikhe.gov.ge [Germany?]",
            "screencasts.rexxfield.com",
            "https://rexxfield.com [ hmmm...inc.legal] is Alienvault a subsidiary of Rexxfields unwarranted investigation/spy campaign? Confused",
            "https://www.akhaltsikhe.gov.ge/ | GMT Server LiteSpeed location",
            "94.130.71.173 [scanning host]",
            "http://www.objectaid.com/update/current/p2.index [AIN Phishing IOC's]",
            "https://www.couriermail.com.au/ipad/custody-bid-strands-family/news-story/23c2c9a5fc984edc04d29655c641f484",
            "Michael Roberts Australia, Germany, Iowa, New York Friend of Ben",
            "Michael Roberts - murder suspect, victim, hacker, PI",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [text, email, collection]",
            "https://ladys.one/xxx/a-tsara-brashears-zafira-porn",
            "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net [BitCoinAussie ?]",
            "98cc05d9c12c214deadfe71af22cd3862e7417c0 [backdoor | PPI User-Agent (InstallCapital)]",
            "a.nel.cloudflare.com / api.w.org",
            "miles.ns.cloudflare.com",
            "https://otx.alienvault.com/indicator/url/https://media.toxtren.com/redirect.aspx?pid=272789&&bid=1971&&lpid=2119&&subid=18b8dh9scxi7sbl11f&&sref=inhousecpa&&inhousecpa=Kiev_Dima_BR_Setki",
            "https://www.google.com/?authuser=0"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "LolKek",
              "display_name": "LolKek",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "RedLine Stealer",
              "display_name": "RedLine Stealer",
              "target": null
            },
            {
              "id": "TrojanClicker",
              "display_name": "TrojanClicker",
              "target": null
            },
            {
              "id": "Win32:Malware-gen",
              "display_name": "Win32:Malware-gen",
              "target": null
            },
            {
              "id": "ALFPER:InstallCapital",
              "display_name": "ALFPER:InstallCapital",
              "target": null
            },
            {
              "id": "VirTool:MSIL/CryptInject.CF!MTB",
              "display_name": "VirTool:MSIL/CryptInject.CF!MTB",
              "target": "/malware/VirTool:MSIL/CryptInject.CF!MTB"
            },
            {
              "id": "Win.Malware.Downloadguide-6803841-0",
              "display_name": "Win.Malware.Downloadguide-6803841-0",
              "target": null
            },
            {
              "id": "Win.Packed.kkrunchy-7049457-1",
              "display_name": "Win.Packed.kkrunchy-7049457-1",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:SoftwareBundler:Win32/Prepscram",
              "display_name": "ALF:HeraklezEval:SoftwareBundler:Win32/Prepscram",
              "target": null
            },
            {
              "id": "TrojanDownloader:Win32/Upatre.A",
              "display_name": "TrojanDownloader:Win32/Upatre.A",
              "target": "/malware/TrojanDownloader:Win32/Upatre.A"
            },
            {
              "id": "Trojan:Win32/Qbot.R!MTB",
              "display_name": "Trojan:Win32/Qbot.R!MTB",
              "target": "/malware/Trojan:Win32/Qbot.R!MTB"
            },
            {
              "id": "ALF:HeraklezEval:Trojan:BAT/Musecador",
              "display_name": "ALF:HeraklezEval:Trojan:BAT/Musecador",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Wabot.A",
              "display_name": "Backdoor:Win32/Wabot.A",
              "target": "/malware/Backdoor:Win32/Wabot.A"
            },
            {
              "id": "Ransom:Win32/G And Crab!rfn",
              "display_name": "Ransom:Win32/G And Crab!rfn",
              "target": "/malware/Ransom:Win32/G And Crab!rfn"
            },
            {
              "id": "Ransom:Win32/WannaCrypt.A!rsm",
              "display_name": "Ransom:Win32/WannaCrypt.A!rsm",
              "target": "/malware/Ransom:Win32/WannaCrypt.A!rsm"
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "#Lowfi:FOP:VirTool:Win32/Injector",
              "display_name": "#Lowfi:FOP:VirTool:Win32/Injector",
              "target": null
            },
            {
              "id": "Nanocore RAT",
              "display_name": "Nanocore RAT",
              "target": null
            },
            {
              "id": "Worm:Win32/Fesber.A",
              "display_name": "Worm:Win32/Fesber.A",
              "target": "/malware/Worm:Win32/Fesber.A"
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "#LowFi:HSTR:TrojanSpy:Win32/Xtrat",
              "display_name": "#LowFi:HSTR:TrojanSpy:Win32/Xtrat",
              "target": null
            },
            {
              "id": "InstallBrain",
              "display_name": "InstallBrain",
              "target": null
            },
            {
              "id": "InstallCore",
              "display_name": "InstallCore",
              "target": null
            },
            {
              "id": "Ghost RAT",
              "display_name": "Ghost RAT",
              "target": null
            },
            {
              "id": "Cobalt Strike",
              "display_name": "Cobalt Strike",
              "target": null
            },
            {
              "id": "SuppoBox",
              "display_name": "SuppoBox",
              "target": null
            },
            {
              "id": "Occamy",
              "display_name": "Occamy",
              "target": null
            },
            {
              "id": "Agent Tesla",
              "display_name": "Agent Tesla",
              "target": null
            },
            {
              "id": "TrojanSpy:Win32/Bradesco",
              "display_name": "TrojanSpy:Win32/Bradesco",
              "target": "/malware/TrojanSpy:Win32/Bradesco"
            },
            {
              "id": "ALF:HeraklezEval:TrojanClicker:JS/Faceliker",
              "display_name": "ALF:HeraklezEval:TrojanClicker:JS/Faceliker",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1415",
              "name": "URL Scheme Hijacking",
              "display_name": "T1415 - URL Scheme Hijacking"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1122",
              "name": "Component Object Model Hijacking",
              "display_name": "T1122 - Component Object Model Hijacking"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1100",
              "name": "Web Shell",
              "display_name": "T1100 - Web Shell"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1030",
              "name": "Data Transfer Size Limits",
              "display_name": "T1030 - Data Transfer Size Limits"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "65acace20c18a7d6c5da2e27",
          "export_count": 26,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 143,
            "FileHash-SHA1": 130,
            "FileHash-SHA256": 1524,
            "URL": 3340,
            "domain": 1735,
            "hostname": 1398,
            "CVE": 1,
            "email": 6,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 8279,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "796 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "659cb577ce7e1a4009a6be2f",
          "name": "Worm:Win32/Benjamin | Miles IT| Emotet | M. Brian Sabey | Striven.com",
          "description": "Continuously attacking, remote attacks, social engineering via adware, phone contact, email, malware filled , unsolicited videos. Remotely control devices. Relentlessly hacking everything.  They go by many names. These are Americans, they tend to direct some of their activities to Chinese servers to avoid detection. Obnoxious. Revenge child to adult content. Malvertizing. If hacking is illegal it doesn't seem worthwhile to stop. No one stops these people even if known to authorities. The also self whitelist.",
          "modified": "2024-02-08T02:00:24.265000",
          "created": "2024-01-09T02:54:47.653000",
          "tags": [
            "ssl certificate",
            "contacted",
            "historical ssl",
            "whois record",
            "whois whois",
            "lemon duck",
            "highly targeted",
            "subdomains",
            "resolutions",
            "driver support",
            "metro",
            "core",
            "ransomexx",
            "quasar",
            "colibri loader",
            "remcos",
            "evilnum",
            "asyncrat",
            "matanbuchus",
            "cobalt strike",
            "korplug",
            "agent tesla",
            "attack",
            "project",
            "tsara brashears",
            "hackers",
            "critical risk",
            "installer",
            "formbook",
            "mitre attack",
            "dynamicloader",
            "high",
            "yara rule",
            "ids detections",
            "yara detections",
            "cape",
            "adware malware",
            "suricata",
            "etpro malware",
            "et malware",
            "guard",
            "june",
            "copy",
            "delphi",
            "win32",
            "et",
            "united",
            "asnone united",
            "status",
            "name servers",
            "cname",
            "creation date",
            "search",
            "showing",
            "entries",
            "passive dns",
            "date",
            "urls",
            "expiration date",
            "copy c",
            "pe32",
            "intel",
            "ms windows",
            "write c",
            "nids",
            "checkin",
            "packing t1045",
            "t1045",
            "worm",
            "malware",
            "code",
            "write",
            "date hash",
            "avast avg",
            "mtb dec",
            "pe32 executable",
            "show",
            "recon",
            "benjamin"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Mitre Attack",
              "display_name": "Mitre Attack",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 34,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 741,
            "FileHash-SHA1": 655,
            "FileHash-SHA256": 2432,
            "URL": 2392,
            "CVE": 3,
            "domain": 645,
            "hostname": 803,
            "email": 3
          },
          "indicator_count": 7674,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "801 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65944b9812ea52ab41c0259d",
          "name": "Mirai Apple Attack +",
          "description": "",
          "modified": "2024-01-29T03:01:29.910000",
          "created": "2024-01-02T17:44:56.709000",
          "tags": [
            "whois record",
            "ssl certificate",
            "contacted",
            "whois whois",
            "historical ssl",
            "referrer",
            "communicating",
            "resolutions",
            "apple",
            "collections",
            "core",
            "stealer",
            "execution",
            "ratel",
            "suspicious",
            "threat",
            "paste",
            "iocs",
            "hostnames",
            "urls https",
            "windir",
            "json data",
            "localappdata",
            "ascii text",
            "unicode text",
            "pattern match",
            "file",
            "indicator",
            "mitre att",
            "path",
            "factory",
            "hybrid",
            "general",
            "memcommit",
            "regsetvalueexa",
            "regdword",
            "t1055",
            "high",
            "regbinary",
            "dynamic dns",
            "regsetvalueexw",
            "regsz",
            "medium",
            "win32",
            "malware",
            "copy",
            "capture",
            "name servers",
            "creation date",
            "servers",
            "passive dns",
            "urls",
            "domain",
            "search",
            "expiration date",
            "scan endpoints",
            "all scoreblue",
            "date",
            "next",
            "applenoc",
            "showing",
            "status",
            "united",
            "as44273 host",
            "unknown",
            "all search",
            "otx scoreblue",
            "aaaa",
            "as54113",
            "privacy inc",
            "customer",
            "asnone united",
            "entries",
            "pulse pulses",
            "dga",
            "redacted for",
            "as20940",
            "body",
            "for privacy",
            "ipv4",
            "files",
            "location united",
            "america asn",
            "as54252",
            "type name",
            "dns replication",
            "iana",
            "whois lookup",
            "ipv4 address",
            "ripe ncc",
            "afrinic",
            "africa",
            "apnic",
            "asia pacific",
            "arin",
            "lacnic",
            "elf executable",
            "sysv",
            "linux",
            "elf wgetboat",
            "contacted urls",
            "red team",
            "tsara brashears",
            "apple phone",
            "unlocker",
            "fakedout threat",
            "hostname",
            "samples",
            "mirai",
            "ph elf",
            "telefonica de",
            "elf collection",
            "llwn",
            "text",
            "gp practice",
            "oracle",
            "apple ios",
            "password",
            "threat network",
            "kgs0",
            "kls0",
            "hacktool",
            "probe",
            "malicious"
          ],
          "references": [
            "https://www.rmvictimlaw.org/about-us/board-directors/hazel-heckers",
            "https://hybrid-analysis.com/sample/1f75fd5ec731cc5b1f338a5f7f44b42c9f1988214c373bf582d766934399b525",
            "https://twitter.com/PORNO_SEXYBABES",
            "IPv4 199.59.243.224  and  IPv4 67.21.93.249 - command_and_control",
            "103.246.145.111 phishing",
            "nr-data.net | Apple Private Data collection",
            "BitRAT CnC: File Hash SHA256 23d60876953677ed4627f3449661dc549c0f747adb4b082078dac90d60ae7706",
            "00000000.apple.com  | remote SIM Swap",
            "https://otx.alienvault.com/indicator/file/23d60876953677ed4627f3449661dc549c0f747adb4b082078dac90d60ae7706#:~:text=%C3%97",
            "103.246.145.111  - scanning host",
            "https://app-portal.wsgc.com/saml20/idp/sso?SAMLRequest=jZFBb8IwDIX/SpR70zS0sEa0iA1NQ2IagrLDLlNII4jWJl2cwvj3qyhI7IJ2tPzs9/x5PPmpK3RQDrQ1GY4IxUgZaUttdhneFM/BA57kYxB1xRo+bf3erNR3q8CjbtAA7zsZbp3hVoAGbkStgHvJ19PXBWeE8sZZb6WtMJoCKOc7qydroK2VWyt30FJtVosM771vgIfhETTZCvkF3roTkXtnjZaVIqBk67Q/hUICRrMugzbCn3NfR0XTBI11XlTkCDtJpK3Dc0Ia6rIJASxG81mGP0dpOYqGVEZxGYkk3iaDVMZMKipGMR0kSScDaNXcgBfGZ5hRNghoGrC4YIzTlNMhidPkA6Pl5bhHbXpo90hsexHwl6JYBsu3dYHR+xV+J8AX1Pzs7m4Z318srmBx/m+M4/DWK7+Uf7+c/wI=&RelayState=AcE8QCtmc3hl5id4ZjN8p",
            "https://www.virustotal.com/en/domain/sipa.be (GoodCop - BadCop 404 error. This may have been a dorkingbeauty graph or collection. There seems to be several VT users experiencing similar issues w/overlap",
            "https://ms13p01if-qufw21344001.ms.if.apple.com:8083/",
            "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635 (Apple remote hacktool that enter via Apple media)",
            "usw2-platform-dmchat-avengers-prod-ext.apple.com",
            "https://otx.alienvault.com/indicator/hostname/00000000.apple.com#:~:text=%C3%97",
            "Malware Hosting * Spyware: http://141.98.6.249/boat.arm7,  http://141.98.6.249/boat.ppc , http://141.98.6.249/boat.x86"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "RATel",
              "display_name": "RATel",
              "target": null
            },
            {
              "id": "trojan.mirai/genericrxui",
              "display_name": "trojan.mirai/genericrxui",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1588",
              "name": "Obtain Capabilities",
              "display_name": "T1588 - Obtain Capabilities"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "658f967a4fc7ebe8021b9382",
          "export_count": 26,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 578,
            "FileHash-SHA1": 521,
            "FileHash-SHA256": 6392,
            "URL": 5741,
            "domain": 2243,
            "hostname": 1536,
            "SSLCertFingerprint": 2,
            "email": 8,
            "CVE": 1
          },
          "indicator_count": 17022,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 223,
          "modified_text": "811 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "659127f3265ec6306b607faa",
          "name": "Mirai Apple Attack +",
          "description": "",
          "modified": "2024-01-29T03:01:29.910000",
          "created": "2023-12-31T08:36:03.380000",
          "tags": [
            "whois record",
            "ssl certificate",
            "contacted",
            "whois whois",
            "historical ssl",
            "referrer",
            "communicating",
            "resolutions",
            "apple",
            "collections",
            "core",
            "stealer",
            "execution",
            "ratel",
            "suspicious",
            "threat",
            "paste",
            "iocs",
            "hostnames",
            "urls https",
            "windir",
            "json data",
            "localappdata",
            "ascii text",
            "unicode text",
            "pattern match",
            "file",
            "indicator",
            "mitre att",
            "path",
            "factory",
            "hybrid",
            "general",
            "memcommit",
            "regsetvalueexa",
            "regdword",
            "t1055",
            "high",
            "regbinary",
            "dynamic dns",
            "regsetvalueexw",
            "regsz",
            "medium",
            "win32",
            "malware",
            "copy",
            "capture",
            "name servers",
            "creation date",
            "servers",
            "passive dns",
            "urls",
            "domain",
            "search",
            "expiration date",
            "scan endpoints",
            "all scoreblue",
            "date",
            "next",
            "applenoc",
            "showing",
            "status",
            "united",
            "as44273 host",
            "unknown",
            "all search",
            "otx scoreblue",
            "aaaa",
            "as54113",
            "privacy inc",
            "customer",
            "asnone united",
            "entries",
            "pulse pulses",
            "dga",
            "redacted for",
            "as20940",
            "body",
            "for privacy",
            "ipv4",
            "files",
            "location united",
            "america asn",
            "as54252",
            "type name",
            "dns replication",
            "iana",
            "whois lookup",
            "ipv4 address",
            "ripe ncc",
            "afrinic",
            "africa",
            "apnic",
            "asia pacific",
            "arin",
            "lacnic",
            "elf executable",
            "sysv",
            "linux",
            "elf wgetboat",
            "contacted urls",
            "red team",
            "tsara brashears",
            "apple phone",
            "unlocker",
            "fakedout threat",
            "hostname",
            "samples",
            "mirai",
            "ph elf",
            "telefonica de",
            "elf collection",
            "llwn",
            "text",
            "gp practice",
            "oracle",
            "apple ios",
            "password",
            "threat network",
            "kgs0",
            "kls0",
            "hacktool",
            "probe",
            "malicious"
          ],
          "references": [
            "https://www.rmvictimlaw.org/about-us/board-directors/hazel-heckers",
            "https://hybrid-analysis.com/sample/1f75fd5ec731cc5b1f338a5f7f44b42c9f1988214c373bf582d766934399b525",
            "https://twitter.com/PORNO_SEXYBABES",
            "IPv4 199.59.243.224  and  IPv4 67.21.93.249 - command_and_control",
            "103.246.145.111 phishing",
            "nr-data.net | Apple Private Data collection",
            "BitRAT CnC: File Hash SHA256 23d60876953677ed4627f3449661dc549c0f747adb4b082078dac90d60ae7706",
            "00000000.apple.com  | remote SIM Swap",
            "https://otx.alienvault.com/indicator/file/23d60876953677ed4627f3449661dc549c0f747adb4b082078dac90d60ae7706#:~:text=%C3%97",
            "103.246.145.111  - scanning host",
            "https://app-portal.wsgc.com/saml20/idp/sso?SAMLRequest=jZFBb8IwDIX/SpR70zS0sEa0iA1NQ2IagrLDLlNII4jWJl2cwvj3qyhI7IJ2tPzs9/x5PPmpK3RQDrQ1GY4IxUgZaUttdhneFM/BA57kYxB1xRo+bf3erNR3q8CjbtAA7zsZbp3hVoAGbkStgHvJ19PXBWeE8sZZb6WtMJoCKOc7qydroK2VWyt30FJtVosM771vgIfhETTZCvkF3roTkXtnjZaVIqBk67Q/hUICRrMugzbCn3NfR0XTBI11XlTkCDtJpK3Dc0Ia6rIJASxG81mGP0dpOYqGVEZxGYkk3iaDVMZMKipGMR0kSScDaNXcgBfGZ5hRNghoGrC4YIzTlNMhidPkA6Pl5bhHbXpo90hsexHwl6JYBsu3dYHR+xV+J8AX1Pzs7m4Z318srmBx/m+M4/DWK7+Uf7+c/wI=&RelayState=AcE8QCtmc3hl5id4ZjN8p",
            "https://www.virustotal.com/en/domain/sipa.be (GoodCop - BadCop 404 error. This may have been a dorkingbeauty graph or collection. There seems to be several VT users experiencing similar issues w/overlap",
            "https://ms13p01if-qufw21344001.ms.if.apple.com:8083/",
            "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635 (Apple remote hacktool that enter via Apple media)",
            "usw2-platform-dmchat-avengers-prod-ext.apple.com",
            "https://otx.alienvault.com/indicator/hostname/00000000.apple.com#:~:text=%C3%97",
            "Malware Hosting * Spyware: http://141.98.6.249/boat.arm7,  http://141.98.6.249/boat.ppc , http://141.98.6.249/boat.x86"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "RATel",
              "display_name": "RATel",
              "target": null
            },
            {
              "id": "trojan.mirai/genericrxui",
              "display_name": "trojan.mirai/genericrxui",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1588",
              "name": "Obtain Capabilities",
              "display_name": "T1588 - Obtain Capabilities"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "658f967a4fc7ebe8021b9382",
          "export_count": 30,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 578,
            "FileHash-SHA1": 521,
            "FileHash-SHA256": 6392,
            "URL": 5741,
            "domain": 2243,
            "hostname": 1536,
            "SSLCertFingerprint": 2,
            "email": 8,
            "CVE": 1
          },
          "indicator_count": 17022,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "811 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "658f967a4fc7ebe8021b9382",
          "name": "Mirai Apple Attack +",
          "description": "This is hard to make sense of. All calls, clicks on a DGA Domain masquerading as desired service, lands you on the radar of a faux service where in turn bad actors attack everything. Target, remotely hack, follow, smear your life, same victim auto populates 79%, no hunt for assaulter.\n I'm assuming to see it one must 1st be in a Botnet. We keep seeing the same targets but no preparator. \nShe said \"Life was busy, life was good; full of health and hope. Then one sunny October day... I'm still grateful but what happened my body, thoughts and the world around me? Where's God? Am I a criminally responsible for getting attacked?\"",
          "modified": "2024-01-29T03:01:29.910000",
          "created": "2023-12-30T04:03:06.598000",
          "tags": [
            "whois record",
            "ssl certificate",
            "contacted",
            "whois whois",
            "historical ssl",
            "referrer",
            "communicating",
            "resolutions",
            "apple",
            "collections",
            "core",
            "stealer",
            "execution",
            "ratel",
            "suspicious",
            "threat",
            "paste",
            "iocs",
            "hostnames",
            "urls https",
            "windir",
            "json data",
            "localappdata",
            "ascii text",
            "unicode text",
            "pattern match",
            "file",
            "indicator",
            "mitre att",
            "path",
            "factory",
            "hybrid",
            "general",
            "memcommit",
            "regsetvalueexa",
            "regdword",
            "t1055",
            "high",
            "regbinary",
            "dynamic dns",
            "regsetvalueexw",
            "regsz",
            "medium",
            "win32",
            "malware",
            "copy",
            "capture",
            "name servers",
            "creation date",
            "servers",
            "passive dns",
            "urls",
            "domain",
            "search",
            "expiration date",
            "scan endpoints",
            "all scoreblue",
            "date",
            "next",
            "applenoc",
            "showing",
            "status",
            "united",
            "as44273 host",
            "unknown",
            "all search",
            "otx scoreblue",
            "aaaa",
            "as54113",
            "privacy inc",
            "customer",
            "asnone united",
            "entries",
            "pulse pulses",
            "dga",
            "redacted for",
            "as20940",
            "body",
            "for privacy",
            "ipv4",
            "files",
            "location united",
            "america asn",
            "as54252",
            "type name",
            "dns replication",
            "iana",
            "whois lookup",
            "ipv4 address",
            "ripe ncc",
            "afrinic",
            "africa",
            "apnic",
            "asia pacific",
            "arin",
            "lacnic",
            "elf executable",
            "sysv",
            "linux",
            "elf wgetboat",
            "contacted urls",
            "red team",
            "tsara brashears",
            "apple phone",
            "unlocker",
            "fakedout threat",
            "hostname",
            "samples",
            "mirai",
            "ph elf",
            "telefonica de",
            "elf collection",
            "llwn",
            "text",
            "gp practice",
            "oracle",
            "apple ios",
            "password",
            "threat network",
            "kgs0",
            "kls0",
            "hacktool",
            "probe",
            "malicious"
          ],
          "references": [
            "https://www.rmvictimlaw.org/about-us/board-directors/hazel-heckers",
            "https://hybrid-analysis.com/sample/1f75fd5ec731cc5b1f338a5f7f44b42c9f1988214c373bf582d766934399b525",
            "https://twitter.com/PORNO_SEXYBABES",
            "IPv4 199.59.243.224  and  IPv4 67.21.93.249 - command_and_control",
            "103.246.145.111 phishing",
            "nr-data.net | Apple Private Data collection",
            "BitRAT CnC: File Hash SHA256 23d60876953677ed4627f3449661dc549c0f747adb4b082078dac90d60ae7706",
            "00000000.apple.com  | remote SIM Swap",
            "https://otx.alienvault.com/indicator/file/23d60876953677ed4627f3449661dc549c0f747adb4b082078dac90d60ae7706#:~:text=%C3%97",
            "103.246.145.111  - scanning host",
            "https://app-portal.wsgc.com/saml20/idp/sso?SAMLRequest=jZFBb8IwDIX/SpR70zS0sEa0iA1NQ2IagrLDLlNII4jWJl2cwvj3qyhI7IJ2tPzs9/x5PPmpK3RQDrQ1GY4IxUgZaUttdhneFM/BA57kYxB1xRo+bf3erNR3q8CjbtAA7zsZbp3hVoAGbkStgHvJ19PXBWeE8sZZb6WtMJoCKOc7qydroK2VWyt30FJtVosM771vgIfhETTZCvkF3roTkXtnjZaVIqBk67Q/hUICRrMugzbCn3NfR0XTBI11XlTkCDtJpK3Dc0Ia6rIJASxG81mGP0dpOYqGVEZxGYkk3iaDVMZMKipGMR0kSScDaNXcgBfGZ5hRNghoGrC4YIzTlNMhidPkA6Pl5bhHbXpo90hsexHwl6JYBsu3dYHR+xV+J8AX1Pzs7m4Z318srmBx/m+M4/DWK7+Uf7+c/wI=&RelayState=AcE8QCtmc3hl5id4ZjN8p",
            "https://www.virustotal.com/en/domain/sipa.be (GoodCop - BadCop 404 error. This may have been a dorkingbeauty graph or collection. There seems to be several VT users experiencing similar issues w/overlap",
            "https://ms13p01if-qufw21344001.ms.if.apple.com:8083/",
            "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635 (Apple remote hacktool that enter via Apple media)",
            "usw2-platform-dmchat-avengers-prod-ext.apple.com",
            "https://otx.alienvault.com/indicator/hostname/00000000.apple.com#:~:text=%C3%97",
            "Malware Hosting * Spyware: http://141.98.6.249/boat.arm7,  http://141.98.6.249/boat.ppc , http://141.98.6.249/boat.x86"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "RATel",
              "display_name": "RATel",
              "target": null
            },
            {
              "id": "trojan.mirai/genericrxui",
              "display_name": "trojan.mirai/genericrxui",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1588",
              "name": "Obtain Capabilities",
              "display_name": "T1588 - Obtain Capabilities"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 26,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 578,
            "FileHash-SHA1": 521,
            "FileHash-SHA256": 6392,
            "URL": 5741,
            "domain": 2243,
            "hostname": 1536,
            "SSLCertFingerprint": 2,
            "email": 8,
            "CVE": 1
          },
          "indicator_count": 17022,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 229,
          "modified_text": "811 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6585b18d61efd8798827c12a",
          "name": "Potential Poodle Attack against a server | Injection | Threat Network",
          "description": "",
          "modified": "2024-01-21T15:01:52.390000",
          "created": "2023-12-22T15:55:57.639000",
          "tags": [
            "whois record",
            "ssl certificate",
            "threat roundup",
            "december",
            "whois whois",
            "historical ssl",
            "referrer",
            "problems",
            "november",
            "tsara brashears",
            "startpage",
            "core",
            "hacktool",
            "vhash",
            "authentihash",
            "imphash",
            "rich pe",
            "ssdeep",
            "file type",
            "win32 dll",
            "magic pe32",
            "intel",
            "ms windows",
            "compiler",
            "no data",
            "tag count",
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "search",
            "iocs",
            "sample summary",
            "as54113",
            "united",
            "xamzexpires300",
            "unknown",
            "a domains",
            "passive dns",
            "entries",
            "github pages",
            "request id",
            "sea x",
            "virtool",
            "accept",
            "cache",
            "hit x",
            "date hash",
            "avast avg",
            "files show",
            "execution",
            "contacted",
            "threat analyzer",
            "threat",
            "paste",
            "hostnames",
            "urls http",
            "noname057",
            "generic malware",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "generic",
            "inject",
            "!#AddsCopyToStartup",
            "SLF:Exploit:Win32/UACPathBypass.A",
            "SSL excessive fatal alerts (possible POODLE attack against serve",
            "injector",
            "185.199.108.133",
            "malware infection",
            "link",
            "name servers",
            "date",
            "title",
            "urls",
            "domain robot",
            "for privacy",
            "redacted for",
            "expiration date",
            "emotet",
            "upx",
            "msil",
            "trojan",
            "malware",
            "apple",
            "data collection",
            "privilege escalation",
            "evasive",
            "show",
            "scan endpoints",
            "all octoseek",
            "filehash",
            "pulse pulses",
            "av detections",
            "ids detections",
            "yara detections",
            "copy",
            "threat network",
            "service modification",
            "target",
            "targeting an individual",
            "cybercrime",
            "fraud services",
            "attack",
            "africa",
            "libel",
            "password cracker",
            "ios"
          ],
          "references": [
            "frostwire-5.3.9.windows.exe",
            "185.199.108.133",
            "cdn-185-199-108-133.github.com",
            "AS : AS16509 Amazon.com, Inc",
            "SRC URL : http://dl.frostwire.com/frostwire/5.3.9/frostwire-5.3.9.windows.exe",
            "IP : 54.192.29.164",
            "https://otx.alienvault.com/indicator/ip/185.199.108.133",
            "Malware Hosting: IPv4 185.199.108.133, 185.199.109.133, 185.199.110.133, 185.199.111.133",
            "YARA Rules",
            "Matches rule Windows_API_Function from ruleset Windows_API_Function by InQuest Labs",
            "Matches rule Adobe_XMP_Identifier from ruleset Adobe_XMP_Identifier by InQuest Labs",
            "Matches rule UPX from ruleset UPX by kevoreilly",
            "REFERENCE: https://goo.gl/hXbwiV",
            "RULE_LINK: https://valhalla.nextron-systems.com/info/rule/SUSP_JS_Command",
            "More information: https://www.nextron-systems.com/notes-on-virustotal-matches/",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [phishing]",
            "https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowledgement+PD-MB&utm_term= [Mobile transactional with ads/ malicious]",
            "https://otx.alienvault.com/indicator/url/https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [ Walker | Apple Password Cracker]",
            "http://103.246.145.111/gateonl.php?hwid=WALKER-PC-WALKER&cpuname=Intel [Apple exploit]",
            "www.pornhub.com [New Relic | nr-data.net | Apple Private Data Collection]",
            "www.anyxxxtube.net",
            "https://otx.alienvault.com/indicator/url/https://www.bleepingcomputer.com/forums/t/268006/wormmalware-that-kills-run-system-restore-regedit/ [ phishing attack directed towards Tsara Brashears]",
            "phishing-campaign-cloudstation-eu-west-98.githubusercontent.com [phishing]",
            "louisianarooflawyers.com [phishing| songculture.com redirect , compromised by threat actors]",
            "103.246.145.111 [malware]",
            "x.ss2.us",
            "nr-data.net [Apple Private Data Collection]"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Generic",
              "display_name": "Generic",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "VirTool",
              "display_name": "VirTool",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Magic",
              "display_name": "Magic",
              "target": null
            },
            {
              "id": "Multios.Coinminer.Miner-6781728-2",
              "display_name": "Multios.Coinminer.Miner-6781728-2",
              "target": null
            },
            {
              "id": "Win32/Ispen BADNEWS Fake User-Agent",
              "display_name": "Win32/Ispen BADNEWS Fake User-Agent",
              "target": null
            },
            {
              "id": "Babulya/CollectorStealer User-Agent",
              "display_name": "Babulya/CollectorStealer User-Agent",
              "target": null
            },
            {
              "id": "Win.Malware.Generic-9820446-0",
              "display_name": "Win.Malware.Generic-9820446-0",
              "target": null
            },
            {
              "id": "Worm:Win32/AutoRun!atmn",
              "display_name": "Worm:Win32/AutoRun!atmn",
              "target": "/malware/Worm:Win32/AutoRun!atmn"
            },
            {
              "id": "VirTool:MSIL/Obfuscator.BV",
              "display_name": "VirTool:MSIL/Obfuscator.BV",
              "target": "/malware/VirTool:MSIL/Obfuscator.BV"
            },
            {
              "id": "Win.Trojan.Emotet-9850453-0",
              "display_name": "Win.Trojan.Emotet-9850453-0",
              "target": null
            },
            {
              "id": "ALF:HSTR:HackTool:ExtremeInjector.S01",
              "display_name": "ALF:HSTR:HackTool:ExtremeInjector.S01",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:Trojan:Win32/AgentTesla!rfn",
              "display_name": "ALF:HeraklezEval:Trojan:Win32/AgentTesla!rfn",
              "target": null
            },
            {
              "id": "!#HSTR:Win32/Spectorsoft",
              "display_name": "!#HSTR:Win32/Spectorsoft",
              "target": "/malware/!#HSTR:Win32/Spectorsoft"
            },
            {
              "id": "ALF:Base64EncodeFunctionMonitorW",
              "display_name": "ALF:Base64EncodeFunctionMonitorW",
              "target": null
            },
            {
              "id": "185.199.108.133.Malware_Host",
              "display_name": "185.199.108.133.Malware_Host",
              "target": null
            },
            {
              "id": "adware.opencandy",
              "display_name": "adware.opencandy",
              "target": null
            },
            {
              "id": "Malvertizing",
              "display_name": "Malvertizing",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "TA0002",
              "name": "Execution",
              "display_name": "TA0002 - Execution"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "TA0005",
              "name": "Defense Evasion",
              "display_name": "TA0005 - Defense Evasion"
            },
            {
              "id": "TA0006",
              "name": "Credential Access",
              "display_name": "TA0006 - Credential Access"
            },
            {
              "id": "TA0007",
              "name": "Discovery",
              "display_name": "TA0007 - Discovery"
            },
            {
              "id": "TA0009",
              "name": "Collection",
              "display_name": "TA0009 - Collection"
            },
            {
              "id": "TA0034",
              "name": "Impact",
              "display_name": "TA0034 - Impact"
            },
            {
              "id": "TA0040",
              "name": "Impact",
              "display_name": "TA0040 - Impact"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 32,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1872,
            "FileHash-SHA1": 1140,
            "FileHash-SHA256": 2367,
            "URL": 1969,
            "domain": 327,
            "hostname": 1025,
            "email": 1
          },
          "indicator_count": 8701,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "819 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6585b183175afafb5e3bfff5",
          "name": "Potential Poodle Attack against a server | Injection | Threat Network",
          "description": "",
          "modified": "2024-01-21T15:01:52.390000",
          "created": "2023-12-22T15:55:47.977000",
          "tags": [
            "whois record",
            "ssl certificate",
            "threat roundup",
            "december",
            "whois whois",
            "historical ssl",
            "referrer",
            "problems",
            "november",
            "tsara brashears",
            "startpage",
            "core",
            "hacktool",
            "vhash",
            "authentihash",
            "imphash",
            "rich pe",
            "ssdeep",
            "file type",
            "win32 dll",
            "magic pe32",
            "intel",
            "ms windows",
            "compiler",
            "no data",
            "tag count",
            "ioc search",
            "new ioc",
            "teams api",
            "contact",
            "search",
            "iocs",
            "sample summary",
            "as54113",
            "united",
            "xamzexpires300",
            "unknown",
            "a domains",
            "passive dns",
            "entries",
            "github pages",
            "request id",
            "sea x",
            "virtool",
            "accept",
            "cache",
            "hit x",
            "date hash",
            "avast avg",
            "files show",
            "execution",
            "contacted",
            "threat analyzer",
            "threat",
            "paste",
            "hostnames",
            "urls http",
            "noname057",
            "generic malware",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "generic",
            "inject",
            "!#AddsCopyToStartup",
            "SLF:Exploit:Win32/UACPathBypass.A",
            "SSL excessive fatal alerts (possible POODLE attack against serve",
            "injector",
            "185.199.108.133",
            "malware infection",
            "link",
            "name servers",
            "date",
            "title",
            "urls",
            "domain robot",
            "for privacy",
            "redacted for",
            "expiration date",
            "emotet",
            "upx",
            "msil",
            "trojan",
            "malware",
            "apple",
            "data collection",
            "privilege escalation",
            "evasive",
            "show",
            "scan endpoints",
            "all octoseek",
            "filehash",
            "pulse pulses",
            "av detections",
            "ids detections",
            "yara detections",
            "copy",
            "threat network",
            "service modification",
            "target",
            "targeting an individual",
            "cybercrime",
            "fraud services",
            "attack",
            "africa",
            "libel",
            "password cracker",
            "ios"
          ],
          "references": [
            "frostwire-5.3.9.windows.exe",
            "185.199.108.133",
            "cdn-185-199-108-133.github.com",
            "AS : AS16509 Amazon.com, Inc",
            "SRC URL : http://dl.frostwire.com/frostwire/5.3.9/frostwire-5.3.9.windows.exe",
            "IP : 54.192.29.164",
            "https://otx.alienvault.com/indicator/ip/185.199.108.133",
            "Malware Hosting: IPv4 185.199.108.133, 185.199.109.133, 185.199.110.133, 185.199.111.133",
            "YARA Rules",
            "Matches rule Windows_API_Function from ruleset Windows_API_Function by InQuest Labs",
            "Matches rule Adobe_XMP_Identifier from ruleset Adobe_XMP_Identifier by InQuest Labs",
            "Matches rule UPX from ruleset UPX by kevoreilly",
            "REFERENCE: https://goo.gl/hXbwiV",
            "RULE_LINK: https://valhalla.nextron-systems.com/info/rule/SUSP_JS_Command",
            "More information: https://www.nextron-systems.com/notes-on-virustotal-matches/",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [phishing]",
            "https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowledgement+PD-MB&utm_term= [Mobile transactional with ads/ malicious]",
            "https://otx.alienvault.com/indicator/url/https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [ Walker | Apple Password Cracker]",
            "http://103.246.145.111/gateonl.php?hwid=WALKER-PC-WALKER&cpuname=Intel [Apple exploit]",
            "www.pornhub.com [New Relic | nr-data.net | Apple Private Data Collection]",
            "www.anyxxxtube.net",
            "https://otx.alienvault.com/indicator/url/https://www.bleepingcomputer.com/forums/t/268006/wormmalware-that-kills-run-system-restore-regedit/ [ phishing attack directed towards Tsara Brashears]",
            "phishing-campaign-cloudstation-eu-west-98.githubusercontent.com [phishing]",
            "louisianarooflawyers.com [phishing| songculture.com redirect , compromised by threat actors]",
            "103.246.145.111 [malware]",
            "x.ss2.us",
            "nr-data.net [Apple Private Data Collection]"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Generic",
              "display_name": "Generic",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "VirTool",
              "display_name": "VirTool",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Magic",
              "display_name": "Magic",
              "target": null
            },
            {
              "id": "Multios.Coinminer.Miner-6781728-2",
              "display_name": "Multios.Coinminer.Miner-6781728-2",
              "target": null
            },
            {
              "id": "Win32/Ispen BADNEWS Fake User-Agent",
              "display_name": "Win32/Ispen BADNEWS Fake User-Agent",
              "target": null
            },
            {
              "id": "Babulya/CollectorStealer User-Agent",
              "display_name": "Babulya/CollectorStealer User-Agent",
              "target": null
            },
            {
              "id": "Win.Malware.Generic-9820446-0",
              "display_name": "Win.Malware.Generic-9820446-0",
              "target": null
            },
            {
              "id": "Worm:Win32/AutoRun!atmn",
              "display_name": "Worm:Win32/AutoRun!atmn",
              "target": "/malware/Worm:Win32/AutoRun!atmn"
            },
            {
              "id": "VirTool:MSIL/Obfuscator.BV",
              "display_name": "VirTool:MSIL/Obfuscator.BV",
              "target": "/malware/VirTool:MSIL/Obfuscator.BV"
            },
            {
              "id": "Win.Trojan.Emotet-9850453-0",
              "display_name": "Win.Trojan.Emotet-9850453-0",
              "target": null
            },
            {
              "id": "ALF:HSTR:HackTool:ExtremeInjector.S01",
              "display_name": "ALF:HSTR:HackTool:ExtremeInjector.S01",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:Trojan:Win32/AgentTesla!rfn",
              "display_name": "ALF:HeraklezEval:Trojan:Win32/AgentTesla!rfn",
              "target": null
            },
            {
              "id": "!#HSTR:Win32/Spectorsoft",
              "display_name": "!#HSTR:Win32/Spectorsoft",
              "target": "/malware/!#HSTR:Win32/Spectorsoft"
            },
            {
              "id": "ALF:Base64EncodeFunctionMonitorW",
              "display_name": "ALF:Base64EncodeFunctionMonitorW",
              "target": null
            },
            {
              "id": "185.199.108.133.Malware_Host",
              "display_name": "185.199.108.133.Malware_Host",
              "target": null
            },
            {
              "id": "adware.opencandy",
              "display_name": "adware.opencandy",
              "target": null
            },
            {
              "id": "Malvertizing",
              "display_name": "Malvertizing",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "TA0002",
              "name": "Execution",
              "display_name": "TA0002 - Execution"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "TA0005",
              "name": "Defense Evasion",
              "display_name": "TA0005 - Defense Evasion"
            },
            {
              "id": "TA0006",
              "name": "Credential Access",
              "display_name": "TA0006 - Credential Access"
            },
            {
              "id": "TA0007",
              "name": "Discovery",
              "display_name": "TA0007 - Discovery"
            },
            {
              "id": "TA0009",
              "name": "Collection",
              "display_name": "TA0009 - Collection"
            },
            {
              "id": "TA0034",
              "name": "Impact",
              "display_name": "TA0034 - Impact"
            },
            {
              "id": "TA0040",
              "name": "Impact",
              "display_name": "TA0040 - Impact"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 32,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1872,
            "FileHash-SHA1": 1140,
            "FileHash-SHA256": 2367,
            "URL": 1969,
            "domain": 327,
            "hostname": 1025,
            "email": 1
          },
          "indicator_count": 8701,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "819 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65a48b6ea16eeb6b54dfad7c",
          "name": "https://neca.omeclk.com/portal/wts/uc^cn^ejkaejsaBeyk7-^Oa | Brian Sabey dangerous obsession with Tsara Brashears",
          "description": "",
          "modified": "2024-01-15T01:33:34.790000",
          "created": "2024-01-15T01:33:34.790000",
          "tags": [
            "cisco umbrella",
            "site",
            "alexa top",
            "emotet",
            "telefonica co",
            "million",
            "malware",
            "detection list",
            "blacklist",
            "alexa",
            "installcore",
            "heur",
            "cyber threat",
            "united",
            "phishing",
            "engineering",
            "phishing site",
            "team phishing",
            "spammer",
            "malicious site",
            "team",
            "download",
            "cobalt strike",
            "facebook",
            "artemis",
            "pony",
            "binder",
            "suppobox",
            "virut",
            "ramnit",
            "dropper",
            "formbook",
            "azorult",
            "simda",
            "downloader",
            "service",
            "bank",
            "zbot",
            "trojanspy",
            "heodo",
            "hostname",
            "hostnames",
            "whois record",
            "kgs0",
            "kls0",
            "apple ios",
            "tsara brashears",
            "ssl certificate",
            "elf collection",
            "cyberstalking",
            "spyware",
            "hackers",
            "installer",
            "open",
            "banker",
            "keylogger",
            "malicious",
            "hacktool",
            "core",
            "noname057",
            "generic malware",
            "safe site",
            "malware site",
            "iframe",
            "riskware",
            "exploit",
            "fakealert",
            "unsafe",
            "acint",
            "win64",
            "nircmd",
            "agent",
            "opencandy",
            "conduit",
            "swrort",
            "crack",
            "installpack",
            "xtrat",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "unruy",
            "filetour",
            "floxif",
            "cleaner",
            "patcher",
            "adload",
            "presenoker",
            "wacatac",
            "fusioncore",
            "genkryptik",
            "webtoolbar",
            "maltiverse",
            "smokeloader",
            "download json",
            "urls",
            "blacklist http",
            "kyriazhs1975",
            "vidar",
            "strike",
            "china cobalt",
            "meterpreter",
            "nanocore rat",
            "njrat",
            "redline stealer",
            "stealer",
            "nymaim",
            "mirai",
            "ghost rat",
            "runescape",
            "bradesco",
            "msil",
            "bladabindi",
            "orkut",
            "cutwail",
            "bandoo",
            "matsnu",
            "inmortal",
            "domains",
            "redline",
            "control server",
            "services",
            "generic",
            "br",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "squirrelwaffle",
            "soc http",
            "soc https",
            "back",
            "download csv",
            "json sample",
            "injector",
            "malicious url",
            "downldr",
            "covid19 scam",
            "historical ssl",
            "referrer",
            "contacted",
            "whois whois",
            "contacted urls",
            "whois sslcert",
            "threat roundup",
            "copy",
            "august",
            "execution",
            "ransomware",
            "gopher",
            "remcos",
            "attack",
            "radar ineractive",
            "paypal",
            "covid19",
            "phishing chase",
            "phishing google",
            "tracker malware",
            "chase personal",
            "banking",
            "javascript",
            "please",
            "cnc server",
            "tracker",
            "cnc feodo",
            "phishtank",
            "threats et",
            "name verdict",
            "falcon sandbox",
            "pattern match",
            "file",
            "ascii text",
            "indicator",
            "windows nt",
            "jpeg image",
            "appdata",
            "jfif standard",
            "script",
            "show",
            "date",
            "span",
            "unknown",
            "general",
            "hybrid",
            "local",
            "click",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "path",
            "http header",
            "tcp traffic",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "accept",
            "adware",
            "ip address",
            "hsbc",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "adaptivebee",
            "iobit",
            "trojanx",
            "webshell",
            "systweak",
            "behav",
            "tiggre",
            "runtime process",
            "sha256",
            "sha1",
            "mark brian sabey",
            "brian sabey",
            "sabey",
            "apple",
            "114.114.114.114",
            "attorney",
            "law",
            "spammer",
            "fraud service",
            "hallrender",
            "malvertizing",
            "cybercrime",
            "social engineering",
            "malware hosting",
            "cyber threat",
            "iphone unlocker",
            "malicious",
            "attacker",
            "tulach",
            "tulach.cc",
            "adult content",
            "child pornographer",
            "sabey data centers",
            "hall render denver",
            "monitoring",
            "stalker",
            "dev",
            "developer",
            "cyber harassment",
            "defacement",
            "death threats",
            "miner",
            "agenttesla",
            "trojan",
            "detplock",
            "networm",
            "rms",
            "sneaky server",
            "replacement",
            "unauthorized",
            "steam route",
            "tool",
            "probe",
            "safebae.org",
            "safebae",
            "daisy",
            "daisy coleman",
            "benjamin",
            "colorado",
            "missouri",
            "telefonica",
            "boost mobile",
            "blackievirus.com",
            "TrojanX",
            "metro t-mobile",
            "t-mobile",
            "mile high media",
            "CNC",
            "C2",
            "malware host",
            "yixun"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/a1b9247b6ad18f1cda0304e406333459d4000fced5753f91e5c046f6577c388a",
            "https://www.hallrender.com/attorney/brian-sabey",
            "safebae.org",
            "poemhunter.com",
            "http://www.hallrender.com/resources/blog/",
            "http://benjamin.xww.de/",
            "http://alohatube.xyz/search/tsara-brashears",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "Hybrid Analysis",
            "wTools",
            "Research"
          ],
          "public": 1,
          "adversary": "Tulach | Mark Brian Sabey | Hall Render Law Firm",
          "targeted_countries": [
            "United States of America",
            "Japan"
          ],
          "malware_families": [
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "BR",
              "display_name": "BR",
              "target": null
            },
            {
              "id": "Radar Ineractive",
              "display_name": "Radar Ineractive",
              "target": null
            },
            {
              "id": "HSBC",
              "display_name": "HSBC",
              "target": null
            },
            {
              "id": "RMS",
              "display_name": "RMS",
              "target": null
            },
            {
              "id": "Feodo Tracker",
              "display_name": "Feodo Tracker",
              "target": null
            },
            {
              "id": "Wacatac",
              "display_name": "Wacatac",
              "target": null
            },
            {
              "id": "Zpevdo",
              "display_name": "Zpevdo",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "OpenCandy",
              "display_name": "OpenCandy",
              "target": null
            },
            {
              "id": "xRAT",
              "display_name": "xRAT",
              "target": null
            },
            {
              "id": "Vidar",
              "display_name": "Vidar",
              "target": null
            },
            {
              "id": "Agent Tesla",
              "display_name": "Agent Tesla",
              "target": null
            },
            {
              "id": "noname057",
              "display_name": "noname057",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "DarkSide .Beware",
              "display_name": "DarkSide .Beware",
              "target": null
            },
            {
              "id": "Nymaim",
              "display_name": "Nymaim",
              "target": null
            },
            {
              "id": "SLFPER:BrowserModifier:Win32/MediaMagnet",
              "display_name": "SLFPER:BrowserModifier:Win32/MediaMagnet",
              "target": null
            },
            {
              "id": "Virut",
              "display_name": "Virut",
              "target": null
            },
            {
              "id": "Cutwail",
              "display_name": "Cutwail",
              "target": null
            },
            {
              "id": "Nanocore RAT",
              "display_name": "Nanocore RAT",
              "target": null
            },
            {
              "id": "Tulach Malware",
              "display_name": "Tulach Malware",
              "target": null
            },
            {
              "id": "SuppoBox",
              "display_name": "SuppoBox",
              "target": null
            },
            {
              "id": "Systweak",
              "display_name": "Systweak",
              "target": null
            },
            {
              "id": "Occamy",
              "display_name": "Occamy",
              "target": null
            },
            {
              "id": "Tiggre",
              "display_name": "Tiggre",
              "target": null
            },
            {
              "id": "IObit",
              "display_name": "IObit",
              "target": null
            },
            {
              "id": "Sality",
              "display_name": "Sality",
              "target": null
            },
            {
              "id": "FORMBOOK",
              "display_name": "FORMBOOK",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Yixun",
              "display_name": "Yixun",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1043",
              "name": "Commonly Used Port",
              "display_name": "T1043 - Commonly Used Port"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1179",
              "name": "Hooking",
              "display_name": "T1179 - Hooking"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            }
          ],
          "industries": [
            "Health"
          ],
          "TLP": "green",
          "cloned_from": "6590f9b6b1fe0330c655c25f",
          "export_count": 36,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1643,
            "hostname": 1438,
            "CVE": 30,
            "FileHash-MD5": 2853,
            "FileHash-SHA1": 1584,
            "FileHash-SHA256": 3001,
            "URL": 2904,
            "email": 1
          },
          "indicator_count": 13454,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 228,
          "modified_text": "825 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6590f9b6b1fe0330c655c25f",
          "name": "https://neca.omeclk.com/portal/wts/uc^cn^ejkaejsaBeyk7-^Oa | Brian Sabey dangerous obsession with Tsara Brashears ",
          "description": "",
          "modified": "2023-12-31T05:18:46.519000",
          "created": "2023-12-31T05:18:46.519000",
          "tags": [
            "cisco umbrella",
            "site",
            "alexa top",
            "emotet",
            "telefonica co",
            "million",
            "malware",
            "detection list",
            "blacklist",
            "alexa",
            "installcore",
            "heur",
            "cyber threat",
            "united",
            "phishing",
            "engineering",
            "phishing site",
            "team phishing",
            "spammer",
            "malicious site",
            "team",
            "download",
            "cobalt strike",
            "facebook",
            "artemis",
            "pony",
            "binder",
            "suppobox",
            "virut",
            "ramnit",
            "dropper",
            "formbook",
            "azorult",
            "simda",
            "downloader",
            "service",
            "bank",
            "zbot",
            "trojanspy",
            "heodo",
            "hostname",
            "hostnames",
            "whois record",
            "kgs0",
            "kls0",
            "apple ios",
            "tsara brashears",
            "ssl certificate",
            "elf collection",
            "cyberstalking",
            "spyware",
            "hackers",
            "installer",
            "open",
            "banker",
            "keylogger",
            "malicious",
            "hacktool",
            "core",
            "noname057",
            "generic malware",
            "safe site",
            "malware site",
            "iframe",
            "riskware",
            "exploit",
            "fakealert",
            "unsafe",
            "acint",
            "win64",
            "nircmd",
            "agent",
            "opencandy",
            "conduit",
            "swrort",
            "crack",
            "installpack",
            "xtrat",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "unruy",
            "filetour",
            "floxif",
            "cleaner",
            "patcher",
            "adload",
            "presenoker",
            "wacatac",
            "fusioncore",
            "genkryptik",
            "webtoolbar",
            "maltiverse",
            "smokeloader",
            "download json",
            "urls",
            "blacklist http",
            "kyriazhs1975",
            "vidar",
            "strike",
            "china cobalt",
            "meterpreter",
            "nanocore rat",
            "njrat",
            "redline stealer",
            "stealer",
            "nymaim",
            "mirai",
            "ghost rat",
            "runescape",
            "bradesco",
            "msil",
            "bladabindi",
            "orkut",
            "cutwail",
            "bandoo",
            "matsnu",
            "inmortal",
            "domains",
            "redline",
            "control server",
            "services",
            "generic",
            "br",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "squirrelwaffle",
            "soc http",
            "soc https",
            "back",
            "download csv",
            "json sample",
            "injector",
            "malicious url",
            "downldr",
            "covid19 scam",
            "historical ssl",
            "referrer",
            "contacted",
            "whois whois",
            "contacted urls",
            "whois sslcert",
            "threat roundup",
            "copy",
            "august",
            "execution",
            "ransomware",
            "gopher",
            "remcos",
            "attack",
            "radar ineractive",
            "paypal",
            "covid19",
            "phishing chase",
            "phishing google",
            "tracker malware",
            "chase personal",
            "banking",
            "javascript",
            "please",
            "cnc server",
            "tracker",
            "cnc feodo",
            "phishtank",
            "threats et",
            "name verdict",
            "falcon sandbox",
            "pattern match",
            "file",
            "ascii text",
            "indicator",
            "windows nt",
            "jpeg image",
            "appdata",
            "jfif standard",
            "script",
            "show",
            "date",
            "span",
            "unknown",
            "general",
            "hybrid",
            "local",
            "click",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "path",
            "http header",
            "tcp traffic",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "accept",
            "adware",
            "ip address",
            "hsbc",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "adaptivebee",
            "iobit",
            "trojanx",
            "webshell",
            "systweak",
            "behav",
            "tiggre",
            "runtime process",
            "sha256",
            "sha1",
            "mark brian sabey",
            "brian sabey",
            "sabey",
            "apple",
            "114.114.114.114",
            "attorney",
            "law",
            "spammer",
            "fraud service",
            "hallrender",
            "malvertizing",
            "cybercrime",
            "social engineering",
            "malware hosting",
            "cyber threat",
            "iphone unlocker",
            "malicious",
            "attacker",
            "tulach",
            "tulach.cc",
            "adult content",
            "child pornographer",
            "sabey data centers",
            "hall render denver",
            "monitoring",
            "stalker",
            "dev",
            "developer",
            "cyber harassment",
            "defacement",
            "death threats",
            "miner",
            "agenttesla",
            "trojan",
            "detplock",
            "networm",
            "rms",
            "sneaky server",
            "replacement",
            "unauthorized",
            "steam route",
            "tool",
            "probe",
            "safebae.org",
            "safebae",
            "daisy",
            "daisy coleman",
            "benjamin",
            "colorado",
            "missouri",
            "telefonica",
            "boost mobile",
            "blackievirus.com",
            "TrojanX",
            "metro t-mobile",
            "t-mobile",
            "mile high media",
            "CNC",
            "C2",
            "malware host",
            "yixun"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/a1b9247b6ad18f1cda0304e406333459d4000fced5753f91e5c046f6577c388a",
            "https://www.hallrender.com/attorney/brian-sabey",
            "safebae.org",
            "poemhunter.com",
            "http://www.hallrender.com/resources/blog/",
            "http://benjamin.xww.de/",
            "http://alohatube.xyz/search/tsara-brashears",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "Hybrid Analysis",
            "wTools",
            "Research"
          ],
          "public": 1,
          "adversary": "Tulach | Mark Brian Sabey | Hall Render Law Firm",
          "targeted_countries": [
            "United States of America",
            "Japan"
          ],
          "malware_families": [
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "BR",
              "display_name": "BR",
              "target": null
            },
            {
              "id": "Radar Ineractive",
              "display_name": "Radar Ineractive",
              "target": null
            },
            {
              "id": "HSBC",
              "display_name": "HSBC",
              "target": null
            },
            {
              "id": "RMS",
              "display_name": "RMS",
              "target": null
            },
            {
              "id": "Feodo Tracker",
              "display_name": "Feodo Tracker",
              "target": null
            },
            {
              "id": "Wacatac",
              "display_name": "Wacatac",
              "target": null
            },
            {
              "id": "Zpevdo",
              "display_name": "Zpevdo",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "OpenCandy",
              "display_name": "OpenCandy",
              "target": null
            },
            {
              "id": "xRAT",
              "display_name": "xRAT",
              "target": null
            },
            {
              "id": "Vidar",
              "display_name": "Vidar",
              "target": null
            },
            {
              "id": "Agent Tesla",
              "display_name": "Agent Tesla",
              "target": null
            },
            {
              "id": "noname057",
              "display_name": "noname057",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "DarkSide .Beware",
              "display_name": "DarkSide .Beware",
              "target": null
            },
            {
              "id": "Nymaim",
              "display_name": "Nymaim",
              "target": null
            },
            {
              "id": "SLFPER:BrowserModifier:Win32/MediaMagnet",
              "display_name": "SLFPER:BrowserModifier:Win32/MediaMagnet",
              "target": null
            },
            {
              "id": "Virut",
              "display_name": "Virut",
              "target": null
            },
            {
              "id": "Cutwail",
              "display_name": "Cutwail",
              "target": null
            },
            {
              "id": "Nanocore RAT",
              "display_name": "Nanocore RAT",
              "target": null
            },
            {
              "id": "Tulach Malware",
              "display_name": "Tulach Malware",
              "target": null
            },
            {
              "id": "SuppoBox",
              "display_name": "SuppoBox",
              "target": null
            },
            {
              "id": "Systweak",
              "display_name": "Systweak",
              "target": null
            },
            {
              "id": "Occamy",
              "display_name": "Occamy",
              "target": null
            },
            {
              "id": "Tiggre",
              "display_name": "Tiggre",
              "target": null
            },
            {
              "id": "IObit",
              "display_name": "IObit",
              "target": null
            },
            {
              "id": "Sality",
              "display_name": "Sality",
              "target": null
            },
            {
              "id": "FORMBOOK",
              "display_name": "FORMBOOK",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Yixun",
              "display_name": "Yixun",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1043",
              "name": "Commonly Used Port",
              "display_name": "T1043 - Commonly Used Port"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1179",
              "name": "Hooking",
              "display_name": "T1179 - Hooking"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            }
          ],
          "industries": [
            "Health"
          ],
          "TLP": "green",
          "cloned_from": "658741502e029e25c7152cc0",
          "export_count": 45,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1643,
            "hostname": 1438,
            "CVE": 30,
            "FileHash-MD5": 2853,
            "FileHash-SHA1": 1584,
            "FileHash-SHA256": 3001,
            "URL": 2904,
            "email": 1
          },
          "indicator_count": 13454,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "840 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "658741502e029e25c7152cc0",
          "name": "busted hijacking",
          "description": "",
          "modified": "2023-12-23T20:21:36.641000",
          "created": "2023-12-23T20:21:36.641000",
          "tags": [
            "cisco umbrella",
            "site",
            "alexa top",
            "emotet",
            "telefonica co",
            "million",
            "malware",
            "detection list",
            "blacklist",
            "alexa",
            "installcore",
            "heur",
            "cyber threat",
            "united",
            "phishing",
            "engineering",
            "phishing site",
            "team phishing",
            "spammer",
            "malicious site",
            "team",
            "download",
            "cobalt strike",
            "facebook",
            "artemis",
            "pony",
            "binder",
            "suppobox",
            "virut",
            "ramnit",
            "dropper",
            "formbook",
            "azorult",
            "simda",
            "downloader",
            "service",
            "bank",
            "zbot",
            "trojanspy",
            "heodo",
            "hostname",
            "hostnames",
            "whois record",
            "kgs0",
            "kls0",
            "apple ios",
            "tsara brashears",
            "ssl certificate",
            "elf collection",
            "cyberstalking",
            "spyware",
            "hackers",
            "installer",
            "open",
            "banker",
            "keylogger",
            "malicious",
            "hacktool",
            "core",
            "noname057",
            "generic malware",
            "safe site",
            "malware site",
            "iframe",
            "riskware",
            "exploit",
            "fakealert",
            "unsafe",
            "acint",
            "win64",
            "nircmd",
            "agent",
            "opencandy",
            "conduit",
            "swrort",
            "crack",
            "installpack",
            "xtrat",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "unruy",
            "filetour",
            "floxif",
            "cleaner",
            "patcher",
            "adload",
            "presenoker",
            "wacatac",
            "fusioncore",
            "genkryptik",
            "webtoolbar",
            "maltiverse",
            "smokeloader",
            "download json",
            "urls",
            "blacklist http",
            "kyriazhs1975",
            "vidar",
            "strike",
            "china cobalt",
            "meterpreter",
            "nanocore rat",
            "njrat",
            "redline stealer",
            "stealer",
            "nymaim",
            "mirai",
            "ghost rat",
            "runescape",
            "bradesco",
            "msil",
            "bladabindi",
            "orkut",
            "cutwail",
            "bandoo",
            "matsnu",
            "inmortal",
            "domains",
            "redline",
            "control server",
            "services",
            "generic",
            "br",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "squirrelwaffle",
            "soc http",
            "soc https",
            "back",
            "download csv",
            "json sample",
            "injector",
            "malicious url",
            "downldr",
            "covid19 scam",
            "historical ssl",
            "referrer",
            "contacted",
            "whois whois",
            "contacted urls",
            "whois sslcert",
            "threat roundup",
            "copy",
            "august",
            "execution",
            "ransomware",
            "gopher",
            "remcos",
            "attack",
            "radar ineractive",
            "paypal",
            "covid19",
            "phishing chase",
            "phishing google",
            "tracker malware",
            "chase personal",
            "banking",
            "javascript",
            "please",
            "cnc server",
            "tracker",
            "cnc feodo",
            "phishtank",
            "threats et",
            "name verdict",
            "falcon sandbox",
            "pattern match",
            "file",
            "ascii text",
            "indicator",
            "windows nt",
            "jpeg image",
            "appdata",
            "jfif standard",
            "script",
            "show",
            "date",
            "span",
            "unknown",
            "general",
            "hybrid",
            "local",
            "click",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "path",
            "http header",
            "tcp traffic",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "accept",
            "adware",
            "ip address",
            "hsbc",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "adaptivebee",
            "iobit",
            "trojanx",
            "webshell",
            "systweak",
            "behav",
            "tiggre",
            "runtime process",
            "sha256",
            "sha1",
            "mark brian sabey",
            "brian sabey",
            "sabey",
            "apple",
            "114.114.114.114",
            "attorney",
            "law",
            "spammer",
            "fraud service",
            "hallrender",
            "malvertizing",
            "cybercrime",
            "social engineering",
            "malware hosting",
            "cyber threat",
            "iphone unlocker",
            "malicious",
            "attacker",
            "tulach",
            "tulach.cc",
            "adult content",
            "child pornographer",
            "sabey data centers",
            "hall render denver",
            "monitoring",
            "stalker",
            "dev",
            "developer",
            "cyber harassment",
            "defacement",
            "death threats",
            "miner",
            "agenttesla",
            "trojan",
            "detplock",
            "networm",
            "rms",
            "sneaky server",
            "replacement",
            "unauthorized",
            "steam route",
            "tool",
            "probe",
            "safebae.org",
            "safebae",
            "daisy",
            "daisy coleman",
            "benjamin",
            "colorado",
            "missouri",
            "telefonica",
            "boost mobile",
            "blackievirus.com",
            "TrojanX",
            "metro t-mobile",
            "t-mobile",
            "mile high media",
            "CNC",
            "C2",
            "malware host",
            "yixun"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/a1b9247b6ad18f1cda0304e406333459d4000fced5753f91e5c046f6577c388a",
            "https://www.hallrender.com/attorney/brian-sabey",
            "safebae.org",
            "poemhunter.com",
            "http://www.hallrender.com/resources/blog/",
            "http://benjamin.xww.de/",
            "http://alohatube.xyz/search/tsara-brashears",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "Hybrid Analysis",
            "wTools",
            "Research"
          ],
          "public": 1,
          "adversary": "Tulach | Mark Brian Sabey | Hall Render Law Firm",
          "targeted_countries": [
            "United States of America",
            "Japan"
          ],
          "malware_families": [
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "BR",
              "display_name": "BR",
              "target": null
            },
            {
              "id": "Radar Ineractive",
              "display_name": "Radar Ineractive",
              "target": null
            },
            {
              "id": "HSBC",
              "display_name": "HSBC",
              "target": null
            },
            {
              "id": "RMS",
              "display_name": "RMS",
              "target": null
            },
            {
              "id": "Feodo Tracker",
              "display_name": "Feodo Tracker",
              "target": null
            },
            {
              "id": "Wacatac",
              "display_name": "Wacatac",
              "target": null
            },
            {
              "id": "Zpevdo",
              "display_name": "Zpevdo",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "OpenCandy",
              "display_name": "OpenCandy",
              "target": null
            },
            {
              "id": "xRAT",
              "display_name": "xRAT",
              "target": null
            },
            {
              "id": "Vidar",
              "display_name": "Vidar",
              "target": null
            },
            {
              "id": "Agent Tesla",
              "display_name": "Agent Tesla",
              "target": null
            },
            {
              "id": "noname057",
              "display_name": "noname057",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "DarkSide .Beware",
              "display_name": "DarkSide .Beware",
              "target": null
            },
            {
              "id": "Nymaim",
              "display_name": "Nymaim",
              "target": null
            },
            {
              "id": "SLFPER:BrowserModifier:Win32/MediaMagnet",
              "display_name": "SLFPER:BrowserModifier:Win32/MediaMagnet",
              "target": null
            },
            {
              "id": "Virut",
              "display_name": "Virut",
              "target": null
            },
            {
              "id": "Cutwail",
              "display_name": "Cutwail",
              "target": null
            },
            {
              "id": "Nanocore RAT",
              "display_name": "Nanocore RAT",
              "target": null
            },
            {
              "id": "Tulach Malware",
              "display_name": "Tulach Malware",
              "target": null
            },
            {
              "id": "SuppoBox",
              "display_name": "SuppoBox",
              "target": null
            },
            {
              "id": "Systweak",
              "display_name": "Systweak",
              "target": null
            },
            {
              "id": "Occamy",
              "display_name": "Occamy",
              "target": null
            },
            {
              "id": "Tiggre",
              "display_name": "Tiggre",
              "target": null
            },
            {
              "id": "IObit",
              "display_name": "IObit",
              "target": null
            },
            {
              "id": "Sality",
              "display_name": "Sality",
              "target": null
            },
            {
              "id": "FORMBOOK",
              "display_name": "FORMBOOK",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Yixun",
              "display_name": "Yixun",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1043",
              "name": "Commonly Used Port",
              "display_name": "T1043 - Commonly Used Port"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1179",
              "name": "Hooking",
              "display_name": "T1179 - Hooking"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            }
          ],
          "industries": [
            "Health"
          ],
          "TLP": "green",
          "cloned_from": "6544c99af21a2fde7bd6927e",
          "export_count": 33,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Machidian45",
            "id": "262704",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1643,
            "hostname": 1438,
            "CVE": 30,
            "FileHash-MD5": 2853,
            "FileHash-SHA1": 1584,
            "FileHash-SHA256": 3001,
            "URL": 2904,
            "email": 1
          },
          "indicator_count": 13454,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 32,
          "modified_text": "848 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6587414f2e029e25c7152cbf",
          "name": "busted hijacking",
          "description": "",
          "modified": "2023-12-23T20:21:35.725000",
          "created": "2023-12-23T20:21:35.725000",
          "tags": [
            "cisco umbrella",
            "site",
            "alexa top",
            "emotet",
            "telefonica co",
            "million",
            "malware",
            "detection list",
            "blacklist",
            "alexa",
            "installcore",
            "heur",
            "cyber threat",
            "united",
            "phishing",
            "engineering",
            "phishing site",
            "team phishing",
            "spammer",
            "malicious site",
            "team",
            "download",
            "cobalt strike",
            "facebook",
            "artemis",
            "pony",
            "binder",
            "suppobox",
            "virut",
            "ramnit",
            "dropper",
            "formbook",
            "azorult",
            "simda",
            "downloader",
            "service",
            "bank",
            "zbot",
            "trojanspy",
            "heodo",
            "hostname",
            "hostnames",
            "whois record",
            "kgs0",
            "kls0",
            "apple ios",
            "tsara brashears",
            "ssl certificate",
            "elf collection",
            "cyberstalking",
            "spyware",
            "hackers",
            "installer",
            "open",
            "banker",
            "keylogger",
            "malicious",
            "hacktool",
            "core",
            "noname057",
            "generic malware",
            "safe site",
            "malware site",
            "iframe",
            "riskware",
            "exploit",
            "fakealert",
            "unsafe",
            "acint",
            "win64",
            "nircmd",
            "agent",
            "opencandy",
            "conduit",
            "swrort",
            "crack",
            "installpack",
            "xtrat",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "unruy",
            "filetour",
            "floxif",
            "cleaner",
            "patcher",
            "adload",
            "presenoker",
            "wacatac",
            "fusioncore",
            "genkryptik",
            "webtoolbar",
            "maltiverse",
            "smokeloader",
            "download json",
            "urls",
            "blacklist http",
            "kyriazhs1975",
            "vidar",
            "strike",
            "china cobalt",
            "meterpreter",
            "nanocore rat",
            "njrat",
            "redline stealer",
            "stealer",
            "nymaim",
            "mirai",
            "ghost rat",
            "runescape",
            "bradesco",
            "msil",
            "bladabindi",
            "orkut",
            "cutwail",
            "bandoo",
            "matsnu",
            "inmortal",
            "domains",
            "redline",
            "control server",
            "services",
            "generic",
            "br",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "squirrelwaffle",
            "soc http",
            "soc https",
            "back",
            "download csv",
            "json sample",
            "injector",
            "malicious url",
            "downldr",
            "covid19 scam",
            "historical ssl",
            "referrer",
            "contacted",
            "whois whois",
            "contacted urls",
            "whois sslcert",
            "threat roundup",
            "copy",
            "august",
            "execution",
            "ransomware",
            "gopher",
            "remcos",
            "attack",
            "radar ineractive",
            "paypal",
            "covid19",
            "phishing chase",
            "phishing google",
            "tracker malware",
            "chase personal",
            "banking",
            "javascript",
            "please",
            "cnc server",
            "tracker",
            "cnc feodo",
            "phishtank",
            "threats et",
            "name verdict",
            "falcon sandbox",
            "pattern match",
            "file",
            "ascii text",
            "indicator",
            "windows nt",
            "jpeg image",
            "appdata",
            "jfif standard",
            "script",
            "show",
            "date",
            "span",
            "unknown",
            "general",
            "hybrid",
            "local",
            "click",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "path",
            "http header",
            "tcp traffic",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "accept",
            "adware",
            "ip address",
            "hsbc",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "adaptivebee",
            "iobit",
            "trojanx",
            "webshell",
            "systweak",
            "behav",
            "tiggre",
            "runtime process",
            "sha256",
            "sha1",
            "mark brian sabey",
            "brian sabey",
            "sabey",
            "apple",
            "114.114.114.114",
            "attorney",
            "law",
            "spammer",
            "fraud service",
            "hallrender",
            "malvertizing",
            "cybercrime",
            "social engineering",
            "malware hosting",
            "cyber threat",
            "iphone unlocker",
            "malicious",
            "attacker",
            "tulach",
            "tulach.cc",
            "adult content",
            "child pornographer",
            "sabey data centers",
            "hall render denver",
            "monitoring",
            "stalker",
            "dev",
            "developer",
            "cyber harassment",
            "defacement",
            "death threats",
            "miner",
            "agenttesla",
            "trojan",
            "detplock",
            "networm",
            "rms",
            "sneaky server",
            "replacement",
            "unauthorized",
            "steam route",
            "tool",
            "probe",
            "safebae.org",
            "safebae",
            "daisy",
            "daisy coleman",
            "benjamin",
            "colorado",
            "missouri",
            "telefonica",
            "boost mobile",
            "blackievirus.com",
            "TrojanX",
            "metro t-mobile",
            "t-mobile",
            "mile high media",
            "CNC",
            "C2",
            "malware host",
            "yixun"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/a1b9247b6ad18f1cda0304e406333459d4000fced5753f91e5c046f6577c388a",
            "https://www.hallrender.com/attorney/brian-sabey",
            "safebae.org",
            "poemhunter.com",
            "http://www.hallrender.com/resources/blog/",
            "http://benjamin.xww.de/",
            "http://alohatube.xyz/search/tsara-brashears",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "Hybrid Analysis",
            "wTools",
            "Research"
          ],
          "public": 1,
          "adversary": "Tulach | Mark Brian Sabey | Hall Render Law Firm",
          "targeted_countries": [
            "United States of America",
            "Japan"
          ],
          "malware_families": [
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "BR",
              "display_name": "BR",
              "target": null
            },
            {
              "id": "Radar Ineractive",
              "display_name": "Radar Ineractive",
              "target": null
            },
            {
              "id": "HSBC",
              "display_name": "HSBC",
              "target": null
            },
            {
              "id": "RMS",
              "display_name": "RMS",
              "target": null
            },
            {
              "id": "Feodo Tracker",
              "display_name": "Feodo Tracker",
              "target": null
            },
            {
              "id": "Wacatac",
              "display_name": "Wacatac",
              "target": null
            },
            {
              "id": "Zpevdo",
              "display_name": "Zpevdo",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "OpenCandy",
              "display_name": "OpenCandy",
              "target": null
            },
            {
              "id": "xRAT",
              "display_name": "xRAT",
              "target": null
            },
            {
              "id": "Vidar",
              "display_name": "Vidar",
              "target": null
            },
            {
              "id": "Agent Tesla",
              "display_name": "Agent Tesla",
              "target": null
            },
            {
              "id": "noname057",
              "display_name": "noname057",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "DarkSide .Beware",
              "display_name": "DarkSide .Beware",
              "target": null
            },
            {
              "id": "Nymaim",
              "display_name": "Nymaim",
              "target": null
            },
            {
              "id": "SLFPER:BrowserModifier:Win32/MediaMagnet",
              "display_name": "SLFPER:BrowserModifier:Win32/MediaMagnet",
              "target": null
            },
            {
              "id": "Virut",
              "display_name": "Virut",
              "target": null
            },
            {
              "id": "Cutwail",
              "display_name": "Cutwail",
              "target": null
            },
            {
              "id": "Nanocore RAT",
              "display_name": "Nanocore RAT",
              "target": null
            },
            {
              "id": "Tulach Malware",
              "display_name": "Tulach Malware",
              "target": null
            },
            {
              "id": "SuppoBox",
              "display_name": "SuppoBox",
              "target": null
            },
            {
              "id": "Systweak",
              "display_name": "Systweak",
              "target": null
            },
            {
              "id": "Occamy",
              "display_name": "Occamy",
              "target": null
            },
            {
              "id": "Tiggre",
              "display_name": "Tiggre",
              "target": null
            },
            {
              "id": "IObit",
              "display_name": "IObit",
              "target": null
            },
            {
              "id": "Sality",
              "display_name": "Sality",
              "target": null
            },
            {
              "id": "FORMBOOK",
              "display_name": "FORMBOOK",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Yixun",
              "display_name": "Yixun",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1043",
              "name": "Commonly Used Port",
              "display_name": "T1043 - Commonly Used Port"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1179",
              "name": "Hooking",
              "display_name": "T1179 - Hooking"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            }
          ],
          "industries": [
            "Health"
          ],
          "TLP": "green",
          "cloned_from": "6544c99af21a2fde7bd6927e",
          "export_count": 34,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Machidian45",
            "id": "262704",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1643,
            "hostname": 1438,
            "CVE": 30,
            "FileHash-MD5": 2853,
            "FileHash-SHA1": 1584,
            "FileHash-SHA256": 3001,
            "URL": 2904,
            "email": 1
          },
          "indicator_count": 13454,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 34,
          "modified_text": "848 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "655dafbe9ac9ac786fde45ad",
          "name": "http://malwaredomainlist.com/ \u2022 CNC \u2022 Spyware \u2022 Tracking",
          "description": "Network capture, dga domain, ecc domain, data collection, voicemail access, mail spammer, registrar abuse\n\n[Auto populated. I can't cannot confirm or deny the accuracy of the following information: A summary of key facts and information about a malicious web domain, hosted by the US government, has been released by Google.com and its parent company, Alphabet, for use on its website.]",
          "modified": "2023-12-22T06:03:01.993000",
          "created": "2023-11-22T07:37:34.595000",
          "tags": [
            "united",
            "as22612",
            "as2637",
            "creation date",
            "search",
            "moved",
            "expiration date",
            "date",
            "showing",
            "as397240",
            "next",
            "entries",
            "scan endpoints",
            "all octoseek",
            "dns replication",
            "win32 exe",
            "network capture",
            "android",
            "android adaway",
            "html",
            "files",
            "detections type",
            "name",
            "office open",
            "xml document",
            "namecheap",
            "namecheap inc",
            "whois lookups",
            "win32 dll",
            "text",
            "wextract",
            "text htaccess",
            "powershell",
            "detection list",
            "blacklist",
            "first",
            "ssl certificate",
            "whois record",
            "contacted",
            "december",
            "whois whois",
            "threat roundup",
            "historical ssl",
            "problems",
            "referrer",
            "pe resource",
            "startpage",
            "cyber threat",
            "redline stealer",
            "mail spammer",
            "hostname",
            "phishing site",
            "malicious site",
            "installcore",
            "http spammer",
            "malware site",
            "malware",
            "generic malware",
            "heur",
            "generic",
            "alexa top",
            "million",
            "site",
            "cisco umbrella",
            "alexa",
            "ip address",
            "algorithm",
            "data",
            "v3 serial",
            "number",
            "cat cnzerossl",
            "ecc domain",
            "secure site",
            "ca ozerossl",
            "validity",
            "subject public",
            "server",
            "email",
            "code",
            "registrar abuse",
            "country",
            "privacy service",
            "withheld",
            "privacy",
            "domain name",
            "pattern match",
            "ascii text",
            "appdata",
            "file",
            "windows nt",
            "svg scalable",
            "vector graphics",
            "indicator",
            "gif image",
            "accept",
            "hybrid",
            "general",
            "local",
            "pixel",
            "click",
            "twitter",
            "strings",
            "class",
            "generator",
            "critical",
            "command_and_control",
            "spyware",
            "tracking",
            "voicemail access",
            "dga",
            "apple"
          ],
          "references": [
            "https://www.hybrid-analysis.com/sample/c0c84df54b890bb408fc2289f1e75a29991127bbe207aa30042616b5ea150342/655d9af5679c7afcc409895e",
            "\u2193Interesting\u2193",
            "IPv4 198.54.117.211 command_and_control",
            "IPv4 198.54.117.210 command_and_control",
            "IPv4 198.54.117.212 command_and_control",
            "IPv4 198.54.117.215 command_and_control",
            "IPv4 198.54.117.217 command_and_control",
            "IPv4 198.54.117.218 command_and_control",
            "apple-securityiphone-icloud.com",
            "tx-p2p-pull.video-voip.com.dorm.com",
            "http://updates.voicemailaccess.net/b0f6a00b15311023",
            "tvapp-server.de",
            "zeustracker.abuse.ch",
            "ransomwaretracker.abuse.ch",
            "http://t.trkitok.com/track/rep?oid=2001&st=1&id=DP2441--w1VJE427J8SGGRTP02MD7UEG___93737493-c08b-4dc7-ad30-b17a2c09e771___$mid",
            "louisianarooflawyers.com         [phishing]",
            "hasownproperty.call"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Generic",
              "display_name": "Generic",
              "target": null
            },
            {
              "id": "BlackNET",
              "display_name": "BlackNET",
              "target": null
            },
            {
              "id": "InstallCore",
              "display_name": "InstallCore",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 51,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 105,
            "FileHash-SHA1": 100,
            "FileHash-SHA256": 3072,
            "domain": 1188,
            "email": 5,
            "URL": 7940,
            "hostname": 1925,
            "CVE": 1
          },
          "indicator_count": 14336,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 228,
          "modified_text": "849 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6544c7a11d7541bdb3bfe5ff",
          "name": "Radar Ineractive. Law Firm responsible for cyber crime.",
          "description": "Is this legal.  Attorney from Hall Render law firm cyber stalking  and malvertizing targets in adult content, dungeons, death scenarios, suicide threats? Pulse auto populates targets: Tsara Brashears 'alleged'  SA victim. This may not be the forum for my , death threats should always be investigated as should allegations of assault. Malware, BotNet, car and phone tracking, monitoring, injection,   .gov is found throughout. Monitoring of Safebae.org; online movement began by now deceased 'alleged' SA victim, Daisy Coleman of Audrey & Daisy.  High Risk surviving target. Crazy cover up? Each target seems to have a state government power 'implicated' in attack. \n\nEd Said",
          "modified": "2023-12-16T19:40:11.047000",
          "created": "2023-11-03T10:12:49.539000",
          "tags": [
            "cisco umbrella",
            "site",
            "alexa top",
            "emotet",
            "telefonica co",
            "million",
            "malware",
            "detection list",
            "blacklist",
            "alexa",
            "installcore",
            "heur",
            "cyber threat",
            "united",
            "phishing",
            "engineering",
            "phishing site",
            "team phishing",
            "spammer",
            "malicious site",
            "team",
            "download",
            "cobalt strike",
            "facebook",
            "artemis",
            "pony",
            "binder",
            "suppobox",
            "virut",
            "ramnit",
            "dropper",
            "formbook",
            "azorult",
            "simda",
            "downloader",
            "service",
            "bank",
            "zbot",
            "trojanspy",
            "heodo",
            "hostname",
            "hostnames",
            "whois record",
            "kgs0",
            "kls0",
            "apple ios",
            "tsara brashears",
            "ssl certificate",
            "elf collection",
            "cyberstalking",
            "spyware",
            "hackers",
            "installer",
            "open",
            "banker",
            "keylogger",
            "malicious",
            "hacktool",
            "core",
            "noname057",
            "generic malware",
            "safe site",
            "malware site",
            "iframe",
            "riskware",
            "exploit",
            "fakealert",
            "unsafe",
            "acint",
            "win64",
            "nircmd",
            "agent",
            "opencandy",
            "conduit",
            "swrort",
            "crack",
            "installpack",
            "xtrat",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "unruy",
            "filetour",
            "floxif",
            "cleaner",
            "patcher",
            "adload",
            "presenoker",
            "wacatac",
            "fusioncore",
            "genkryptik",
            "webtoolbar",
            "maltiverse",
            "smokeloader",
            "download json",
            "urls",
            "blacklist http",
            "kyriazhs1975",
            "vidar",
            "strike",
            "china cobalt",
            "meterpreter",
            "nanocore rat",
            "njrat",
            "redline stealer",
            "stealer",
            "nymaim",
            "mirai",
            "ghost rat",
            "runescape",
            "bradesco",
            "msil",
            "bladabindi",
            "orkut",
            "cutwail",
            "bandoo",
            "matsnu",
            "inmortal",
            "domains",
            "redline",
            "control server",
            "services",
            "generic",
            "br",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "squirrelwaffle",
            "soc http",
            "soc https",
            "back",
            "download csv",
            "json sample",
            "injector",
            "malicious url",
            "downldr",
            "covid19 scam",
            "historical ssl",
            "referrer",
            "contacted",
            "whois whois",
            "contacted urls",
            "whois sslcert",
            "threat roundup",
            "copy",
            "august",
            "execution",
            "ransomware",
            "gopher",
            "remcos",
            "attack",
            "radar ineractive",
            "paypal",
            "covid19",
            "phishing chase",
            "phishing google",
            "tracker malware",
            "chase personal",
            "banking",
            "javascript",
            "please",
            "cnc server",
            "tracker",
            "cnc feodo",
            "phishtank",
            "threats et",
            "name verdict",
            "falcon sandbox",
            "pattern match",
            "file",
            "ascii text",
            "indicator",
            "windows nt",
            "jpeg image",
            "appdata",
            "jfif standard",
            "script",
            "show",
            "date",
            "span",
            "unknown",
            "general",
            "hybrid",
            "local",
            "click",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "path",
            "http header",
            "tcp traffic",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "accept",
            "adware",
            "ip address",
            "hsbc",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "adaptivebee",
            "iobit",
            "trojanx",
            "webshell",
            "systweak",
            "behav",
            "tiggre",
            "runtime process",
            "sha256",
            "sha1",
            "mark brian sabey",
            "brian sabey",
            "sabey",
            "apple",
            "114.114.114.114",
            "attorney",
            "law",
            "spammer",
            "fraud service",
            "hallrender",
            "malvertizing",
            "cybercrime",
            "social engineering",
            "malware hosting",
            "cyber threat",
            "iphone unlocker",
            "malicious",
            "attacker",
            "tulach",
            "tulach.cc",
            "adult content",
            "child pornographer",
            "sabey data centers",
            "hall render denver",
            "monitoring",
            "stalker",
            "dev",
            "developer",
            "cyber harassment",
            "defacement",
            "death threats",
            "miner",
            "agenttesla",
            "trojan",
            "detplock",
            "networm",
            "rms",
            "sneaky server",
            "replacement",
            "unauthorized",
            "steam route",
            "tool",
            "probe",
            "safebae.org",
            "safebae",
            "daisy",
            "daisy coleman",
            "benjamin",
            "colorado",
            "missouri",
            "telefonica",
            "boost mobile",
            "blackievirus.com",
            "TrojanX",
            "metro t-mobile",
            "t-mobile",
            "mile high media",
            "CNC",
            "C2",
            "malware host",
            "yixun"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/a1b9247b6ad18f1cda0304e406333459d4000fced5753f91e5c046f6577c388a",
            "https://www.hallrender.com/attorney/brian-sabey",
            "safebae.org",
            "poemhunter.com",
            "http://www.hallrender.com/resources/blog/",
            "http://benjamin.xww.de/",
            "http://alohatube.xyz/search/tsara-brashears",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "Hybrid Analysis",
            "wTools",
            "Research"
          ],
          "public": 1,
          "adversary": "Tulach | Mark Brian Sabey | Hall Render Law Firm",
          "targeted_countries": [
            "United States of America",
            "Japan"
          ],
          "malware_families": [
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "BR",
              "display_name": "BR",
              "target": null
            },
            {
              "id": "Radar Ineractive",
              "display_name": "Radar Ineractive",
              "target": null
            },
            {
              "id": "HSBC",
              "display_name": "HSBC",
              "target": null
            },
            {
              "id": "RMS",
              "display_name": "RMS",
              "target": null
            },
            {
              "id": "Feodo Tracker",
              "display_name": "Feodo Tracker",
              "target": null
            },
            {
              "id": "Wacatac",
              "display_name": "Wacatac",
              "target": null
            },
            {
              "id": "Zpevdo",
              "display_name": "Zpevdo",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "OpenCandy",
              "display_name": "OpenCandy",
              "target": null
            },
            {
              "id": "xRAT",
              "display_name": "xRAT",
              "target": null
            },
            {
              "id": "Vidar",
              "display_name": "Vidar",
              "target": null
            },
            {
              "id": "Agent Tesla",
              "display_name": "Agent Tesla",
              "target": null
            },
            {
              "id": "noname057",
              "display_name": "noname057",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "DarkSide .Beware",
              "display_name": "DarkSide .Beware",
              "target": null
            },
            {
              "id": "Nymaim",
              "display_name": "Nymaim",
              "target": null
            },
            {
              "id": "SLFPER:BrowserModifier:Win32/MediaMagnet",
              "display_name": "SLFPER:BrowserModifier:Win32/MediaMagnet",
              "target": null
            },
            {
              "id": "Virut",
              "display_name": "Virut",
              "target": null
            },
            {
              "id": "Cutwail",
              "display_name": "Cutwail",
              "target": null
            },
            {
              "id": "Nanocore RAT",
              "display_name": "Nanocore RAT",
              "target": null
            },
            {
              "id": "Tulach Malware",
              "display_name": "Tulach Malware",
              "target": null
            },
            {
              "id": "SuppoBox",
              "display_name": "SuppoBox",
              "target": null
            },
            {
              "id": "Systweak",
              "display_name": "Systweak",
              "target": null
            },
            {
              "id": "Occamy",
              "display_name": "Occamy",
              "target": null
            },
            {
              "id": "Tiggre",
              "display_name": "Tiggre",
              "target": null
            },
            {
              "id": "IObit",
              "display_name": "IObit",
              "target": null
            },
            {
              "id": "Sality",
              "display_name": "Sality",
              "target": null
            },
            {
              "id": "FORMBOOK",
              "display_name": "FORMBOOK",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Yixun",
              "display_name": "Yixun",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1043",
              "name": "Commonly Used Port",
              "display_name": "T1043 - Commonly Used Port"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1179",
              "name": "Hooking",
              "display_name": "T1179 - Hooking"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            }
          ],
          "industries": [
            "Health"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 82,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1644,
            "hostname": 1438,
            "CVE": 30,
            "FileHash-MD5": 2853,
            "FileHash-SHA1": 1584,
            "FileHash-SHA256": 3001,
            "URL": 2904,
            "email": 1
          },
          "indicator_count": 13455,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "855 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "655650c9b2be6cc930c92cf3",
          "name": "https://myaccount.uscis.gov/",
          "description": "HOW!?!? My device was remotely logged into this account somehow.\nThis is egregious. Silence  Threats. I have no connection to this but was contacted by a while ago. I don't know how or why a part of the government would attack a person with a TBI and C1 - S1 Spinal cord injury allegedly caused by Colorado physical therapist and protect him. Why  is victim, tracked and unsafe, receiving death threats, monitored, denied medical care, stalked EVERYWHERE.   \nEven felons aren't monitored for life. STOP.\nWill this get us killed. Do the right thing.\nGod bless America, purge the government.\nThe truth should set you fee not get you harmed.",
          "modified": "2023-12-16T15:00:49.451000",
          "created": "2023-11-16T17:26:33",
          "tags": [
            "whois record",
            "ssl certificate",
            "whois whois",
            "communicating",
            "referrer",
            "ip address",
            "contacted",
            "pe resource",
            "historical ssl",
            "collections wow",
            "cobalt",
            "stealer",
            "quasar",
            "remcos",
            "ursnif",
            "fabookie",
            "name verdict",
            "exit",
            "node tcp",
            "traffic",
            "united",
            "et tor",
            "known tor",
            "relayrouter",
            "anonymizer",
            "tor known",
            "tor relayrouter",
            "cisco umbrella",
            "site",
            "safe site",
            "heur",
            "maltiverse",
            "million",
            "alexa top",
            "unsafe",
            "html",
            "team",
            "riskware",
            "malware",
            "phishing",
            "union",
            "bank",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "artemis",
            "installcore",
            "webshell",
            "exploit",
            "crack",
            "webtoolbar",
            "detection list",
            "blacklist http",
            "september",
            "threat roundup",
            "execution",
            "metro",
            "formbook",
            "kgs0",
            "kls0",
            "blacklist https",
            "malicious site",
            "malware site",
            "phishing site",
            "download",
            "malicious",
            "azorult",
            "service",
            "runescape",
            "facebook",
            "genkryptik",
            "fuery",
            "wacatac",
            "alexa",
            "dbatloader",
            "nanocore rat",
            "agent tesla",
            "binder",
            "dridex",
            "hawkeye",
            "small",
            "netwire",
            "trojan",
            "redline stealer",
            "lumma stealer",
            "trojanspy",
            "redline",
            "lumma",
            "tsara brashears",
            "whois",
            "asn owner",
            "highly targeted",
            "relacionada",
            "lolkek",
            "emotet",
            "dark power",
            "wiper",
            "ransomware",
            "cobalt strike",
            "quasar rat",
            "core",
            "bitrat",
            "hacktool",
            "critical",
            "copy",
            "installer",
            "meta",
            "as15169 google",
            "aaaa",
            "a domains",
            "videosdewebcams",
            "search",
            "passive dns",
            "urls",
            "record value",
            "date",
            "certificate",
            "scan endpoints",
            "all octoseek",
            "pulse pulses",
            "files"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Germany"
          ],
          "malware_families": [
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "Lumma",
              "display_name": "Lumma",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1090",
              "name": "Proxy",
              "display_name": "T1090 - Proxy"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 102,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 204,
            "FileHash-SHA1": 182,
            "FileHash-SHA256": 6268,
            "URL": 13989,
            "domain": 3229,
            "hostname": 4412,
            "CVE": 19,
            "email": 3
          },
          "indicator_count": 28306,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "855 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "655652f6ddcbf952a599cded",
          "name": "https://myaccount.uscis.gov/",
          "description": "After Mark Montano Md reported alleged acts by Jeffrey Scott Reimer after receiving 'multiple' reports of him aggressively pursuing Brashears, she was contacted, told she violated the Patriot Act by Big O Tires?!! Received letters from the above and harassed for years. Colorado Workers compensation is so corrupt this may be my last post. She was immediately framed , blamed, porn smeared and stalked. Denied medical care , when received died on surgery table, revised and disabled. Even the mafia would  tackle only the associates bringing undue negative attention to their  own organization.",
          "modified": "2023-12-16T15:00:49.451000",
          "created": "2023-11-16T17:35:50.285000",
          "tags": [
            "whois record",
            "ssl certificate",
            "whois whois",
            "communicating",
            "referrer",
            "ip address",
            "contacted",
            "pe resource",
            "historical ssl",
            "collections wow",
            "cobalt",
            "stealer",
            "quasar",
            "remcos",
            "ursnif",
            "fabookie",
            "name verdict",
            "exit",
            "node tcp",
            "traffic",
            "united",
            "et tor",
            "known tor",
            "relayrouter",
            "anonymizer",
            "tor known",
            "tor relayrouter",
            "cisco umbrella",
            "site",
            "safe site",
            "heur",
            "maltiverse",
            "million",
            "alexa top",
            "unsafe",
            "html",
            "team",
            "riskware",
            "malware",
            "phishing",
            "union",
            "bank",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "artemis",
            "installcore",
            "webshell",
            "exploit",
            "crack",
            "webtoolbar",
            "detection list",
            "blacklist http",
            "september",
            "threat roundup",
            "execution",
            "metro",
            "formbook",
            "kgs0",
            "kls0",
            "blacklist https",
            "malicious site",
            "malware site",
            "phishing site",
            "download",
            "malicious",
            "azorult",
            "service",
            "runescape",
            "facebook",
            "genkryptik",
            "fuery",
            "wacatac",
            "alexa",
            "dbatloader",
            "nanocore rat",
            "agent tesla",
            "binder",
            "dridex",
            "hawkeye",
            "small",
            "netwire",
            "trojan",
            "redline stealer",
            "lumma stealer",
            "trojanspy",
            "redline",
            "lumma",
            "tsara brashears",
            "whois",
            "asn owner",
            "highly targeted",
            "relacionada",
            "lolkek",
            "emotet",
            "dark power",
            "wiper",
            "ransomware",
            "cobalt strike",
            "quasar rat",
            "core",
            "bitrat",
            "hacktool",
            "critical",
            "copy",
            "installer",
            "meta",
            "as15169 google",
            "aaaa",
            "a domains",
            "videosdewebcams",
            "search",
            "passive dns",
            "urls",
            "record value",
            "date",
            "certificate",
            "scan endpoints",
            "all octoseek",
            "pulse pulses",
            "files"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Germany"
          ],
          "malware_families": [
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "Lumma",
              "display_name": "Lumma",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1090",
              "name": "Proxy",
              "display_name": "T1090 - Proxy"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 100,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 204,
            "FileHash-SHA1": 182,
            "FileHash-SHA256": 6268,
            "URL": 13989,
            "domain": 3229,
            "hostname": 4412,
            "CVE": 19,
            "email": 3
          },
          "indicator_count": 28306,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "855 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65565477da453c46f05a6ac4",
          "name": "BTW VirusTotal - \" interesting files written to disk during execution'",
          "description": "",
          "modified": "2023-12-16T15:00:49.451000",
          "created": "2023-11-16T17:42:15.123000",
          "tags": [
            "whois record",
            "ssl certificate",
            "whois whois",
            "communicating",
            "referrer",
            "ip address",
            "contacted",
            "pe resource",
            "historical ssl",
            "collections wow",
            "cobalt",
            "stealer",
            "quasar",
            "remcos",
            "ursnif",
            "fabookie",
            "name verdict",
            "exit",
            "node tcp",
            "traffic",
            "united",
            "et tor",
            "known tor",
            "relayrouter",
            "anonymizer",
            "tor known",
            "tor relayrouter",
            "cisco umbrella",
            "site",
            "safe site",
            "heur",
            "maltiverse",
            "million",
            "alexa top",
            "unsafe",
            "html",
            "team",
            "riskware",
            "malware",
            "phishing",
            "union",
            "bank",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "artemis",
            "installcore",
            "webshell",
            "exploit",
            "crack",
            "webtoolbar",
            "detection list",
            "blacklist http",
            "september",
            "threat roundup",
            "execution",
            "metro",
            "formbook",
            "kgs0",
            "kls0",
            "blacklist https",
            "malicious site",
            "malware site",
            "phishing site",
            "download",
            "malicious",
            "azorult",
            "service",
            "runescape",
            "facebook",
            "genkryptik",
            "fuery",
            "wacatac",
            "alexa",
            "dbatloader",
            "nanocore rat",
            "agent tesla",
            "binder",
            "dridex",
            "hawkeye",
            "small",
            "netwire",
            "trojan",
            "redline stealer",
            "lumma stealer",
            "trojanspy",
            "redline",
            "lumma",
            "tsara brashears",
            "whois",
            "asn owner",
            "highly targeted",
            "relacionada",
            "lolkek",
            "emotet",
            "dark power",
            "wiper",
            "ransomware",
            "cobalt strike",
            "quasar rat",
            "core",
            "bitrat",
            "hacktool",
            "critical",
            "copy",
            "installer",
            "meta",
            "as15169 google",
            "aaaa",
            "a domains",
            "videosdewebcams",
            "search",
            "passive dns",
            "urls",
            "record value",
            "date",
            "certificate",
            "scan endpoints",
            "all octoseek",
            "pulse pulses",
            "files"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Germany"
          ],
          "malware_families": [
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "Lumma",
              "display_name": "Lumma",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1090",
              "name": "Proxy",
              "display_name": "T1090 - Proxy"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "655650c9b2be6cc930c92cf3",
          "export_count": 101,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 204,
            "FileHash-SHA1": 182,
            "FileHash-SHA256": 6268,
            "URL": 13989,
            "domain": 3229,
            "hostname": 4412,
            "CVE": 19,
            "email": 3
          },
          "indicator_count": 28306,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 223,
          "modified_text": "855 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "655657ca2e402d4f98283de9",
          "name": "https://myaccount.uscis.gov/ ",
          "description": "",
          "modified": "2023-12-16T15:00:49.451000",
          "created": "2023-11-16T17:56:26.312000",
          "tags": [
            "whois record",
            "ssl certificate",
            "whois whois",
            "communicating",
            "referrer",
            "ip address",
            "contacted",
            "pe resource",
            "historical ssl",
            "collections wow",
            "cobalt",
            "stealer",
            "quasar",
            "remcos",
            "ursnif",
            "fabookie",
            "name verdict",
            "exit",
            "node tcp",
            "traffic",
            "united",
            "et tor",
            "known tor",
            "relayrouter",
            "anonymizer",
            "tor known",
            "tor relayrouter",
            "cisco umbrella",
            "site",
            "safe site",
            "heur",
            "maltiverse",
            "million",
            "alexa top",
            "unsafe",
            "html",
            "team",
            "riskware",
            "malware",
            "phishing",
            "union",
            "bank",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "artemis",
            "installcore",
            "webshell",
            "exploit",
            "crack",
            "webtoolbar",
            "detection list",
            "blacklist http",
            "september",
            "threat roundup",
            "execution",
            "metro",
            "formbook",
            "kgs0",
            "kls0",
            "blacklist https",
            "malicious site",
            "malware site",
            "phishing site",
            "download",
            "malicious",
            "azorult",
            "service",
            "runescape",
            "facebook",
            "genkryptik",
            "fuery",
            "wacatac",
            "alexa",
            "dbatloader",
            "nanocore rat",
            "agent tesla",
            "binder",
            "dridex",
            "hawkeye",
            "small",
            "netwire",
            "trojan",
            "redline stealer",
            "lumma stealer",
            "trojanspy",
            "redline",
            "lumma",
            "tsara brashears",
            "whois",
            "asn owner",
            "highly targeted",
            "relacionada",
            "lolkek",
            "emotet",
            "dark power",
            "wiper",
            "ransomware",
            "cobalt strike",
            "quasar rat",
            "core",
            "bitrat",
            "hacktool",
            "critical",
            "copy",
            "installer",
            "meta",
            "as15169 google",
            "aaaa",
            "a domains",
            "videosdewebcams",
            "search",
            "passive dns",
            "urls",
            "record value",
            "date",
            "certificate",
            "scan endpoints",
            "all octoseek",
            "pulse pulses",
            "files"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Germany"
          ],
          "malware_families": [
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "Lumma",
              "display_name": "Lumma",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1090",
              "name": "Proxy",
              "display_name": "T1090 - Proxy"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "655650c9b2be6cc930c92cf3",
          "export_count": 100,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 204,
            "FileHash-SHA1": 182,
            "FileHash-SHA256": 6268,
            "URL": 13989,
            "domain": 3229,
            "hostname": 4412,
            "CVE": 19,
            "email": 3
          },
          "indicator_count": 28306,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "855 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "655686e2c072557f03e9cba2",
          "name": "https://myaccount.uscis.gov/                         [pulse created by Octoseek]",
          "description": "",
          "modified": "2023-12-16T15:00:49.451000",
          "created": "2023-11-16T21:17:22.087000",
          "tags": [
            "whois record",
            "ssl certificate",
            "whois whois",
            "communicating",
            "referrer",
            "ip address",
            "contacted",
            "pe resource",
            "historical ssl",
            "collections wow",
            "cobalt",
            "stealer",
            "quasar",
            "remcos",
            "ursnif",
            "fabookie",
            "name verdict",
            "exit",
            "node tcp",
            "traffic",
            "united",
            "et tor",
            "known tor",
            "relayrouter",
            "anonymizer",
            "tor known",
            "tor relayrouter",
            "cisco umbrella",
            "site",
            "safe site",
            "heur",
            "maltiverse",
            "million",
            "alexa top",
            "unsafe",
            "html",
            "team",
            "riskware",
            "malware",
            "phishing",
            "union",
            "bank",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "artemis",
            "installcore",
            "webshell",
            "exploit",
            "crack",
            "webtoolbar",
            "detection list",
            "blacklist http",
            "september",
            "threat roundup",
            "execution",
            "metro",
            "formbook",
            "kgs0",
            "kls0",
            "blacklist https",
            "malicious site",
            "malware site",
            "phishing site",
            "download",
            "malicious",
            "azorult",
            "service",
            "runescape",
            "facebook",
            "genkryptik",
            "fuery",
            "wacatac",
            "alexa",
            "dbatloader",
            "nanocore rat",
            "agent tesla",
            "binder",
            "dridex",
            "hawkeye",
            "small",
            "netwire",
            "trojan",
            "redline stealer",
            "lumma stealer",
            "trojanspy",
            "redline",
            "lumma",
            "tsara brashears",
            "whois",
            "asn owner",
            "highly targeted",
            "relacionada",
            "lolkek",
            "emotet",
            "dark power",
            "wiper",
            "ransomware",
            "cobalt strike",
            "quasar rat",
            "core",
            "bitrat",
            "hacktool",
            "critical",
            "copy",
            "installer",
            "meta",
            "as15169 google",
            "aaaa",
            "a domains",
            "videosdewebcams",
            "search",
            "passive dns",
            "urls",
            "record value",
            "date",
            "certificate",
            "scan endpoints",
            "all octoseek",
            "pulse pulses",
            "files"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Germany"
          ],
          "malware_families": [
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "Lumma",
              "display_name": "Lumma",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1090",
              "name": "Proxy",
              "display_name": "T1090 - Proxy"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "655650c9b2be6cc930c92cf3",
          "export_count": 102,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 204,
            "FileHash-SHA1": 182,
            "FileHash-SHA256": 6268,
            "URL": 13989,
            "domain": 3229,
            "hostname": 4412,
            "CVE": 19,
            "email": 3
          },
          "indicator_count": 28306,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "855 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65580c52bf98f256b6a01da6",
          "name": "https://myaccount.uscis.gov/",
          "description": "",
          "modified": "2023-12-16T15:00:49.451000",
          "created": "2023-11-18T00:58:58.944000",
          "tags": [
            "whois record",
            "ssl certificate",
            "whois whois",
            "communicating",
            "referrer",
            "ip address",
            "contacted",
            "pe resource",
            "historical ssl",
            "collections wow",
            "cobalt",
            "stealer",
            "quasar",
            "remcos",
            "ursnif",
            "fabookie",
            "name verdict",
            "exit",
            "node tcp",
            "traffic",
            "united",
            "et tor",
            "known tor",
            "relayrouter",
            "anonymizer",
            "tor known",
            "tor relayrouter",
            "cisco umbrella",
            "site",
            "safe site",
            "heur",
            "maltiverse",
            "million",
            "alexa top",
            "unsafe",
            "html",
            "team",
            "riskware",
            "malware",
            "phishing",
            "union",
            "bank",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "artemis",
            "installcore",
            "webshell",
            "exploit",
            "crack",
            "webtoolbar",
            "detection list",
            "blacklist http",
            "september",
            "threat roundup",
            "execution",
            "metro",
            "formbook",
            "kgs0",
            "kls0",
            "blacklist https",
            "malicious site",
            "malware site",
            "phishing site",
            "download",
            "malicious",
            "azorult",
            "service",
            "runescape",
            "facebook",
            "genkryptik",
            "fuery",
            "wacatac",
            "alexa",
            "dbatloader",
            "nanocore rat",
            "agent tesla",
            "binder",
            "dridex",
            "hawkeye",
            "small",
            "netwire",
            "trojan",
            "redline stealer",
            "lumma stealer",
            "trojanspy",
            "redline",
            "lumma",
            "tsara brashears",
            "whois",
            "asn owner",
            "highly targeted",
            "relacionada",
            "lolkek",
            "emotet",
            "dark power",
            "wiper",
            "ransomware",
            "cobalt strike",
            "quasar rat",
            "core",
            "bitrat",
            "hacktool",
            "critical",
            "copy",
            "installer",
            "meta",
            "as15169 google",
            "aaaa",
            "a domains",
            "videosdewebcams",
            "search",
            "passive dns",
            "urls",
            "record value",
            "date",
            "certificate",
            "scan endpoints",
            "all octoseek",
            "pulse pulses",
            "files"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Germany"
          ],
          "malware_families": [
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "Lumma",
              "display_name": "Lumma",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1090",
              "name": "Proxy",
              "display_name": "T1090 - Proxy"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "655650c9b2be6cc930c92cf3",
          "export_count": 101,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 204,
            "FileHash-SHA1": 182,
            "FileHash-SHA256": 6268,
            "URL": 13989,
            "domain": 3229,
            "hostname": 4412,
            "CVE": 19,
            "email": 3
          },
          "indicator_count": 28306,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "855 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "656aac25a8a2caaddf0d3b88",
          "name": "https://myaccount.uscis.gov/",
          "description": "",
          "modified": "2023-12-16T15:00:49.451000",
          "created": "2023-12-02T04:01:41.427000",
          "tags": [
            "whois record",
            "ssl certificate",
            "whois whois",
            "communicating",
            "referrer",
            "ip address",
            "contacted",
            "pe resource",
            "historical ssl",
            "collections wow",
            "cobalt",
            "stealer",
            "quasar",
            "remcos",
            "ursnif",
            "fabookie",
            "name verdict",
            "exit",
            "node tcp",
            "traffic",
            "united",
            "et tor",
            "known tor",
            "relayrouter",
            "anonymizer",
            "tor known",
            "tor relayrouter",
            "cisco umbrella",
            "site",
            "safe site",
            "heur",
            "maltiverse",
            "million",
            "alexa top",
            "unsafe",
            "html",
            "team",
            "riskware",
            "malware",
            "phishing",
            "union",
            "bank",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "artemis",
            "installcore",
            "webshell",
            "exploit",
            "crack",
            "webtoolbar",
            "detection list",
            "blacklist http",
            "september",
            "threat roundup",
            "execution",
            "metro",
            "formbook",
            "kgs0",
            "kls0",
            "blacklist https",
            "malicious site",
            "malware site",
            "phishing site",
            "download",
            "malicious",
            "azorult",
            "service",
            "runescape",
            "facebook",
            "genkryptik",
            "fuery",
            "wacatac",
            "alexa",
            "dbatloader",
            "nanocore rat",
            "agent tesla",
            "binder",
            "dridex",
            "hawkeye",
            "small",
            "netwire",
            "trojan",
            "redline stealer",
            "lumma stealer",
            "trojanspy",
            "redline",
            "lumma",
            "tsara brashears",
            "whois",
            "asn owner",
            "highly targeted",
            "relacionada",
            "lolkek",
            "emotet",
            "dark power",
            "wiper",
            "ransomware",
            "cobalt strike",
            "quasar rat",
            "core",
            "bitrat",
            "hacktool",
            "critical",
            "copy",
            "installer",
            "meta",
            "as15169 google",
            "aaaa",
            "a domains",
            "videosdewebcams",
            "search",
            "passive dns",
            "urls",
            "record value",
            "date",
            "certificate",
            "scan endpoints",
            "all octoseek",
            "pulse pulses",
            "files"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Germany"
          ],
          "malware_families": [
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "Lumma",
              "display_name": "Lumma",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1090",
              "name": "Proxy",
              "display_name": "T1090 - Proxy"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "655652f6ddcbf952a599cded",
          "export_count": 93,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 204,
            "FileHash-SHA1": 182,
            "FileHash-SHA256": 6268,
            "URL": 13989,
            "domain": 3229,
            "hostname": 4412,
            "CVE": 19,
            "email": 3
          },
          "indicator_count": 28306,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 227,
          "modified_text": "855 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "654a7a4d960200d938e180c3",
          "name": "Kraddare \u2022 Agent Tesla \u2022 CVE Jar",
          "description": "http://bpdb.portal.gov.bd:3128/sites/default/files/files/bpdb.portal.gov.bd/npfblock/2021-34bc869d2906198362a4346373ce5b94.jpg\nPurports to be based in Bangladesh, bounces to USA. Tor exit, relay router. Many proxies. Malicious.  Very malicious targeting involved. Apple iOS hacking, device unlocking, CNC. Legal mischief?\n\nCVE\tCVE-2017-0147\t\t\t\t\t\nCVE\tCVE-2015-1650\t\t\t\t\t\nCVE\tCVE-2014-6352\t\t\t\t\t\nCVE\tCVE-2014-3153\t\t\t\t\t\nCVE\tCVE-2017-8570\t\t\t\t\t\t\nCVE\tCVE-2015-6585\t\t\t\nCVE\tCVE-2012-0158\t\t\t\t\t\t\nCVE\tCVE-2010-3333\t\t\t\t\t\t\nCVE\tCVE-2017-17215\t\t\t\t\nhttp://1.116.132.182/weblogic_CVE_2020_2551.jar",
          "modified": "2023-12-07T17:00:24.699000",
          "created": "2023-11-07T17:56:29.786000",
          "tags": [
            "heur",
            "cisco umbrella",
            "site",
            "alexa top",
            "malware",
            "million",
            "xcnfe",
            "maltiverse",
            "malware site",
            "safe site",
            "malicious",
            "trojan",
            "artemis",
            "vidar",
            "redline stealer",
            "raccoon",
            "keylogger",
            "riskware",
            "agent tesla",
            "remcos",
            "stealer",
            "miner",
            "hacktool",
            "bank",
            "agenttesla",
            "agent",
            "unknown",
            "downloader",
            "unsafe",
            "detplock",
            "networm",
            "win64",
            "service",
            "smokeloader",
            "dropper",
            "crack",
            "alexa",
            "trojanspy",
            "detection list",
            "blacklist https",
            "kyriazhs1975",
            "noname057",
            "tag count",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "blacklist",
            "cyber threat",
            "united",
            "engineering",
            "phishing",
            "covid19",
            "facebook",
            "phishing site",
            "paypal",
            "njrat",
            "emotet",
            "nanocore rat",
            "meterpreter",
            "azorult",
            "download",
            "msil",
            "bladabindi",
            "mirai",
            "pony",
            "nanocore",
            "bradesco",
            "cobalt strike",
            "cve201711882",
            "redline",
            "ssl certificate",
            "tsara brashears",
            "cyberstalking",
            "spyware",
            "apple ios",
            "quasar",
            "ransomware",
            "malware norad",
            "cry kill",
            "attack",
            "installer",
            "formbook",
            "lockbit",
            "open",
            "banker",
            "bazarloader",
            "core",
            "ransomexx",
            "name verdict",
            "pattern match",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "misc attack",
            "script",
            "beginstring",
            "ascii text",
            "null",
            "date",
            "error",
            "span",
            "refresh",
            "class",
            "generator",
            "critical",
            "body",
            "look",
            "verify",
            "restart",
            "meta",
            "hybrid",
            "general",
            "click",
            "strings",
            "tools",
            "as141773",
            "as63932",
            "moved",
            "passive dns",
            "search",
            "entries",
            "gmt content",
            "type",
            "keep alive",
            "scan endpoints",
            "all octoseek",
            "pulse pulses",
            "as17806 mango",
            "blacklist http",
            "phishtank",
            "malicious site",
            "apple",
            "blockchain",
            "runescape",
            "twitter",
            "qakbot",
            "asyncrat",
            "team",
            "internet storm",
            "generic",
            "union",
            "bazaloader",
            "media",
            "generic malware",
            "hostname",
            "suppobox",
            "netwire rc",
            "installcore",
            "conduit",
            "iobit",
            "mediaget",
            "outbreak",
            "acint",
            "installpack",
            "phish",
            "rostpay",
            "fakeinstaller",
            "spyrixkeylogger",
            "bitminer",
            "loadmoney",
            "filetour",
            "wacatac",
            "fusioncore",
            "dapato",
            "cleaner",
            "softonic",
            "encpk",
            "qbot",
            "predator",
            "swrort",
            "kraddare",
            "systweak",
            "dllinject",
            "driverpack",
            "iframe",
            "downldr",
            "presenoker",
            "as61317",
            "asnone united",
            "urls",
            "files",
            "next",
            "as15169 google",
            "japan unknown",
            "as17506 arteria",
            "as32244 liquid",
            "as49505",
            "russia unknown",
            "expired",
            "domain",
            "falcon",
            "as19969",
            "ipv4",
            "ransom",
            "encrypt",
            "file",
            "windows nt",
            "indicator",
            "response",
            "appdata",
            "gmt contenttype",
            "png image",
            "local",
            "contacted",
            "fali malicious",
            "dropped",
            "communicating",
            "referrer",
            "fali contacted",
            "silk road",
            "immediate",
            "cymulate2",
            "tsara brashears",
            "malvertizing"
          ],
          "references": [
            "https://wallpapers-nature.com/tsara-brashears/urlscan-io",
            "alohatube.xyz",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "http://alohatube.xyz/search/tsara-brashears",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "ww.google.com.uy",
            "https://alohatube.xyz/search/tsara-brashears",
            "https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
            "https://polling.portal.gov.bd/js/npc.script.js",
            "polling.portal.gov.bd",
            "https://polling.portal.gov.bd/js/npop.script.js",
            "http://watchhers.net/index.php",
            "https://brandyallen.com/2022/11/23/sexy",
            "m.pornsexer.xxx.3.1.adiosfil.roksit.net",
            "http://park.above.com/jr.php?gz=DjDNgvDQ0WlpBALxevxSvkF3jBH95b5riUvmgFjb1tbPDV06suYFlRcPA34ufLE5UZ8spiM7ya7tRXR8nLUgk920DSaIXniiR5hkoveznG%20mez7OU5R%20HKIczV475LuRwxm3J1pcRSpQcePtF/4aD%20frLO%205mYc0Maj8Z1IwBeAMESc9Gk3BzCkGUHNVeCAZ9vZrQhEeVvN%20QVBAu1boZNJTnvCAP0lB5ebMSP92bFHD/ItyL53LoVDSYWMd64KTNMMJaXE0kZVqQn/%20STriQbrA6cmW3Xj4sAJ3XXEbNNJzTbIvgsy00PlKWInEUK/iXzVecaBsXg3vkUcvkeM3HPPIajaBexXO7ATYz/qTeKAksI9l2IoDAsn0S9BYCTuP8uTYdgJAv0LO%20MkNBOrSqJnFQzTlNxG4NRSP6K4VDWklVPpCwQc/s/AfrwIdLcdrV6CQDLaluG1naOjXDc",
            "http://nhrc.portal.gov.bd/sites/default/files/files/nhrc.portal.gov.bd/page/348ec5eb_22f8_4754_bb62_6a0d15ba1513/Study-Report-on-Sexual-Offences_Final.pdf",
            "https://twitter.com/PORNO_SEXYBABES",
            "https://alohatube.xyz/search/sex-mom-dog-animal",
            "https://www.colorfulbox.jp/",
            "Hybrid Analysis",
            "Any.run",
            "OTX AlienVault",
            "Urlscan",
            "UrlVoid",
            "http://emrd.gov.bd/dead.php",
            "http://titasgas.portal.gov.bd/dead.php",
            "http://mincom.gov.bd/dead.php",
            "http://cabinet.gov.bd/dead.php"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Malaysia",
            "Bangladesh"
          ],
          "malware_families": [
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Racoon Stealer",
              "display_name": "Racoon Stealer",
              "target": null
            },
            {
              "id": "Ransomexx",
              "display_name": "Ransomexx",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "njRAT - S0385",
              "display_name": "njRAT - S0385",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Bazaar Loader",
              "display_name": "Bazaar Loader",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Detplock",
              "display_name": "Detplock",
              "target": null
            },
            {
              "id": "WannaCry Kill Switch",
              "display_name": "WannaCry Kill Switch",
              "target": null
            },
            {
              "id": "Ghandi",
              "display_name": "Ghandi",
              "target": null
            },
            {
              "id": "Systweak",
              "display_name": "Systweak",
              "target": null
            },
            {
              "id": "Swort",
              "display_name": "Swort",
              "target": null
            },
            {
              "id": "Silk Road",
              "display_name": "Silk Road",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:PUA:Win32/SpyrixKeylogger",
              "display_name": "ALF:HeraklezEval:PUA:Win32/SpyrixKeylogger",
              "target": null
            },
            {
              "id": "Trojan:Win32/Wacatac",
              "display_name": "Trojan:Win32/Wacatac",
              "target": "/malware/Trojan:Win32/Wacatac"
            },
            {
              "id": "RansomEXX",
              "display_name": "RansomEXX",
              "target": null
            },
            {
              "id": "noname057",
              "display_name": "noname057",
              "target": null
            },
            {
              "id": "Nanocore RAT",
              "display_name": "Nanocore RAT",
              "target": null
            },
            {
              "id": "Worm:VBS/Dapato",
              "display_name": "Worm:VBS/Dapato",
              "target": "/malware/Worm:VBS/Dapato"
            },
            {
              "id": "Kraddare",
              "display_name": "Kraddare",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1110",
              "name": "Brute Force",
              "display_name": "T1110 - Brute Force"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1571",
              "name": "Non-Standard Port",
              "display_name": "T1571 - Non-Standard Port"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1491",
              "name": "Defacement",
              "display_name": "T1491 - Defacement"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 152,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2522,
            "FileHash-SHA1": 862,
            "FileHash-SHA256": 2855,
            "URL": 7963,
            "domain": 1168,
            "hostname": 3181,
            "CVE": 13,
            "email": 2
          },
          "indicator_count": 18566,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "864 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "654a7a53317c717d1f4fee7f",
          "name": "Kraddare \u2022 Agent Tesla \u2022 CVE Jar",
          "description": "http://bpdb.portal.gov.bd:3128/sites/default/files/files/bpdb.portal.gov.bd/npfblock/2021-34bc869d2906198362a4346373ce5b94.jpg\nPurports to be based in Bangladesh, bounces to USA. Tor exit, relay router. Many proxies. Malicious.  Very malicious targeting involved. Apple iOS hacking, device unlocking, CNC. Legal mischief?\n\nCVE\tCVE-2017-0147\t\t\t\t\t\nCVE\tCVE-2015-1650\t\t\t\t\t\nCVE\tCVE-2014-6352\t\t\t\t\t\nCVE\tCVE-2014-3153\t\t\t\t\t\nCVE\tCVE-2017-8570\t\t\t\t\t\t\nCVE\tCVE-2015-6585\t\t\t\nCVE\tCVE-2012-0158\t\t\t\t\t\t\nCVE\tCVE-2010-3333\t\t\t\t\t\t\nCVE\tCVE-2017-17215\t\t\t\t\nhttp://1.116.132.182/weblogic_CVE_2020_2551.jar",
          "modified": "2023-12-07T17:00:24.699000",
          "created": "2023-11-07T17:56:35.967000",
          "tags": [
            "heur",
            "cisco umbrella",
            "site",
            "alexa top",
            "malware",
            "million",
            "xcnfe",
            "maltiverse",
            "malware site",
            "safe site",
            "malicious",
            "trojan",
            "artemis",
            "vidar",
            "redline stealer",
            "raccoon",
            "keylogger",
            "riskware",
            "agent tesla",
            "remcos",
            "stealer",
            "miner",
            "hacktool",
            "bank",
            "agenttesla",
            "agent",
            "unknown",
            "downloader",
            "unsafe",
            "detplock",
            "networm",
            "win64",
            "service",
            "smokeloader",
            "dropper",
            "crack",
            "alexa",
            "trojanspy",
            "detection list",
            "blacklist https",
            "kyriazhs1975",
            "noname057",
            "tag count",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "blacklist",
            "cyber threat",
            "united",
            "engineering",
            "phishing",
            "covid19",
            "facebook",
            "phishing site",
            "paypal",
            "njrat",
            "emotet",
            "nanocore rat",
            "meterpreter",
            "azorult",
            "download",
            "msil",
            "bladabindi",
            "mirai",
            "pony",
            "nanocore",
            "bradesco",
            "cobalt strike",
            "cve201711882",
            "redline",
            "ssl certificate",
            "tsara brashears",
            "cyberstalking",
            "spyware",
            "apple ios",
            "quasar",
            "ransomware",
            "malware norad",
            "cry kill",
            "attack",
            "installer",
            "formbook",
            "lockbit",
            "open",
            "banker",
            "bazarloader",
            "core",
            "ransomexx",
            "name verdict",
            "pattern match",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "misc attack",
            "script",
            "beginstring",
            "ascii text",
            "null",
            "date",
            "error",
            "span",
            "refresh",
            "class",
            "generator",
            "critical",
            "body",
            "look",
            "verify",
            "restart",
            "meta",
            "hybrid",
            "general",
            "click",
            "strings",
            "tools",
            "as141773",
            "as63932",
            "moved",
            "passive dns",
            "search",
            "entries",
            "gmt content",
            "type",
            "keep alive",
            "scan endpoints",
            "all octoseek",
            "pulse pulses",
            "as17806 mango",
            "blacklist http",
            "phishtank",
            "malicious site",
            "apple",
            "blockchain",
            "runescape",
            "twitter",
            "qakbot",
            "asyncrat",
            "team",
            "internet storm",
            "generic",
            "union",
            "bazaloader",
            "media",
            "generic malware",
            "hostname",
            "suppobox",
            "netwire rc",
            "installcore",
            "conduit",
            "iobit",
            "mediaget",
            "outbreak",
            "acint",
            "installpack",
            "phish",
            "rostpay",
            "fakeinstaller",
            "spyrixkeylogger",
            "bitminer",
            "loadmoney",
            "filetour",
            "wacatac",
            "fusioncore",
            "dapato",
            "cleaner",
            "softonic",
            "encpk",
            "qbot",
            "predator",
            "swrort",
            "kraddare",
            "systweak",
            "dllinject",
            "driverpack",
            "iframe",
            "downldr",
            "presenoker",
            "as61317",
            "asnone united",
            "urls",
            "files",
            "next",
            "as15169 google",
            "japan unknown",
            "as17506 arteria",
            "as32244 liquid",
            "as49505",
            "russia unknown",
            "expired",
            "domain",
            "falcon",
            "as19969",
            "ipv4",
            "ransom",
            "encrypt",
            "file",
            "windows nt",
            "indicator",
            "response",
            "appdata",
            "gmt contenttype",
            "png image",
            "local",
            "contacted",
            "fali malicious",
            "dropped",
            "communicating",
            "referrer",
            "fali contacted",
            "silk road",
            "immediate",
            "cymulate2",
            "tsara brashears",
            "malvertizing"
          ],
          "references": [
            "https://wallpapers-nature.com/tsara-brashears/urlscan-io",
            "alohatube.xyz",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "http://alohatube.xyz/search/tsara-brashears",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "ww.google.com.uy",
            "https://alohatube.xyz/search/tsara-brashears",
            "https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
            "https://polling.portal.gov.bd/js/npc.script.js",
            "polling.portal.gov.bd",
            "https://polling.portal.gov.bd/js/npop.script.js",
            "http://watchhers.net/index.php",
            "https://brandyallen.com/2022/11/23/sexy",
            "m.pornsexer.xxx.3.1.adiosfil.roksit.net",
            "http://park.above.com/jr.php?gz=DjDNgvDQ0WlpBALxevxSvkF3jBH95b5riUvmgFjb1tbPDV06suYFlRcPA34ufLE5UZ8spiM7ya7tRXR8nLUgk920DSaIXniiR5hkoveznG%20mez7OU5R%20HKIczV475LuRwxm3J1pcRSpQcePtF/4aD%20frLO%205mYc0Maj8Z1IwBeAMESc9Gk3BzCkGUHNVeCAZ9vZrQhEeVvN%20QVBAu1boZNJTnvCAP0lB5ebMSP92bFHD/ItyL53LoVDSYWMd64KTNMMJaXE0kZVqQn/%20STriQbrA6cmW3Xj4sAJ3XXEbNNJzTbIvgsy00PlKWInEUK/iXzVecaBsXg3vkUcvkeM3HPPIajaBexXO7ATYz/qTeKAksI9l2IoDAsn0S9BYCTuP8uTYdgJAv0LO%20MkNBOrSqJnFQzTlNxG4NRSP6K4VDWklVPpCwQc/s/AfrwIdLcdrV6CQDLaluG1naOjXDc",
            "http://nhrc.portal.gov.bd/sites/default/files/files/nhrc.portal.gov.bd/page/348ec5eb_22f8_4754_bb62_6a0d15ba1513/Study-Report-on-Sexual-Offences_Final.pdf",
            "https://twitter.com/PORNO_SEXYBABES",
            "https://alohatube.xyz/search/sex-mom-dog-animal",
            "https://www.colorfulbox.jp/",
            "Hybrid Analysis",
            "Any.run",
            "OTX AlienVault",
            "Urlscan",
            "UrlVoid",
            "http://emrd.gov.bd/dead.php",
            "http://titasgas.portal.gov.bd/dead.php",
            "http://mincom.gov.bd/dead.php",
            "http://cabinet.gov.bd/dead.php"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Malaysia",
            "Bangladesh"
          ],
          "malware_families": [
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Racoon Stealer",
              "display_name": "Racoon Stealer",
              "target": null
            },
            {
              "id": "Ransomexx",
              "display_name": "Ransomexx",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "njRAT - S0385",
              "display_name": "njRAT - S0385",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Bazaar Loader",
              "display_name": "Bazaar Loader",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Detplock",
              "display_name": "Detplock",
              "target": null
            },
            {
              "id": "WannaCry Kill Switch",
              "display_name": "WannaCry Kill Switch",
              "target": null
            },
            {
              "id": "Ghandi",
              "display_name": "Ghandi",
              "target": null
            },
            {
              "id": "Systweak",
              "display_name": "Systweak",
              "target": null
            },
            {
              "id": "Swort",
              "display_name": "Swort",
              "target": null
            },
            {
              "id": "Silk Road",
              "display_name": "Silk Road",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:PUA:Win32/SpyrixKeylogger",
              "display_name": "ALF:HeraklezEval:PUA:Win32/SpyrixKeylogger",
              "target": null
            },
            {
              "id": "Trojan:Win32/Wacatac",
              "display_name": "Trojan:Win32/Wacatac",
              "target": "/malware/Trojan:Win32/Wacatac"
            },
            {
              "id": "RansomEXX",
              "display_name": "RansomEXX",
              "target": null
            },
            {
              "id": "noname057",
              "display_name": "noname057",
              "target": null
            },
            {
              "id": "Nanocore RAT",
              "display_name": "Nanocore RAT",
              "target": null
            },
            {
              "id": "Worm:VBS/Dapato",
              "display_name": "Worm:VBS/Dapato",
              "target": "/malware/Worm:VBS/Dapato"
            },
            {
              "id": "Kraddare",
              "display_name": "Kraddare",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1110",
              "name": "Brute Force",
              "display_name": "T1110 - Brute Force"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1571",
              "name": "Non-Standard Port",
              "display_name": "T1571 - Non-Standard Port"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1491",
              "name": "Defacement",
              "display_name": "T1491 - Defacement"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 151,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2522,
            "FileHash-SHA1": 862,
            "FileHash-SHA256": 2855,
            "URL": 7963,
            "domain": 1168,
            "hostname": 3181,
            "CVE": 13,
            "email": 2
          },
          "indicator_count": 18566,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "864 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "654a772076be04f1649f9a42",
          "name": "Remote & other attacks. Dapato I Detplock I Emotet I",
          "description": "http://bpdb.portal.gov.bd:3128/sites/default/files/files/bpdb.portal.gov.bd/npfblock/2021-34bc869d2906198362a4346373ce5b94.jpg\nPurports to be based in Bangladesh, bounces to USA. Tor exit, relay router. Many proxies. Malicious.  Very malicious targeting involved. Apple iOS hacking, device unlocking, CNC. Legal mischief.",
          "modified": "2023-12-07T17:00:24.699000",
          "created": "2023-11-07T17:42:56.873000",
          "tags": [
            "heur",
            "cisco umbrella",
            "site",
            "alexa top",
            "malware",
            "million",
            "xcnfe",
            "maltiverse",
            "malware site",
            "safe site",
            "malicious",
            "trojan",
            "artemis",
            "vidar",
            "redline stealer",
            "raccoon",
            "keylogger",
            "riskware",
            "agent tesla",
            "remcos",
            "stealer",
            "miner",
            "hacktool",
            "bank",
            "agenttesla",
            "agent",
            "unknown",
            "downloader",
            "unsafe",
            "detplock",
            "networm",
            "win64",
            "service",
            "smokeloader",
            "dropper",
            "crack",
            "alexa",
            "trojanspy",
            "detection list",
            "blacklist https",
            "kyriazhs1975",
            "noname057",
            "tag count",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "blacklist",
            "cyber threat",
            "united",
            "engineering",
            "phishing",
            "covid19",
            "facebook",
            "phishing site",
            "paypal",
            "njrat",
            "emotet",
            "nanocore rat",
            "meterpreter",
            "azorult",
            "download",
            "msil",
            "bladabindi",
            "mirai",
            "pony",
            "nanocore",
            "bradesco",
            "cobalt strike",
            "cve201711882",
            "redline",
            "ssl certificate",
            "tsara brashears",
            "cyberstalking",
            "spyware",
            "apple ios",
            "quasar",
            "ransomware",
            "malware norad",
            "cry kill",
            "attack",
            "installer",
            "formbook",
            "lockbit",
            "open",
            "banker",
            "bazarloader",
            "core",
            "ransomexx",
            "name verdict",
            "pattern match",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "misc attack",
            "script",
            "beginstring",
            "ascii text",
            "null",
            "date",
            "error",
            "span",
            "refresh",
            "class",
            "generator",
            "critical",
            "body",
            "look",
            "verify",
            "restart",
            "meta",
            "hybrid",
            "general",
            "click",
            "strings",
            "tools",
            "as141773",
            "as63932",
            "moved",
            "passive dns",
            "search",
            "entries",
            "gmt content",
            "type",
            "keep alive",
            "scan endpoints",
            "all octoseek",
            "pulse pulses",
            "as17806 mango",
            "blacklist http",
            "phishtank",
            "malicious site",
            "apple",
            "blockchain",
            "runescape",
            "twitter",
            "qakbot",
            "asyncrat",
            "team",
            "internet storm",
            "generic",
            "union",
            "bazaloader",
            "media",
            "generic malware",
            "hostname",
            "suppobox",
            "netwire rc",
            "installcore",
            "conduit",
            "iobit",
            "mediaget",
            "outbreak",
            "acint",
            "installpack",
            "phish",
            "rostpay",
            "fakeinstaller",
            "spyrixkeylogger",
            "bitminer",
            "loadmoney",
            "filetour",
            "wacatac",
            "fusioncore",
            "dapato",
            "cleaner",
            "softonic",
            "encpk",
            "qbot",
            "predator",
            "swrort",
            "kraddare",
            "systweak",
            "dllinject",
            "driverpack",
            "iframe",
            "downldr",
            "presenoker",
            "as61317",
            "asnone united",
            "urls",
            "files",
            "next",
            "as15169 google",
            "japan unknown",
            "as17506 arteria",
            "as32244 liquid",
            "as49505",
            "russia unknown",
            "expired",
            "domain",
            "falcon",
            "as19969",
            "ipv4",
            "ransom",
            "encrypt",
            "file",
            "windows nt",
            "indicator",
            "response",
            "appdata",
            "gmt contenttype",
            "png image",
            "local",
            "contacted",
            "fali malicious",
            "dropped",
            "communicating",
            "referrer",
            "fali contacted",
            "silk road",
            "immediate",
            "cymulate2",
            "tsara brashears",
            "malvertizing"
          ],
          "references": [
            "https://wallpapers-nature.com/tsara-brashears/urlscan-io",
            "alohatube.xyz",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "http://alohatube.xyz/search/tsara-brashears",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "ww.google.com.uy",
            "https://alohatube.xyz/search/tsara-brashears",
            "https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
            "https://polling.portal.gov.bd/js/npc.script.js",
            "polling.portal.gov.bd",
            "https://polling.portal.gov.bd/js/npop.script.js",
            "http://watchhers.net/index.php",
            "https://brandyallen.com/2022/11/23/sexy",
            "m.pornsexer.xxx.3.1.adiosfil.roksit.net",
            "http://park.above.com/jr.php?gz=DjDNgvDQ0WlpBALxevxSvkF3jBH95b5riUvmgFjb1tbPDV06suYFlRcPA34ufLE5UZ8spiM7ya7tRXR8nLUgk920DSaIXniiR5hkoveznG%20mez7OU5R%20HKIczV475LuRwxm3J1pcRSpQcePtF/4aD%20frLO%205mYc0Maj8Z1IwBeAMESc9Gk3BzCkGUHNVeCAZ9vZrQhEeVvN%20QVBAu1boZNJTnvCAP0lB5ebMSP92bFHD/ItyL53LoVDSYWMd64KTNMMJaXE0kZVqQn/%20STriQbrA6cmW3Xj4sAJ3XXEbNNJzTbIvgsy00PlKWInEUK/iXzVecaBsXg3vkUcvkeM3HPPIajaBexXO7ATYz/qTeKAksI9l2IoDAsn0S9BYCTuP8uTYdgJAv0LO%20MkNBOrSqJnFQzTlNxG4NRSP6K4VDWklVPpCwQc/s/AfrwIdLcdrV6CQDLaluG1naOjXDc",
            "http://nhrc.portal.gov.bd/sites/default/files/files/nhrc.portal.gov.bd/page/348ec5eb_22f8_4754_bb62_6a0d15ba1513/Study-Report-on-Sexual-Offences_Final.pdf",
            "https://twitter.com/PORNO_SEXYBABES",
            "https://alohatube.xyz/search/sex-mom-dog-animal",
            "https://www.colorfulbox.jp/",
            "Hybrid Analysis",
            "Any.run",
            "OTX AlienVault",
            "Urlscan",
            "UrlVoid",
            "http://emrd.gov.bd/dead.php",
            "http://titasgas.portal.gov.bd/dead.php",
            "http://mincom.gov.bd/dead.php",
            "http://cabinet.gov.bd/dead.php"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Malaysia",
            "Bangladesh"
          ],
          "malware_families": [
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "Hall Render",
              "display_name": "Hall Render",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Racoon Stealer",
              "display_name": "Racoon Stealer",
              "target": null
            },
            {
              "id": "Ransomexx",
              "display_name": "Ransomexx",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "njRAT - S0385",
              "display_name": "njRAT - S0385",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Bazaar Loader",
              "display_name": "Bazaar Loader",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Detplock",
              "display_name": "Detplock",
              "target": null
            },
            {
              "id": "WannaCry Kill Switch",
              "display_name": "WannaCry Kill Switch",
              "target": null
            },
            {
              "id": "Ghandi",
              "display_name": "Ghandi",
              "target": null
            },
            {
              "id": "Systweak",
              "display_name": "Systweak",
              "target": null
            },
            {
              "id": "Swort",
              "display_name": "Swort",
              "target": null
            },
            {
              "id": "Silk Road",
              "display_name": "Silk Road",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:PUA:Win32/SpyrixKeylogger",
              "display_name": "ALF:HeraklezEval:PUA:Win32/SpyrixKeylogger",
              "target": null
            },
            {
              "id": "Trojan:Win32/Wacatac",
              "display_name": "Trojan:Win32/Wacatac",
              "target": "/malware/Trojan:Win32/Wacatac"
            },
            {
              "id": "RansomEXX",
              "display_name": "RansomEXX",
              "target": null
            },
            {
              "id": "noname057",
              "display_name": "noname057",
              "target": null
            },
            {
              "id": "Nanocore RAT",
              "display_name": "Nanocore RAT",
              "target": null
            },
            {
              "id": "Worm:VBS/Dapato",
              "display_name": "Worm:VBS/Dapato",
              "target": "/malware/Worm:VBS/Dapato"
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1110",
              "name": "Brute Force",
              "display_name": "T1110 - Brute Force"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1571",
              "name": "Non-Standard Port",
              "display_name": "T1571 - Non-Standard Port"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1491",
              "name": "Defacement",
              "display_name": "T1491 - Defacement"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 151,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2522,
            "FileHash-SHA1": 862,
            "FileHash-SHA256": 2855,
            "URL": 7963,
            "domain": 1168,
            "hostname": 3181,
            "CVE": 13,
            "email": 2
          },
          "indicator_count": 18566,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "864 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "654ab0f0b732066a2bdd1425",
          "name": "Remote & other attacks. Dapato I Detplock I Emotet I",
          "description": "",
          "modified": "2023-12-07T17:00:24.699000",
          "created": "2023-11-07T21:49:36.686000",
          "tags": [
            "heur",
            "cisco umbrella",
            "site",
            "alexa top",
            "malware",
            "million",
            "xcnfe",
            "maltiverse",
            "malware site",
            "safe site",
            "malicious",
            "trojan",
            "artemis",
            "vidar",
            "redline stealer",
            "raccoon",
            "keylogger",
            "riskware",
            "agent tesla",
            "remcos",
            "stealer",
            "miner",
            "hacktool",
            "bank",
            "agenttesla",
            "agent",
            "unknown",
            "downloader",
            "unsafe",
            "detplock",
            "networm",
            "win64",
            "service",
            "smokeloader",
            "dropper",
            "crack",
            "alexa",
            "trojanspy",
            "detection list",
            "blacklist https",
            "kyriazhs1975",
            "noname057",
            "tag count",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "blacklist",
            "cyber threat",
            "united",
            "engineering",
            "phishing",
            "covid19",
            "facebook",
            "phishing site",
            "paypal",
            "njrat",
            "emotet",
            "nanocore rat",
            "meterpreter",
            "azorult",
            "download",
            "msil",
            "bladabindi",
            "mirai",
            "pony",
            "nanocore",
            "bradesco",
            "cobalt strike",
            "cve201711882",
            "redline",
            "ssl certificate",
            "tsara brashears",
            "cyberstalking",
            "spyware",
            "apple ios",
            "quasar",
            "ransomware",
            "malware norad",
            "cry kill",
            "attack",
            "installer",
            "formbook",
            "lockbit",
            "open",
            "banker",
            "bazarloader",
            "core",
            "ransomexx",
            "name verdict",
            "pattern match",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "misc attack",
            "script",
            "beginstring",
            "ascii text",
            "null",
            "date",
            "error",
            "span",
            "refresh",
            "class",
            "generator",
            "critical",
            "body",
            "look",
            "verify",
            "restart",
            "meta",
            "hybrid",
            "general",
            "click",
            "strings",
            "tools",
            "as141773",
            "as63932",
            "moved",
            "passive dns",
            "search",
            "entries",
            "gmt content",
            "type",
            "keep alive",
            "scan endpoints",
            "all octoseek",
            "pulse pulses",
            "as17806 mango",
            "blacklist http",
            "phishtank",
            "malicious site",
            "apple",
            "blockchain",
            "runescape",
            "twitter",
            "qakbot",
            "asyncrat",
            "team",
            "internet storm",
            "generic",
            "union",
            "bazaloader",
            "media",
            "generic malware",
            "hostname",
            "suppobox",
            "netwire rc",
            "installcore",
            "conduit",
            "iobit",
            "mediaget",
            "outbreak",
            "acint",
            "installpack",
            "phish",
            "rostpay",
            "fakeinstaller",
            "spyrixkeylogger",
            "bitminer",
            "loadmoney",
            "filetour",
            "wacatac",
            "fusioncore",
            "dapato",
            "cleaner",
            "softonic",
            "encpk",
            "qbot",
            "predator",
            "swrort",
            "kraddare",
            "systweak",
            "dllinject",
            "driverpack",
            "iframe",
            "downldr",
            "presenoker",
            "as61317",
            "asnone united",
            "urls",
            "files",
            "next",
            "as15169 google",
            "japan unknown",
            "as17506 arteria",
            "as32244 liquid",
            "as49505",
            "russia unknown",
            "expired",
            "domain",
            "falcon",
            "as19969",
            "ipv4",
            "ransom",
            "encrypt",
            "file",
            "windows nt",
            "indicator",
            "response",
            "appdata",
            "gmt contenttype",
            "png image",
            "local",
            "contacted",
            "fali malicious",
            "dropped",
            "communicating",
            "referrer",
            "fali contacted",
            "silk road",
            "immediate",
            "cymulate2",
            "tsara brashears",
            "malvertizing"
          ],
          "references": [
            "https://wallpapers-nature.com/tsara-brashears/urlscan-io",
            "alohatube.xyz",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "http://alohatube.xyz/search/tsara-brashears",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "ww.google.com.uy",
            "https://alohatube.xyz/search/tsara-brashears",
            "https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
            "https://polling.portal.gov.bd/js/npc.script.js",
            "polling.portal.gov.bd",
            "https://polling.portal.gov.bd/js/npop.script.js",
            "http://watchhers.net/index.php",
            "https://brandyallen.com/2022/11/23/sexy",
            "m.pornsexer.xxx.3.1.adiosfil.roksit.net",
            "http://park.above.com/jr.php?gz=DjDNgvDQ0WlpBALxevxSvkF3jBH95b5riUvmgFjb1tbPDV06suYFlRcPA34ufLE5UZ8spiM7ya7tRXR8nLUgk920DSaIXniiR5hkoveznG%20mez7OU5R%20HKIczV475LuRwxm3J1pcRSpQcePtF/4aD%20frLO%205mYc0Maj8Z1IwBeAMESc9Gk3BzCkGUHNVeCAZ9vZrQhEeVvN%20QVBAu1boZNJTnvCAP0lB5ebMSP92bFHD/ItyL53LoVDSYWMd64KTNMMJaXE0kZVqQn/%20STriQbrA6cmW3Xj4sAJ3XXEbNNJzTbIvgsy00PlKWInEUK/iXzVecaBsXg3vkUcvkeM3HPPIajaBexXO7ATYz/qTeKAksI9l2IoDAsn0S9BYCTuP8uTYdgJAv0LO%20MkNBOrSqJnFQzTlNxG4NRSP6K4VDWklVPpCwQc/s/AfrwIdLcdrV6CQDLaluG1naOjXDc",
            "http://nhrc.portal.gov.bd/sites/default/files/files/nhrc.portal.gov.bd/page/348ec5eb_22f8_4754_bb62_6a0d15ba1513/Study-Report-on-Sexual-Offences_Final.pdf",
            "https://twitter.com/PORNO_SEXYBABES",
            "https://alohatube.xyz/search/sex-mom-dog-animal",
            "https://www.colorfulbox.jp/",
            "Hybrid Analysis",
            "Any.run",
            "OTX AlienVault",
            "Urlscan",
            "UrlVoid",
            "http://emrd.gov.bd/dead.php",
            "http://titasgas.portal.gov.bd/dead.php",
            "http://mincom.gov.bd/dead.php",
            "http://cabinet.gov.bd/dead.php"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Malaysia",
            "Bangladesh"
          ],
          "malware_families": [
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "Hall Render",
              "display_name": "Hall Render",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Racoon Stealer",
              "display_name": "Racoon Stealer",
              "target": null
            },
            {
              "id": "Ransomexx",
              "display_name": "Ransomexx",
              "target": null
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "njRAT - S0385",
              "display_name": "njRAT - S0385",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Bazaar Loader",
              "display_name": "Bazaar Loader",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Detplock",
              "display_name": "Detplock",
              "target": null
            },
            {
              "id": "WannaCry Kill Switch",
              "display_name": "WannaCry Kill Switch",
              "target": null
            },
            {
              "id": "Ghandi",
              "display_name": "Ghandi",
              "target": null
            },
            {
              "id": "Systweak",
              "display_name": "Systweak",
              "target": null
            },
            {
              "id": "Swort",
              "display_name": "Swort",
              "target": null
            },
            {
              "id": "Silk Road",
              "display_name": "Silk Road",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:PUA:Win32/SpyrixKeylogger",
              "display_name": "ALF:HeraklezEval:PUA:Win32/SpyrixKeylogger",
              "target": null
            },
            {
              "id": "Trojan:Win32/Wacatac",
              "display_name": "Trojan:Win32/Wacatac",
              "target": "/malware/Trojan:Win32/Wacatac"
            },
            {
              "id": "RansomEXX",
              "display_name": "RansomEXX",
              "target": null
            },
            {
              "id": "noname057",
              "display_name": "noname057",
              "target": null
            },
            {
              "id": "Nanocore RAT",
              "display_name": "Nanocore RAT",
              "target": null
            },
            {
              "id": "Worm:VBS/Dapato",
              "display_name": "Worm:VBS/Dapato",
              "target": "/malware/Worm:VBS/Dapato"
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1110",
              "name": "Brute Force",
              "display_name": "T1110 - Brute Force"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1571",
              "name": "Non-Standard Port",
              "display_name": "T1571 - Non-Standard Port"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1491",
              "name": "Defacement",
              "display_name": "T1491 - Defacement"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "654a772076be04f1649f9a42",
          "export_count": 143,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2522,
            "FileHash-SHA1": 862,
            "FileHash-SHA256": 2855,
            "URL": 7963,
            "domain": 1168,
            "hostname": 3181,
            "CVE": 13,
            "email": 2
          },
          "indicator_count": 18566,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "864 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a79534c615a8f10f3380",
          "name": "Qakbot | Info Stealer | Sourced:  Part-RU",
          "description": "",
          "modified": "2023-12-06T16:55:49.669000",
          "created": "2023-12-06T16:55:49.669000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 2383,
            "hostname": 1027,
            "domain": 418,
            "URL": 2673,
            "FileHash-MD5": 99,
            "FileHash-SHA1": 98
          },
          "indicator_count": 6698,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 112,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a5cb329096398f3411f4",
          "name": "Virus:DOS/Metro",
          "description": "",
          "modified": "2023-12-06T16:48:11.311000",
          "created": "2023-12-06T16:48:11.311000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 6,
            "FileHash-SHA256": 3085,
            "hostname": 780,
            "domain": 527,
            "FileHash-MD5": 610,
            "FileHash-SHA1": 368,
            "URL": 3128
          },
          "indicator_count": 8504,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a5ba6d66424b1992092e",
          "name": "BlackNet RAT",
          "description": "",
          "modified": "2023-12-06T16:47:54.897000",
          "created": "2023-12-06T16:47:54.897000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 6,
            "FileHash-SHA256": 3085,
            "hostname": 780,
            "domain": 527,
            "FileHash-MD5": 610,
            "FileHash-SHA1": 368,
            "URL": 3128
          },
          "indicator_count": 8504,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a5b2ff4216fe9cd82624",
          "name": "Metro T-Mobile Command & Control. Cyber Threat",
          "description": "",
          "modified": "2023-12-06T16:47:46.826000",
          "created": "2023-12-06T16:47:46.826000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 6,
            "FileHash-SHA256": 3085,
            "hostname": 780,
            "domain": 527,
            "FileHash-MD5": 610,
            "FileHash-SHA1": 368,
            "URL": 3128
          },
          "indicator_count": 8504,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570974f872f3ad80a8b32c7",
          "name": "TarD5B7.tmp - and all using its ioc's",
          "description": "",
          "modified": "2023-12-06T15:46:23.604000",
          "created": "2023-12-06T15:46:23.604000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 6924,
            "CVE": 4,
            "FileHash-SHA256": 24687,
            "URL": 23965,
            "domain": 6830,
            "FileHash-MD5": 943,
            "FileHash-SHA1": 395,
            "email": 67
          },
          "indicator_count": 63815,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 113,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6546d206936ee17a0828d9c9",
          "name": "Deptlock Browser Compromise attack initiated by malicious (SOC) Partner ",
          "description": "",
          "modified": "2023-12-03T06:04:06.473000",
          "created": "2023-11-04T23:21:42.110000",
          "tags": [
            "cisco umbrella",
            "site",
            "alexa top",
            "emotet",
            "telefonica co",
            "million",
            "malware",
            "detection list",
            "blacklist",
            "alexa",
            "installcore",
            "heur",
            "cyber threat",
            "united",
            "phishing",
            "engineering",
            "phishing site",
            "team phishing",
            "spammer",
            "malicious site",
            "team",
            "download",
            "cobalt strike",
            "facebook",
            "artemis",
            "pony",
            "binder",
            "suppobox",
            "virut",
            "ramnit",
            "dropper",
            "formbook",
            "azorult",
            "simda",
            "downloader",
            "service",
            "bank",
            "zbot",
            "trojanspy",
            "heodo",
            "hostname",
            "hostnames",
            "whois record",
            "kgs0",
            "kls0",
            "apple ios",
            "tsara brashears",
            "ssl certificate",
            "elf collection",
            "cyberstalking",
            "spyware",
            "hackers",
            "installer",
            "open",
            "banker",
            "keylogger",
            "malicious",
            "hacktool",
            "core",
            "noname057",
            "generic malware",
            "safe site",
            "malware site",
            "iframe",
            "riskware",
            "exploit",
            "fakealert",
            "unsafe",
            "acint",
            "win64",
            "nircmd",
            "agent",
            "opencandy",
            "conduit",
            "swrort",
            "crack",
            "installpack",
            "xtrat",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "unruy",
            "filetour",
            "floxif",
            "cleaner",
            "patcher",
            "adload",
            "presenoker",
            "wacatac",
            "fusioncore",
            "genkryptik",
            "webtoolbar",
            "maltiverse",
            "smokeloader",
            "download json",
            "urls",
            "blacklist http",
            "kyriazhs1975",
            "vidar",
            "strike",
            "china cobalt",
            "meterpreter",
            "nanocore rat",
            "njrat",
            "redline stealer",
            "stealer",
            "nymaim",
            "mirai",
            "ghost rat",
            "runescape",
            "bradesco",
            "msil",
            "bladabindi",
            "orkut",
            "cutwail",
            "bandoo",
            "matsnu",
            "inmortal",
            "domains",
            "redline",
            "control server",
            "services",
            "generic",
            "br",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "squirrelwaffle",
            "soc http",
            "soc https",
            "back",
            "download csv",
            "json sample",
            "injector",
            "malicious url",
            "downldr",
            "covid19 scam",
            "historical ssl",
            "referrer",
            "contacted",
            "whois whois",
            "contacted urls",
            "whois sslcert",
            "threat roundup",
            "copy",
            "august",
            "execution",
            "ransomware",
            "gopher",
            "remcos",
            "attack",
            "radar ineractive",
            "paypal",
            "covid19",
            "phishing chase",
            "phishing google",
            "tracker malware",
            "chase personal",
            "banking",
            "javascript",
            "please",
            "cnc server",
            "tracker",
            "cnc feodo",
            "phishtank",
            "threats et",
            "name verdict",
            "falcon sandbox",
            "pattern match",
            "file",
            "ascii text",
            "indicator",
            "windows nt",
            "jpeg image",
            "appdata",
            "jfif standard",
            "script",
            "show",
            "date",
            "span",
            "unknown",
            "general",
            "hybrid",
            "local",
            "click",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "path",
            "http header",
            "tcp traffic",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "accept",
            "adware",
            "ip address",
            "hsbc",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "adaptivebee",
            "iobit",
            "trojanx",
            "webshell",
            "systweak",
            "behav",
            "tiggre",
            "runtime process",
            "sha256",
            "sha1",
            "mark brian sabey",
            "brian sabey",
            "sabey",
            "apple",
            "114.114.114.114",
            "attorney",
            "law",
            "spammer",
            "fraud service",
            "hallrender",
            "malvertizing",
            "cybercrime",
            "social engineering",
            "malware hosting",
            "cyber threat",
            "iphone unlocker",
            "malicious",
            "attacker",
            "tulach",
            "tulach.cc",
            "adult content",
            "child pornographer",
            "sabey data centers",
            "hall render denver",
            "monitoring",
            "stalker",
            "dev",
            "developer",
            "cyber harassment",
            "defacement",
            "death threats",
            "miner",
            "agenttesla",
            "trojan",
            "detplock",
            "networm",
            "rms",
            "sneaky server",
            "replacement",
            "unauthorized",
            "steam route",
            "tool",
            "probe",
            "safebae.org",
            "safebae",
            "daisy",
            "daisy coleman",
            "benjamin",
            "colorado",
            "missouri",
            "telefonica",
            "boost mobile",
            "blackievirus.com",
            "TrojanX",
            "metro t-mobile",
            "t-mobile",
            "mile high media",
            "CNC",
            "C2",
            "malware host",
            "yixun"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/a1b9247b6ad18f1cda0304e406333459d4000fced5753f91e5c046f6577c388a",
            "https://www.hallrender.com/attorney/brian-sabey",
            "safebae.org",
            "poemhunter.com",
            "http://www.hallrender.com/resources/blog/",
            "http://benjamin.xww.de/",
            "http://alohatube.xyz/search/tsara-brashears",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "Hybrid Analysis",
            "wTools",
            "Research"
          ],
          "public": 1,
          "adversary": "Tulach | Mark Brian Sabey | Hall Render Law Firm",
          "targeted_countries": [
            "United States of America",
            "Japan"
          ],
          "malware_families": [
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "BR",
              "display_name": "BR",
              "target": null
            },
            {
              "id": "Radar Ineractive",
              "display_name": "Radar Ineractive",
              "target": null
            },
            {
              "id": "HSBC",
              "display_name": "HSBC",
              "target": null
            },
            {
              "id": "RMS",
              "display_name": "RMS",
              "target": null
            },
            {
              "id": "Feodo Tracker",
              "display_name": "Feodo Tracker",
              "target": null
            },
            {
              "id": "Wacatac",
              "display_name": "Wacatac",
              "target": null
            },
            {
              "id": "Zpevdo",
              "display_name": "Zpevdo",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "OpenCandy",
              "display_name": "OpenCandy",
              "target": null
            },
            {
              "id": "xRAT",
              "display_name": "xRAT",
              "target": null
            },
            {
              "id": "Vidar",
              "display_name": "Vidar",
              "target": null
            },
            {
              "id": "Agent Tesla",
              "display_name": "Agent Tesla",
              "target": null
            },
            {
              "id": "noname057",
              "display_name": "noname057",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "DarkSide .Beware",
              "display_name": "DarkSide .Beware",
              "target": null
            },
            {
              "id": "Nymaim",
              "display_name": "Nymaim",
              "target": null
            },
            {
              "id": "SLFPER:BrowserModifier:Win32/MediaMagnet",
              "display_name": "SLFPER:BrowserModifier:Win32/MediaMagnet",
              "target": null
            },
            {
              "id": "Virut",
              "display_name": "Virut",
              "target": null
            },
            {
              "id": "Cutwail",
              "display_name": "Cutwail",
              "target": null
            },
            {
              "id": "Nanocore RAT",
              "display_name": "Nanocore RAT",
              "target": null
            },
            {
              "id": "Tulach Malware",
              "display_name": "Tulach Malware",
              "target": null
            },
            {
              "id": "SuppoBox",
              "display_name": "SuppoBox",
              "target": null
            },
            {
              "id": "Systweak",
              "display_name": "Systweak",
              "target": null
            },
            {
              "id": "Occamy",
              "display_name": "Occamy",
              "target": null
            },
            {
              "id": "Tiggre",
              "display_name": "Tiggre",
              "target": null
            },
            {
              "id": "IObit",
              "display_name": "IObit",
              "target": null
            },
            {
              "id": "Sality",
              "display_name": "Sality",
              "target": null
            },
            {
              "id": "FORMBOOK",
              "display_name": "FORMBOOK",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Yixun",
              "display_name": "Yixun",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1043",
              "name": "Commonly Used Port",
              "display_name": "T1043 - Commonly Used Port"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1179",
              "name": "Hooking",
              "display_name": "T1179 - Hooking"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            }
          ],
          "industries": [
            "Health"
          ],
          "TLP": "green",
          "cloned_from": "6544c7a11d7541bdb3bfe5ff",
          "export_count": 60,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1643,
            "hostname": 1438,
            "CVE": 30,
            "FileHash-MD5": 2853,
            "FileHash-SHA1": 1584,
            "FileHash-SHA256": 3001,
            "URL": 2904,
            "email": 1
          },
          "indicator_count": 13454,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "868 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6544c99af21a2fde7bd6927e",
          "name": "Occamy Remote PC / Device Control ",
          "description": "",
          "modified": "2023-12-03T06:04:06.473000",
          "created": "2023-11-03T10:21:14.428000",
          "tags": [
            "cisco umbrella",
            "site",
            "alexa top",
            "emotet",
            "telefonica co",
            "million",
            "malware",
            "detection list",
            "blacklist",
            "alexa",
            "installcore",
            "heur",
            "cyber threat",
            "united",
            "phishing",
            "engineering",
            "phishing site",
            "team phishing",
            "spammer",
            "malicious site",
            "team",
            "download",
            "cobalt strike",
            "facebook",
            "artemis",
            "pony",
            "binder",
            "suppobox",
            "virut",
            "ramnit",
            "dropper",
            "formbook",
            "azorult",
            "simda",
            "downloader",
            "service",
            "bank",
            "zbot",
            "trojanspy",
            "heodo",
            "hostname",
            "hostnames",
            "whois record",
            "kgs0",
            "kls0",
            "apple ios",
            "tsara brashears",
            "ssl certificate",
            "elf collection",
            "cyberstalking",
            "spyware",
            "hackers",
            "installer",
            "open",
            "banker",
            "keylogger",
            "malicious",
            "hacktool",
            "core",
            "noname057",
            "generic malware",
            "safe site",
            "malware site",
            "iframe",
            "riskware",
            "exploit",
            "fakealert",
            "unsafe",
            "acint",
            "win64",
            "nircmd",
            "agent",
            "opencandy",
            "conduit",
            "swrort",
            "crack",
            "installpack",
            "xtrat",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "unruy",
            "filetour",
            "floxif",
            "cleaner",
            "patcher",
            "adload",
            "presenoker",
            "wacatac",
            "fusioncore",
            "genkryptik",
            "webtoolbar",
            "maltiverse",
            "smokeloader",
            "download json",
            "urls",
            "blacklist http",
            "kyriazhs1975",
            "vidar",
            "strike",
            "china cobalt",
            "meterpreter",
            "nanocore rat",
            "njrat",
            "redline stealer",
            "stealer",
            "nymaim",
            "mirai",
            "ghost rat",
            "runescape",
            "bradesco",
            "msil",
            "bladabindi",
            "orkut",
            "cutwail",
            "bandoo",
            "matsnu",
            "inmortal",
            "domains",
            "redline",
            "control server",
            "services",
            "generic",
            "br",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "squirrelwaffle",
            "soc http",
            "soc https",
            "back",
            "download csv",
            "json sample",
            "injector",
            "malicious url",
            "downldr",
            "covid19 scam",
            "historical ssl",
            "referrer",
            "contacted",
            "whois whois",
            "contacted urls",
            "whois sslcert",
            "threat roundup",
            "copy",
            "august",
            "execution",
            "ransomware",
            "gopher",
            "remcos",
            "attack",
            "radar ineractive",
            "paypal",
            "covid19",
            "phishing chase",
            "phishing google",
            "tracker malware",
            "chase personal",
            "banking",
            "javascript",
            "please",
            "cnc server",
            "tracker",
            "cnc feodo",
            "phishtank",
            "threats et",
            "name verdict",
            "falcon sandbox",
            "pattern match",
            "file",
            "ascii text",
            "indicator",
            "windows nt",
            "jpeg image",
            "appdata",
            "jfif standard",
            "script",
            "show",
            "date",
            "span",
            "unknown",
            "general",
            "hybrid",
            "local",
            "click",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "path",
            "http header",
            "tcp traffic",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "accept",
            "adware",
            "ip address",
            "hsbc",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "adaptivebee",
            "iobit",
            "trojanx",
            "webshell",
            "systweak",
            "behav",
            "tiggre",
            "runtime process",
            "sha256",
            "sha1",
            "mark brian sabey",
            "brian sabey",
            "sabey",
            "apple",
            "114.114.114.114",
            "attorney",
            "law",
            "spammer",
            "fraud service",
            "hallrender",
            "malvertizing",
            "cybercrime",
            "social engineering",
            "malware hosting",
            "cyber threat",
            "iphone unlocker",
            "malicious",
            "attacker",
            "tulach",
            "tulach.cc",
            "adult content",
            "child pornographer",
            "sabey data centers",
            "hall render denver",
            "monitoring",
            "stalker",
            "dev",
            "developer",
            "cyber harassment",
            "defacement",
            "death threats",
            "miner",
            "agenttesla",
            "trojan",
            "detplock",
            "networm",
            "rms",
            "sneaky server",
            "replacement",
            "unauthorized",
            "steam route",
            "tool",
            "probe",
            "safebae.org",
            "safebae",
            "daisy",
            "daisy coleman",
            "benjamin",
            "colorado",
            "missouri",
            "telefonica",
            "boost mobile",
            "blackievirus.com",
            "TrojanX",
            "metro t-mobile",
            "t-mobile",
            "mile high media",
            "CNC",
            "C2",
            "malware host",
            "yixun"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/a1b9247b6ad18f1cda0304e406333459d4000fced5753f91e5c046f6577c388a",
            "https://www.hallrender.com/attorney/brian-sabey",
            "safebae.org",
            "poemhunter.com",
            "http://www.hallrender.com/resources/blog/",
            "http://benjamin.xww.de/",
            "http://alohatube.xyz/search/tsara-brashears",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "Hybrid Analysis",
            "wTools",
            "Research"
          ],
          "public": 1,
          "adversary": "Tulach | Mark Brian Sabey | Hall Render Law Firm",
          "targeted_countries": [
            "United States of America",
            "Japan"
          ],
          "malware_families": [
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "BR",
              "display_name": "BR",
              "target": null
            },
            {
              "id": "Radar Ineractive",
              "display_name": "Radar Ineractive",
              "target": null
            },
            {
              "id": "HSBC",
              "display_name": "HSBC",
              "target": null
            },
            {
              "id": "RMS",
              "display_name": "RMS",
              "target": null
            },
            {
              "id": "Feodo Tracker",
              "display_name": "Feodo Tracker",
              "target": null
            },
            {
              "id": "Wacatac",
              "display_name": "Wacatac",
              "target": null
            },
            {
              "id": "Zpevdo",
              "display_name": "Zpevdo",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "OpenCandy",
              "display_name": "OpenCandy",
              "target": null
            },
            {
              "id": "xRAT",
              "display_name": "xRAT",
              "target": null
            },
            {
              "id": "Vidar",
              "display_name": "Vidar",
              "target": null
            },
            {
              "id": "Agent Tesla",
              "display_name": "Agent Tesla",
              "target": null
            },
            {
              "id": "noname057",
              "display_name": "noname057",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "DarkSide .Beware",
              "display_name": "DarkSide .Beware",
              "target": null
            },
            {
              "id": "Nymaim",
              "display_name": "Nymaim",
              "target": null
            },
            {
              "id": "SLFPER:BrowserModifier:Win32/MediaMagnet",
              "display_name": "SLFPER:BrowserModifier:Win32/MediaMagnet",
              "target": null
            },
            {
              "id": "Virut",
              "display_name": "Virut",
              "target": null
            },
            {
              "id": "Cutwail",
              "display_name": "Cutwail",
              "target": null
            },
            {
              "id": "Nanocore RAT",
              "display_name": "Nanocore RAT",
              "target": null
            },
            {
              "id": "Tulach Malware",
              "display_name": "Tulach Malware",
              "target": null
            },
            {
              "id": "SuppoBox",
              "display_name": "SuppoBox",
              "target": null
            },
            {
              "id": "Systweak",
              "display_name": "Systweak",
              "target": null
            },
            {
              "id": "Occamy",
              "display_name": "Occamy",
              "target": null
            },
            {
              "id": "Tiggre",
              "display_name": "Tiggre",
              "target": null
            },
            {
              "id": "IObit",
              "display_name": "IObit",
              "target": null
            },
            {
              "id": "Sality",
              "display_name": "Sality",
              "target": null
            },
            {
              "id": "FORMBOOK",
              "display_name": "FORMBOOK",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Yixun",
              "display_name": "Yixun",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1043",
              "name": "Commonly Used Port",
              "display_name": "T1043 - Commonly Used Port"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1179",
              "name": "Hooking",
              "display_name": "T1179 - Hooking"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            }
          ],
          "industries": [
            "Health"
          ],
          "TLP": "green",
          "cloned_from": "6544c7a11d7541bdb3bfe5ff",
          "export_count": 59,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1643,
            "hostname": 1438,
            "CVE": 30,
            "FileHash-MD5": 2853,
            "FileHash-SHA1": 1584,
            "FileHash-SHA256": 3001,
            "URL": 2904,
            "email": 1
          },
          "indicator_count": 13454,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "868 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6544d9b0f9b23205eb355210",
          "name": "Resources Hijacking by Attorney  11_03_2023",
          "description": "",
          "modified": "2023-12-03T06:04:06.473000",
          "created": "2023-11-03T11:29:52.652000",
          "tags": [
            "cisco umbrella",
            "site",
            "alexa top",
            "emotet",
            "telefonica co",
            "million",
            "malware",
            "detection list",
            "blacklist",
            "alexa",
            "installcore",
            "heur",
            "cyber threat",
            "united",
            "phishing",
            "engineering",
            "phishing site",
            "team phishing",
            "spammer",
            "malicious site",
            "team",
            "download",
            "cobalt strike",
            "facebook",
            "artemis",
            "pony",
            "binder",
            "suppobox",
            "virut",
            "ramnit",
            "dropper",
            "formbook",
            "azorult",
            "simda",
            "downloader",
            "service",
            "bank",
            "zbot",
            "trojanspy",
            "heodo",
            "hostname",
            "hostnames",
            "whois record",
            "kgs0",
            "kls0",
            "apple ios",
            "tsara brashears",
            "ssl certificate",
            "elf collection",
            "cyberstalking",
            "spyware",
            "hackers",
            "installer",
            "open",
            "banker",
            "keylogger",
            "malicious",
            "hacktool",
            "core",
            "noname057",
            "generic malware",
            "safe site",
            "malware site",
            "iframe",
            "riskware",
            "exploit",
            "fakealert",
            "unsafe",
            "acint",
            "win64",
            "nircmd",
            "agent",
            "opencandy",
            "conduit",
            "swrort",
            "crack",
            "installpack",
            "xtrat",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "unruy",
            "filetour",
            "floxif",
            "cleaner",
            "patcher",
            "adload",
            "presenoker",
            "wacatac",
            "fusioncore",
            "genkryptik",
            "webtoolbar",
            "maltiverse",
            "smokeloader",
            "download json",
            "urls",
            "blacklist http",
            "kyriazhs1975",
            "vidar",
            "strike",
            "china cobalt",
            "meterpreter",
            "nanocore rat",
            "njrat",
            "redline stealer",
            "stealer",
            "nymaim",
            "mirai",
            "ghost rat",
            "runescape",
            "bradesco",
            "msil",
            "bladabindi",
            "orkut",
            "cutwail",
            "bandoo",
            "matsnu",
            "inmortal",
            "domains",
            "redline",
            "control server",
            "services",
            "generic",
            "br",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "squirrelwaffle",
            "soc http",
            "soc https",
            "back",
            "download csv",
            "json sample",
            "injector",
            "malicious url",
            "downldr",
            "covid19 scam",
            "historical ssl",
            "referrer",
            "contacted",
            "whois whois",
            "contacted urls",
            "whois sslcert",
            "threat roundup",
            "copy",
            "august",
            "execution",
            "ransomware",
            "gopher",
            "remcos",
            "attack",
            "radar ineractive",
            "paypal",
            "covid19",
            "phishing chase",
            "phishing google",
            "tracker malware",
            "chase personal",
            "banking",
            "javascript",
            "please",
            "cnc server",
            "tracker",
            "cnc feodo",
            "phishtank",
            "threats et",
            "name verdict",
            "falcon sandbox",
            "pattern match",
            "file",
            "ascii text",
            "indicator",
            "windows nt",
            "jpeg image",
            "appdata",
            "jfif standard",
            "script",
            "show",
            "date",
            "span",
            "unknown",
            "general",
            "hybrid",
            "local",
            "click",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "path",
            "http header",
            "tcp traffic",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "accept",
            "adware",
            "ip address",
            "hsbc",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "adaptivebee",
            "iobit",
            "trojanx",
            "webshell",
            "systweak",
            "behav",
            "tiggre",
            "runtime process",
            "sha256",
            "sha1",
            "mark brian sabey",
            "brian sabey",
            "sabey",
            "apple",
            "114.114.114.114",
            "attorney",
            "law",
            "spammer",
            "fraud service",
            "hallrender",
            "malvertizing",
            "cybercrime",
            "social engineering",
            "malware hosting",
            "cyber threat",
            "iphone unlocker",
            "malicious",
            "attacker",
            "tulach",
            "tulach.cc",
            "adult content",
            "child pornographer",
            "sabey data centers",
            "hall render denver",
            "monitoring",
            "stalker",
            "dev",
            "developer",
            "cyber harassment",
            "defacement",
            "death threats",
            "miner",
            "agenttesla",
            "trojan",
            "detplock",
            "networm",
            "rms",
            "sneaky server",
            "replacement",
            "unauthorized",
            "steam route",
            "tool",
            "probe",
            "safebae.org",
            "safebae",
            "daisy",
            "daisy coleman",
            "benjamin",
            "colorado",
            "missouri",
            "telefonica",
            "boost mobile",
            "blackievirus.com",
            "TrojanX",
            "metro t-mobile",
            "t-mobile",
            "mile high media",
            "CNC",
            "C2",
            "malware host",
            "yixun"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/a1b9247b6ad18f1cda0304e406333459d4000fced5753f91e5c046f6577c388a",
            "https://www.hallrender.com/attorney/brian-sabey",
            "safebae.org",
            "poemhunter.com",
            "http://www.hallrender.com/resources/blog/",
            "http://benjamin.xww.de/",
            "http://alohatube.xyz/search/tsara-brashears",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "Hybrid Analysis",
            "wTools",
            "Research"
          ],
          "public": 1,
          "adversary": "Tulach | Mark Brian Sabey | Hall Render Law Firm",
          "targeted_countries": [
            "United States of America",
            "Japan"
          ],
          "malware_families": [
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "BR",
              "display_name": "BR",
              "target": null
            },
            {
              "id": "Radar Ineractive",
              "display_name": "Radar Ineractive",
              "target": null
            },
            {
              "id": "HSBC",
              "display_name": "HSBC",
              "target": null
            },
            {
              "id": "RMS",
              "display_name": "RMS",
              "target": null
            },
            {
              "id": "Feodo Tracker",
              "display_name": "Feodo Tracker",
              "target": null
            },
            {
              "id": "Wacatac",
              "display_name": "Wacatac",
              "target": null
            },
            {
              "id": "Zpevdo",
              "display_name": "Zpevdo",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "OpenCandy",
              "display_name": "OpenCandy",
              "target": null
            },
            {
              "id": "xRAT",
              "display_name": "xRAT",
              "target": null
            },
            {
              "id": "Vidar",
              "display_name": "Vidar",
              "target": null
            },
            {
              "id": "Agent Tesla",
              "display_name": "Agent Tesla",
              "target": null
            },
            {
              "id": "noname057",
              "display_name": "noname057",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "DarkSide .Beware",
              "display_name": "DarkSide .Beware",
              "target": null
            },
            {
              "id": "Nymaim",
              "display_name": "Nymaim",
              "target": null
            },
            {
              "id": "SLFPER:BrowserModifier:Win32/MediaMagnet",
              "display_name": "SLFPER:BrowserModifier:Win32/MediaMagnet",
              "target": null
            },
            {
              "id": "Virut",
              "display_name": "Virut",
              "target": null
            },
            {
              "id": "Cutwail",
              "display_name": "Cutwail",
              "target": null
            },
            {
              "id": "Nanocore RAT",
              "display_name": "Nanocore RAT",
              "target": null
            },
            {
              "id": "Tulach Malware",
              "display_name": "Tulach Malware",
              "target": null
            },
            {
              "id": "SuppoBox",
              "display_name": "SuppoBox",
              "target": null
            },
            {
              "id": "Systweak",
              "display_name": "Systweak",
              "target": null
            },
            {
              "id": "Occamy",
              "display_name": "Occamy",
              "target": null
            },
            {
              "id": "Tiggre",
              "display_name": "Tiggre",
              "target": null
            },
            {
              "id": "IObit",
              "display_name": "IObit",
              "target": null
            },
            {
              "id": "Sality",
              "display_name": "Sality",
              "target": null
            },
            {
              "id": "FORMBOOK",
              "display_name": "FORMBOOK",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Yixun",
              "display_name": "Yixun",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1043",
              "name": "Commonly Used Port",
              "display_name": "T1043 - Commonly Used Port"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1179",
              "name": "Hooking",
              "display_name": "T1179 - Hooking"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            }
          ],
          "industries": [
            "Health"
          ],
          "TLP": "green",
          "cloned_from": "6544c7a11d7541bdb3bfe5ff",
          "export_count": 60,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1643,
            "hostname": 1438,
            "CVE": 30,
            "FileHash-MD5": 2853,
            "FileHash-SHA1": 1584,
            "FileHash-SHA256": 3001,
            "URL": 2904,
            "email": 1
          },
          "indicator_count": 13454,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "868 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65459cbd3069e99e327642b6",
          "name": "Resources Hijacking ",
          "description": "",
          "modified": "2023-12-03T06:04:06.473000",
          "created": "2023-11-04T01:22:05.691000",
          "tags": [
            "cisco umbrella",
            "site",
            "alexa top",
            "emotet",
            "telefonica co",
            "million",
            "malware",
            "detection list",
            "blacklist",
            "alexa",
            "installcore",
            "heur",
            "cyber threat",
            "united",
            "phishing",
            "engineering",
            "phishing site",
            "team phishing",
            "spammer",
            "malicious site",
            "team",
            "download",
            "cobalt strike",
            "facebook",
            "artemis",
            "pony",
            "binder",
            "suppobox",
            "virut",
            "ramnit",
            "dropper",
            "formbook",
            "azorult",
            "simda",
            "downloader",
            "service",
            "bank",
            "zbot",
            "trojanspy",
            "heodo",
            "hostname",
            "hostnames",
            "whois record",
            "kgs0",
            "kls0",
            "apple ios",
            "tsara brashears",
            "ssl certificate",
            "elf collection",
            "cyberstalking",
            "spyware",
            "hackers",
            "installer",
            "open",
            "banker",
            "keylogger",
            "malicious",
            "hacktool",
            "core",
            "noname057",
            "generic malware",
            "safe site",
            "malware site",
            "iframe",
            "riskware",
            "exploit",
            "fakealert",
            "unsafe",
            "acint",
            "win64",
            "nircmd",
            "agent",
            "opencandy",
            "conduit",
            "swrort",
            "crack",
            "installpack",
            "xtrat",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "unruy",
            "filetour",
            "floxif",
            "cleaner",
            "patcher",
            "adload",
            "presenoker",
            "wacatac",
            "fusioncore",
            "genkryptik",
            "webtoolbar",
            "maltiverse",
            "smokeloader",
            "download json",
            "urls",
            "blacklist http",
            "kyriazhs1975",
            "vidar",
            "strike",
            "china cobalt",
            "meterpreter",
            "nanocore rat",
            "njrat",
            "redline stealer",
            "stealer",
            "nymaim",
            "mirai",
            "ghost rat",
            "runescape",
            "bradesco",
            "msil",
            "bladabindi",
            "orkut",
            "cutwail",
            "bandoo",
            "matsnu",
            "inmortal",
            "domains",
            "redline",
            "control server",
            "services",
            "generic",
            "br",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "squirrelwaffle",
            "soc http",
            "soc https",
            "back",
            "download csv",
            "json sample",
            "injector",
            "malicious url",
            "downldr",
            "covid19 scam",
            "historical ssl",
            "referrer",
            "contacted",
            "whois whois",
            "contacted urls",
            "whois sslcert",
            "threat roundup",
            "copy",
            "august",
            "execution",
            "ransomware",
            "gopher",
            "remcos",
            "attack",
            "radar ineractive",
            "paypal",
            "covid19",
            "phishing chase",
            "phishing google",
            "tracker malware",
            "chase personal",
            "banking",
            "javascript",
            "please",
            "cnc server",
            "tracker",
            "cnc feodo",
            "phishtank",
            "threats et",
            "name verdict",
            "falcon sandbox",
            "pattern match",
            "file",
            "ascii text",
            "indicator",
            "windows nt",
            "jpeg image",
            "appdata",
            "jfif standard",
            "script",
            "show",
            "date",
            "span",
            "unknown",
            "general",
            "hybrid",
            "local",
            "click",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "path",
            "http header",
            "tcp traffic",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "accept",
            "adware",
            "ip address",
            "hsbc",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "adaptivebee",
            "iobit",
            "trojanx",
            "webshell",
            "systweak",
            "behav",
            "tiggre",
            "runtime process",
            "sha256",
            "sha1",
            "mark brian sabey",
            "brian sabey",
            "sabey",
            "apple",
            "114.114.114.114",
            "attorney",
            "law",
            "spammer",
            "fraud service",
            "hallrender",
            "malvertizing",
            "cybercrime",
            "social engineering",
            "malware hosting",
            "cyber threat",
            "iphone unlocker",
            "malicious",
            "attacker",
            "tulach",
            "tulach.cc",
            "adult content",
            "child pornographer",
            "sabey data centers",
            "hall render denver",
            "monitoring",
            "stalker",
            "dev",
            "developer",
            "cyber harassment",
            "defacement",
            "death threats",
            "miner",
            "agenttesla",
            "trojan",
            "detplock",
            "networm",
            "rms",
            "sneaky server",
            "replacement",
            "unauthorized",
            "steam route",
            "tool",
            "probe",
            "safebae.org",
            "safebae",
            "daisy",
            "daisy coleman",
            "benjamin",
            "colorado",
            "missouri",
            "telefonica",
            "boost mobile",
            "blackievirus.com",
            "TrojanX",
            "metro t-mobile",
            "t-mobile",
            "mile high media",
            "CNC",
            "C2",
            "malware host",
            "yixun"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/a1b9247b6ad18f1cda0304e406333459d4000fced5753f91e5c046f6577c388a",
            "https://www.hallrender.com/attorney/brian-sabey",
            "safebae.org",
            "poemhunter.com",
            "http://www.hallrender.com/resources/blog/",
            "http://benjamin.xww.de/",
            "http://alohatube.xyz/search/tsara-brashears",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "Hybrid Analysis",
            "wTools",
            "Research"
          ],
          "public": 1,
          "adversary": "Tulach | Mark Brian Sabey | Hall Render Law Firm",
          "targeted_countries": [
            "United States of America",
            "Japan"
          ],
          "malware_families": [
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "BR",
              "display_name": "BR",
              "target": null
            },
            {
              "id": "Radar Ineractive",
              "display_name": "Radar Ineractive",
              "target": null
            },
            {
              "id": "HSBC",
              "display_name": "HSBC",
              "target": null
            },
            {
              "id": "RMS",
              "display_name": "RMS",
              "target": null
            },
            {
              "id": "Feodo Tracker",
              "display_name": "Feodo Tracker",
              "target": null
            },
            {
              "id": "Wacatac",
              "display_name": "Wacatac",
              "target": null
            },
            {
              "id": "Zpevdo",
              "display_name": "Zpevdo",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "OpenCandy",
              "display_name": "OpenCandy",
              "target": null
            },
            {
              "id": "xRAT",
              "display_name": "xRAT",
              "target": null
            },
            {
              "id": "Vidar",
              "display_name": "Vidar",
              "target": null
            },
            {
              "id": "Agent Tesla",
              "display_name": "Agent Tesla",
              "target": null
            },
            {
              "id": "noname057",
              "display_name": "noname057",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "DarkSide .Beware",
              "display_name": "DarkSide .Beware",
              "target": null
            },
            {
              "id": "Nymaim",
              "display_name": "Nymaim",
              "target": null
            },
            {
              "id": "SLFPER:BrowserModifier:Win32/MediaMagnet",
              "display_name": "SLFPER:BrowserModifier:Win32/MediaMagnet",
              "target": null
            },
            {
              "id": "Virut",
              "display_name": "Virut",
              "target": null
            },
            {
              "id": "Cutwail",
              "display_name": "Cutwail",
              "target": null
            },
            {
              "id": "Nanocore RAT",
              "display_name": "Nanocore RAT",
              "target": null
            },
            {
              "id": "Tulach Malware",
              "display_name": "Tulach Malware",
              "target": null
            },
            {
              "id": "SuppoBox",
              "display_name": "SuppoBox",
              "target": null
            },
            {
              "id": "Systweak",
              "display_name": "Systweak",
              "target": null
            },
            {
              "id": "Occamy",
              "display_name": "Occamy",
              "target": null
            },
            {
              "id": "Tiggre",
              "display_name": "Tiggre",
              "target": null
            },
            {
              "id": "IObit",
              "display_name": "IObit",
              "target": null
            },
            {
              "id": "Sality",
              "display_name": "Sality",
              "target": null
            },
            {
              "id": "FORMBOOK",
              "display_name": "FORMBOOK",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Yixun",
              "display_name": "Yixun",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1043",
              "name": "Commonly Used Port",
              "display_name": "T1043 - Commonly Used Port"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1179",
              "name": "Hooking",
              "display_name": "T1179 - Hooking"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            }
          ],
          "industries": [
            "Health"
          ],
          "TLP": "green",
          "cloned_from": "6544d9b0f9b23205eb355210",
          "export_count": 56,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1643,
            "hostname": 1438,
            "CVE": 30,
            "FileHash-MD5": 2853,
            "FileHash-SHA1": 1584,
            "FileHash-SHA256": 3001,
            "URL": 2904,
            "email": 1
          },
          "indicator_count": 13454,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "868 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6545a303731b2df439eb1a3b",
          "name": "Occamy Remote PC / Device Control",
          "description": "",
          "modified": "2023-12-03T06:04:06.473000",
          "created": "2023-11-04T01:48:51.255000",
          "tags": [
            "cisco umbrella",
            "site",
            "alexa top",
            "emotet",
            "telefonica co",
            "million",
            "malware",
            "detection list",
            "blacklist",
            "alexa",
            "installcore",
            "heur",
            "cyber threat",
            "united",
            "phishing",
            "engineering",
            "phishing site",
            "team phishing",
            "spammer",
            "malicious site",
            "team",
            "download",
            "cobalt strike",
            "facebook",
            "artemis",
            "pony",
            "binder",
            "suppobox",
            "virut",
            "ramnit",
            "dropper",
            "formbook",
            "azorult",
            "simda",
            "downloader",
            "service",
            "bank",
            "zbot",
            "trojanspy",
            "heodo",
            "hostname",
            "hostnames",
            "whois record",
            "kgs0",
            "kls0",
            "apple ios",
            "tsara brashears",
            "ssl certificate",
            "elf collection",
            "cyberstalking",
            "spyware",
            "hackers",
            "installer",
            "open",
            "banker",
            "keylogger",
            "malicious",
            "hacktool",
            "core",
            "noname057",
            "generic malware",
            "safe site",
            "malware site",
            "iframe",
            "riskware",
            "exploit",
            "fakealert",
            "unsafe",
            "acint",
            "win64",
            "nircmd",
            "agent",
            "opencandy",
            "conduit",
            "swrort",
            "crack",
            "installpack",
            "xtrat",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "unruy",
            "filetour",
            "floxif",
            "cleaner",
            "patcher",
            "adload",
            "presenoker",
            "wacatac",
            "fusioncore",
            "genkryptik",
            "webtoolbar",
            "maltiverse",
            "smokeloader",
            "download json",
            "urls",
            "blacklist http",
            "kyriazhs1975",
            "vidar",
            "strike",
            "china cobalt",
            "meterpreter",
            "nanocore rat",
            "njrat",
            "redline stealer",
            "stealer",
            "nymaim",
            "mirai",
            "ghost rat",
            "runescape",
            "bradesco",
            "msil",
            "bladabindi",
            "orkut",
            "cutwail",
            "bandoo",
            "matsnu",
            "inmortal",
            "domains",
            "redline",
            "control server",
            "services",
            "generic",
            "br",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "squirrelwaffle",
            "soc http",
            "soc https",
            "back",
            "download csv",
            "json sample",
            "injector",
            "malicious url",
            "downldr",
            "covid19 scam",
            "historical ssl",
            "referrer",
            "contacted",
            "whois whois",
            "contacted urls",
            "whois sslcert",
            "threat roundup",
            "copy",
            "august",
            "execution",
            "ransomware",
            "gopher",
            "remcos",
            "attack",
            "radar ineractive",
            "paypal",
            "covid19",
            "phishing chase",
            "phishing google",
            "tracker malware",
            "chase personal",
            "banking",
            "javascript",
            "please",
            "cnc server",
            "tracker",
            "cnc feodo",
            "phishtank",
            "threats et",
            "name verdict",
            "falcon sandbox",
            "pattern match",
            "file",
            "ascii text",
            "indicator",
            "windows nt",
            "jpeg image",
            "appdata",
            "jfif standard",
            "script",
            "show",
            "date",
            "span",
            "unknown",
            "general",
            "hybrid",
            "local",
            "click",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "path",
            "http header",
            "tcp traffic",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "accept",
            "adware",
            "ip address",
            "hsbc",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "adaptivebee",
            "iobit",
            "trojanx",
            "webshell",
            "systweak",
            "behav",
            "tiggre",
            "runtime process",
            "sha256",
            "sha1",
            "mark brian sabey",
            "brian sabey",
            "sabey",
            "apple",
            "114.114.114.114",
            "attorney",
            "law",
            "spammer",
            "fraud service",
            "hallrender",
            "malvertizing",
            "cybercrime",
            "social engineering",
            "malware hosting",
            "cyber threat",
            "iphone unlocker",
            "malicious",
            "attacker",
            "tulach",
            "tulach.cc",
            "adult content",
            "child pornographer",
            "sabey data centers",
            "hall render denver",
            "monitoring",
            "stalker",
            "dev",
            "developer",
            "cyber harassment",
            "defacement",
            "death threats",
            "miner",
            "agenttesla",
            "trojan",
            "detplock",
            "networm",
            "rms",
            "sneaky server",
            "replacement",
            "unauthorized",
            "steam route",
            "tool",
            "probe",
            "safebae.org",
            "safebae",
            "daisy",
            "daisy coleman",
            "benjamin",
            "colorado",
            "missouri",
            "telefonica",
            "boost mobile",
            "blackievirus.com",
            "TrojanX",
            "metro t-mobile",
            "t-mobile",
            "mile high media",
            "CNC",
            "C2",
            "malware host",
            "yixun"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/a1b9247b6ad18f1cda0304e406333459d4000fced5753f91e5c046f6577c388a",
            "https://www.hallrender.com/attorney/brian-sabey",
            "safebae.org",
            "poemhunter.com",
            "http://www.hallrender.com/resources/blog/",
            "http://benjamin.xww.de/",
            "http://alohatube.xyz/search/tsara-brashears",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "Hybrid Analysis",
            "wTools",
            "Research"
          ],
          "public": 1,
          "adversary": "Tulach | Mark Brian Sabey | Hall Render Law Firm",
          "targeted_countries": [
            "United States of America",
            "Japan"
          ],
          "malware_families": [
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "BR",
              "display_name": "BR",
              "target": null
            },
            {
              "id": "Radar Ineractive",
              "display_name": "Radar Ineractive",
              "target": null
            },
            {
              "id": "HSBC",
              "display_name": "HSBC",
              "target": null
            },
            {
              "id": "RMS",
              "display_name": "RMS",
              "target": null
            },
            {
              "id": "Feodo Tracker",
              "display_name": "Feodo Tracker",
              "target": null
            },
            {
              "id": "Wacatac",
              "display_name": "Wacatac",
              "target": null
            },
            {
              "id": "Zpevdo",
              "display_name": "Zpevdo",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "OpenCandy",
              "display_name": "OpenCandy",
              "target": null
            },
            {
              "id": "xRAT",
              "display_name": "xRAT",
              "target": null
            },
            {
              "id": "Vidar",
              "display_name": "Vidar",
              "target": null
            },
            {
              "id": "Agent Tesla",
              "display_name": "Agent Tesla",
              "target": null
            },
            {
              "id": "noname057",
              "display_name": "noname057",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "DarkSide .Beware",
              "display_name": "DarkSide .Beware",
              "target": null
            },
            {
              "id": "Nymaim",
              "display_name": "Nymaim",
              "target": null
            },
            {
              "id": "SLFPER:BrowserModifier:Win32/MediaMagnet",
              "display_name": "SLFPER:BrowserModifier:Win32/MediaMagnet",
              "target": null
            },
            {
              "id": "Virut",
              "display_name": "Virut",
              "target": null
            },
            {
              "id": "Cutwail",
              "display_name": "Cutwail",
              "target": null
            },
            {
              "id": "Nanocore RAT",
              "display_name": "Nanocore RAT",
              "target": null
            },
            {
              "id": "Tulach Malware",
              "display_name": "Tulach Malware",
              "target": null
            },
            {
              "id": "SuppoBox",
              "display_name": "SuppoBox",
              "target": null
            },
            {
              "id": "Systweak",
              "display_name": "Systweak",
              "target": null
            },
            {
              "id": "Occamy",
              "display_name": "Occamy",
              "target": null
            },
            {
              "id": "Tiggre",
              "display_name": "Tiggre",
              "target": null
            },
            {
              "id": "IObit",
              "display_name": "IObit",
              "target": null
            },
            {
              "id": "Sality",
              "display_name": "Sality",
              "target": null
            },
            {
              "id": "FORMBOOK",
              "display_name": "FORMBOOK",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Yixun",
              "display_name": "Yixun",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1043",
              "name": "Commonly Used Port",
              "display_name": "T1043 - Commonly Used Port"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1179",
              "name": "Hooking",
              "display_name": "T1179 - Hooking"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            }
          ],
          "industries": [
            "Health"
          ],
          "TLP": "green",
          "cloned_from": "6544c99af21a2fde7bd6927e",
          "export_count": 56,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 2,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1643,
            "hostname": 1438,
            "CVE": 30,
            "FileHash-MD5": 2853,
            "FileHash-SHA1": 1584,
            "FileHash-SHA256": 3001,
            "URL": 2904,
            "email": 1
          },
          "indicator_count": 13454,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 227,
          "modified_text": "868 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6545bda27bd3a147ebac71a8",
          "name": "CNC Feodo Tracker | Resources Hijacking by Attorney ",
          "description": "",
          "modified": "2023-12-03T06:04:06.473000",
          "created": "2023-11-04T03:42:26.978000",
          "tags": [
            "cisco umbrella",
            "site",
            "alexa top",
            "emotet",
            "telefonica co",
            "million",
            "malware",
            "detection list",
            "blacklist",
            "alexa",
            "installcore",
            "heur",
            "cyber threat",
            "united",
            "phishing",
            "engineering",
            "phishing site",
            "team phishing",
            "spammer",
            "malicious site",
            "team",
            "download",
            "cobalt strike",
            "facebook",
            "artemis",
            "pony",
            "binder",
            "suppobox",
            "virut",
            "ramnit",
            "dropper",
            "formbook",
            "azorult",
            "simda",
            "downloader",
            "service",
            "bank",
            "zbot",
            "trojanspy",
            "heodo",
            "hostname",
            "hostnames",
            "whois record",
            "kgs0",
            "kls0",
            "apple ios",
            "tsara brashears",
            "ssl certificate",
            "elf collection",
            "cyberstalking",
            "spyware",
            "hackers",
            "installer",
            "open",
            "banker",
            "keylogger",
            "malicious",
            "hacktool",
            "core",
            "noname057",
            "generic malware",
            "safe site",
            "malware site",
            "iframe",
            "riskware",
            "exploit",
            "fakealert",
            "unsafe",
            "acint",
            "win64",
            "nircmd",
            "agent",
            "opencandy",
            "conduit",
            "swrort",
            "crack",
            "installpack",
            "xtrat",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "unruy",
            "filetour",
            "floxif",
            "cleaner",
            "patcher",
            "adload",
            "presenoker",
            "wacatac",
            "fusioncore",
            "genkryptik",
            "webtoolbar",
            "maltiverse",
            "smokeloader",
            "download json",
            "urls",
            "blacklist http",
            "kyriazhs1975",
            "vidar",
            "strike",
            "china cobalt",
            "meterpreter",
            "nanocore rat",
            "njrat",
            "redline stealer",
            "stealer",
            "nymaim",
            "mirai",
            "ghost rat",
            "runescape",
            "bradesco",
            "msil",
            "bladabindi",
            "orkut",
            "cutwail",
            "bandoo",
            "matsnu",
            "inmortal",
            "domains",
            "redline",
            "control server",
            "services",
            "generic",
            "br",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "squirrelwaffle",
            "soc http",
            "soc https",
            "back",
            "download csv",
            "json sample",
            "injector",
            "malicious url",
            "downldr",
            "covid19 scam",
            "historical ssl",
            "referrer",
            "contacted",
            "whois whois",
            "contacted urls",
            "whois sslcert",
            "threat roundup",
            "copy",
            "august",
            "execution",
            "ransomware",
            "gopher",
            "remcos",
            "attack",
            "radar ineractive",
            "paypal",
            "covid19",
            "phishing chase",
            "phishing google",
            "tracker malware",
            "chase personal",
            "banking",
            "javascript",
            "please",
            "cnc server",
            "tracker",
            "cnc feodo",
            "phishtank",
            "threats et",
            "name verdict",
            "falcon sandbox",
            "pattern match",
            "file",
            "ascii text",
            "indicator",
            "windows nt",
            "jpeg image",
            "appdata",
            "jfif standard",
            "script",
            "show",
            "date",
            "span",
            "unknown",
            "general",
            "hybrid",
            "local",
            "click",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "path",
            "http header",
            "tcp traffic",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "accept",
            "adware",
            "ip address",
            "hsbc",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "adaptivebee",
            "iobit",
            "trojanx",
            "webshell",
            "systweak",
            "behav",
            "tiggre",
            "runtime process",
            "sha256",
            "sha1",
            "mark brian sabey",
            "brian sabey",
            "sabey",
            "apple",
            "114.114.114.114",
            "attorney",
            "law",
            "spammer",
            "fraud service",
            "hallrender",
            "malvertizing",
            "cybercrime",
            "social engineering",
            "malware hosting",
            "cyber threat",
            "iphone unlocker",
            "malicious",
            "attacker",
            "tulach",
            "tulach.cc",
            "adult content",
            "child pornographer",
            "sabey data centers",
            "hall render denver",
            "monitoring",
            "stalker",
            "dev",
            "developer",
            "cyber harassment",
            "defacement",
            "death threats",
            "miner",
            "agenttesla",
            "trojan",
            "detplock",
            "networm",
            "rms",
            "sneaky server",
            "replacement",
            "unauthorized",
            "steam route",
            "tool",
            "probe",
            "safebae.org",
            "safebae",
            "daisy",
            "daisy coleman",
            "benjamin",
            "colorado",
            "missouri",
            "telefonica",
            "boost mobile",
            "blackievirus.com",
            "TrojanX",
            "metro t-mobile",
            "t-mobile",
            "mile high media",
            "CNC",
            "C2",
            "malware host",
            "yixun"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/a1b9247b6ad18f1cda0304e406333459d4000fced5753f91e5c046f6577c388a",
            "https://www.hallrender.com/attorney/brian-sabey",
            "safebae.org",
            "poemhunter.com",
            "http://www.hallrender.com/resources/blog/",
            "http://benjamin.xww.de/",
            "http://alohatube.xyz/search/tsara-brashears",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "Hybrid Analysis",
            "wTools",
            "Research"
          ],
          "public": 1,
          "adversary": "Tulach | Mark Brian Sabey | Hall Render Law Firm",
          "targeted_countries": [
            "United States of America",
            "Japan"
          ],
          "malware_families": [
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "BR",
              "display_name": "BR",
              "target": null
            },
            {
              "id": "Radar Ineractive",
              "display_name": "Radar Ineractive",
              "target": null
            },
            {
              "id": "HSBC",
              "display_name": "HSBC",
              "target": null
            },
            {
              "id": "RMS",
              "display_name": "RMS",
              "target": null
            },
            {
              "id": "Feodo Tracker",
              "display_name": "Feodo Tracker",
              "target": null
            },
            {
              "id": "Wacatac",
              "display_name": "Wacatac",
              "target": null
            },
            {
              "id": "Zpevdo",
              "display_name": "Zpevdo",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "OpenCandy",
              "display_name": "OpenCandy",
              "target": null
            },
            {
              "id": "xRAT",
              "display_name": "xRAT",
              "target": null
            },
            {
              "id": "Vidar",
              "display_name": "Vidar",
              "target": null
            },
            {
              "id": "Agent Tesla",
              "display_name": "Agent Tesla",
              "target": null
            },
            {
              "id": "noname057",
              "display_name": "noname057",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "DarkSide .Beware",
              "display_name": "DarkSide .Beware",
              "target": null
            },
            {
              "id": "Nymaim",
              "display_name": "Nymaim",
              "target": null
            },
            {
              "id": "SLFPER:BrowserModifier:Win32/MediaMagnet",
              "display_name": "SLFPER:BrowserModifier:Win32/MediaMagnet",
              "target": null
            },
            {
              "id": "Virut",
              "display_name": "Virut",
              "target": null
            },
            {
              "id": "Cutwail",
              "display_name": "Cutwail",
              "target": null
            },
            {
              "id": "Nanocore RAT",
              "display_name": "Nanocore RAT",
              "target": null
            },
            {
              "id": "Tulach Malware",
              "display_name": "Tulach Malware",
              "target": null
            },
            {
              "id": "SuppoBox",
              "display_name": "SuppoBox",
              "target": null
            },
            {
              "id": "Systweak",
              "display_name": "Systweak",
              "target": null
            },
            {
              "id": "Occamy",
              "display_name": "Occamy",
              "target": null
            },
            {
              "id": "Tiggre",
              "display_name": "Tiggre",
              "target": null
            },
            {
              "id": "IObit",
              "display_name": "IObit",
              "target": null
            },
            {
              "id": "Sality",
              "display_name": "Sality",
              "target": null
            },
            {
              "id": "FORMBOOK",
              "display_name": "FORMBOOK",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Yixun",
              "display_name": "Yixun",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1043",
              "name": "Commonly Used Port",
              "display_name": "T1043 - Commonly Used Port"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1179",
              "name": "Hooking",
              "display_name": "T1179 - Hooking"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            }
          ],
          "industries": [
            "Health"
          ],
          "TLP": "green",
          "cloned_from": "6544d9b0f9b23205eb355210",
          "export_count": 57,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1643,
            "hostname": 1438,
            "CVE": 30,
            "FileHash-MD5": 2853,
            "FileHash-SHA1": 1584,
            "FileHash-SHA256": 3001,
            "URL": 2904,
            "email": 1
          },
          "indicator_count": 13454,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "868 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "656a94d1bdedd646afda170d",
          "name": "Resources Hijacking by Attorney 11_03_2023",
          "description": "",
          "modified": "2023-12-03T06:04:06.473000",
          "created": "2023-12-02T02:22:09.814000",
          "tags": [
            "cisco umbrella",
            "site",
            "alexa top",
            "emotet",
            "telefonica co",
            "million",
            "malware",
            "detection list",
            "blacklist",
            "alexa",
            "installcore",
            "heur",
            "cyber threat",
            "united",
            "phishing",
            "engineering",
            "phishing site",
            "team phishing",
            "spammer",
            "malicious site",
            "team",
            "download",
            "cobalt strike",
            "facebook",
            "artemis",
            "pony",
            "binder",
            "suppobox",
            "virut",
            "ramnit",
            "dropper",
            "formbook",
            "azorult",
            "simda",
            "downloader",
            "service",
            "bank",
            "zbot",
            "trojanspy",
            "heodo",
            "hostname",
            "hostnames",
            "whois record",
            "kgs0",
            "kls0",
            "apple ios",
            "tsara brashears",
            "ssl certificate",
            "elf collection",
            "cyberstalking",
            "spyware",
            "hackers",
            "installer",
            "open",
            "banker",
            "keylogger",
            "malicious",
            "hacktool",
            "core",
            "noname057",
            "generic malware",
            "safe site",
            "malware site",
            "iframe",
            "riskware",
            "exploit",
            "fakealert",
            "unsafe",
            "acint",
            "win64",
            "nircmd",
            "agent",
            "opencandy",
            "conduit",
            "swrort",
            "crack",
            "installpack",
            "xtrat",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "unruy",
            "filetour",
            "floxif",
            "cleaner",
            "patcher",
            "adload",
            "presenoker",
            "wacatac",
            "fusioncore",
            "genkryptik",
            "webtoolbar",
            "maltiverse",
            "smokeloader",
            "download json",
            "urls",
            "blacklist http",
            "kyriazhs1975",
            "vidar",
            "strike",
            "china cobalt",
            "meterpreter",
            "nanocore rat",
            "njrat",
            "redline stealer",
            "stealer",
            "nymaim",
            "mirai",
            "ghost rat",
            "runescape",
            "bradesco",
            "msil",
            "bladabindi",
            "orkut",
            "cutwail",
            "bandoo",
            "matsnu",
            "inmortal",
            "domains",
            "redline",
            "control server",
            "services",
            "generic",
            "br",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "squirrelwaffle",
            "soc http",
            "soc https",
            "back",
            "download csv",
            "json sample",
            "injector",
            "malicious url",
            "downldr",
            "covid19 scam",
            "historical ssl",
            "referrer",
            "contacted",
            "whois whois",
            "contacted urls",
            "whois sslcert",
            "threat roundup",
            "copy",
            "august",
            "execution",
            "ransomware",
            "gopher",
            "remcos",
            "attack",
            "radar ineractive",
            "paypal",
            "covid19",
            "phishing chase",
            "phishing google",
            "tracker malware",
            "chase personal",
            "banking",
            "javascript",
            "please",
            "cnc server",
            "tracker",
            "cnc feodo",
            "phishtank",
            "threats et",
            "name verdict",
            "falcon sandbox",
            "pattern match",
            "file",
            "ascii text",
            "indicator",
            "windows nt",
            "jpeg image",
            "appdata",
            "jfif standard",
            "script",
            "show",
            "date",
            "span",
            "unknown",
            "general",
            "hybrid",
            "local",
            "click",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "path",
            "http header",
            "tcp traffic",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "accept",
            "adware",
            "ip address",
            "hsbc",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "adaptivebee",
            "iobit",
            "trojanx",
            "webshell",
            "systweak",
            "behav",
            "tiggre",
            "runtime process",
            "sha256",
            "sha1",
            "mark brian sabey",
            "brian sabey",
            "sabey",
            "apple",
            "114.114.114.114",
            "attorney",
            "law",
            "spammer",
            "fraud service",
            "hallrender",
            "malvertizing",
            "cybercrime",
            "social engineering",
            "malware hosting",
            "cyber threat",
            "iphone unlocker",
            "malicious",
            "attacker",
            "tulach",
            "tulach.cc",
            "adult content",
            "child pornographer",
            "sabey data centers",
            "hall render denver",
            "monitoring",
            "stalker",
            "dev",
            "developer",
            "cyber harassment",
            "defacement",
            "death threats",
            "miner",
            "agenttesla",
            "trojan",
            "detplock",
            "networm",
            "rms",
            "sneaky server",
            "replacement",
            "unauthorized",
            "steam route",
            "tool",
            "probe",
            "safebae.org",
            "safebae",
            "daisy",
            "daisy coleman",
            "benjamin",
            "colorado",
            "missouri",
            "telefonica",
            "boost mobile",
            "blackievirus.com",
            "TrojanX",
            "metro t-mobile",
            "t-mobile",
            "mile high media",
            "CNC",
            "C2",
            "malware host",
            "yixun"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/a1b9247b6ad18f1cda0304e406333459d4000fced5753f91e5c046f6577c388a",
            "https://www.hallrender.com/attorney/brian-sabey",
            "safebae.org",
            "poemhunter.com",
            "http://www.hallrender.com/resources/blog/",
            "http://benjamin.xww.de/",
            "http://alohatube.xyz/search/tsara-brashears",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
            "Hybrid Analysis",
            "wTools",
            "Research"
          ],
          "public": 1,
          "adversary": "Tulach | Mark Brian Sabey | Hall Render Law Firm",
          "targeted_countries": [
            "United States of America",
            "Japan"
          ],
          "malware_families": [
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "Inmortal",
              "display_name": "Inmortal",
              "target": null
            },
            {
              "id": "Domains",
              "display_name": "Domains",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "BR",
              "display_name": "BR",
              "target": null
            },
            {
              "id": "Radar Ineractive",
              "display_name": "Radar Ineractive",
              "target": null
            },
            {
              "id": "HSBC",
              "display_name": "HSBC",
              "target": null
            },
            {
              "id": "RMS",
              "display_name": "RMS",
              "target": null
            },
            {
              "id": "Feodo Tracker",
              "display_name": "Feodo Tracker",
              "target": null
            },
            {
              "id": "Wacatac",
              "display_name": "Wacatac",
              "target": null
            },
            {
              "id": "Zpevdo",
              "display_name": "Zpevdo",
              "target": null
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "OpenCandy",
              "display_name": "OpenCandy",
              "target": null
            },
            {
              "id": "xRAT",
              "display_name": "xRAT",
              "target": null
            },
            {
              "id": "Vidar",
              "display_name": "Vidar",
              "target": null
            },
            {
              "id": "Agent Tesla",
              "display_name": "Agent Tesla",
              "target": null
            },
            {
              "id": "noname057",
              "display_name": "noname057",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "DarkSide .Beware",
              "display_name": "DarkSide .Beware",
              "target": null
            },
            {
              "id": "Nymaim",
              "display_name": "Nymaim",
              "target": null
            },
            {
              "id": "SLFPER:BrowserModifier:Win32/MediaMagnet",
              "display_name": "SLFPER:BrowserModifier:Win32/MediaMagnet",
              "target": null
            },
            {
              "id": "Virut",
              "display_name": "Virut",
              "target": null
            },
            {
              "id": "Cutwail",
              "display_name": "Cutwail",
              "target": null
            },
            {
              "id": "Nanocore RAT",
              "display_name": "Nanocore RAT",
              "target": null
            },
            {
              "id": "Tulach Malware",
              "display_name": "Tulach Malware",
              "target": null
            },
            {
              "id": "SuppoBox",
              "display_name": "SuppoBox",
              "target": null
            },
            {
              "id": "Systweak",
              "display_name": "Systweak",
              "target": null
            },
            {
              "id": "Occamy",
              "display_name": "Occamy",
              "target": null
            },
            {
              "id": "Tiggre",
              "display_name": "Tiggre",
              "target": null
            },
            {
              "id": "IObit",
              "display_name": "IObit",
              "target": null
            },
            {
              "id": "Sality",
              "display_name": "Sality",
              "target": null
            },
            {
              "id": "FORMBOOK",
              "display_name": "FORMBOOK",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Yixun",
              "display_name": "Yixun",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1496",
              "name": "Resource Hijacking",
              "display_name": "T1496 - Resource Hijacking"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1043",
              "name": "Commonly Used Port",
              "display_name": "T1043 - Commonly Used Port"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1179",
              "name": "Hooking",
              "display_name": "T1179 - Hooking"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            }
          ],
          "industries": [
            "Health"
          ],
          "TLP": "green",
          "cloned_from": "6544d9b0f9b23205eb355210",
          "export_count": 34,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1643,
            "hostname": 1438,
            "CVE": 30,
            "FileHash-MD5": 2853,
            "FileHash-SHA1": 1584,
            "FileHash-SHA256": 3001,
            "URL": 2904,
            "email": 1
          },
          "indicator_count": 13454,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "868 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6545be6e02e0f9f82cb1febf",
          "name": "Vawtrak credential stealer | CNC",
          "description": "",
          "modified": "2023-11-30T07:01:37.424000",
          "created": "2023-11-04T03:45:50.234000",
          "tags": [
            "contacted",
            "resolutions",
            "origin1",
            "ip address",
            "list",
            "communicating",
            "cyber threat",
            "united",
            "phishing",
            "phishing site",
            "covid19",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "detection list",
            "installcore",
            "nymaim",
            "suppobox",
            "malicious",
            "cisco umbrella",
            "site",
            "alexa top",
            "million",
            "safe site",
            "malware",
            "malware site",
            "malicious site",
            "heur",
            "exploit",
            "alexa",
            "riskware",
            "team",
            "blacklist https",
            "blacklist",
            "facebook",
            "engineering",
            "iframe",
            "downloader",
            "unsafe",
            "artemis",
            "trojanx",
            "agent",
            "unruy",
            "win64",
            "fakealert",
            "fusioncore",
            "redirector",
            "killav",
            "trojan",
            "lokibot",
            "emotet",
            "redline stealer",
            "cobalt strike",
            "citadel",
            "vawtrak",
            "qakbot",
            "qbot",
            "bankerx",
            "dropper",
            "nimda",
            "formbook",
            "swrort",
            "adwind",
            "crack",
            "generic",
            "wacatac",
            "opencandy",
            "nircmd",
            "downldr",
            "filetour",
            "cleaner",
            "conduit",
            "tiggre",
            "presenoker",
            "zpevdo",
            "webcompanion",
            "seraph",
            "tofsee",
            "xrat",
            "xtrat",
            "patcher",
            "adload",
            "stealer",
            "vidar",
            "raccoon",
            "bank",
            "urls",
            "generic malware",
            "noname057",
            "reimer",
            "agency",
            "charles",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "name verdict",
            "date",
            "root ca",
            "markmonitor",
            "name server",
            "windir",
            "unknown",
            "swisscom root",
            "post root",
            "trust",
            "hybrid",
            "general",
            "click",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "defence",
            "fraud",
            "logistics",
            "ipv4",
            "scan endpoints",
            "all search",
            "otx octoseek",
            "report spam",
            "author",
            "cyber warfare",
            "created",
            "months ago",
            "modified",
            "next",
            "url https",
            "url http",
            "all octoseek",
            "month ago",
            "utmsourcemailer",
            "ck id",
            "t1140",
            "filehashsha256",
            "keylogger",
            "sample path",
            "Miles IT"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "65413ea960cc79abf6d446fb",
          "export_count": 86,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 166,
            "FileHash-SHA1": 125,
            "FileHash-SHA256": 5688,
            "URL": 15015,
            "domain": 3262,
            "hostname": 4687,
            "CVE": 16,
            "email": 8
          },
          "indicator_count": 28967,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "871 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65413ea960cc79abf6d446fb",
          "name": "Vawtrak credential stealer | CNC",
          "description": "Cyber warfare\nTracking\nMonitoring\nMalvertizing\nCNC\nKeylogging\nBotNet\nSever Privacy Invasion",
          "modified": "2023-11-30T07:01:37.424000",
          "created": "2023-10-31T17:51:37.016000",
          "tags": [
            "contacted",
            "resolutions",
            "origin1",
            "ip address",
            "list",
            "communicating",
            "cyber threat",
            "united",
            "phishing",
            "phishing site",
            "covid19",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "detection list",
            "installcore",
            "nymaim",
            "suppobox",
            "malicious",
            "cisco umbrella",
            "site",
            "alexa top",
            "million",
            "safe site",
            "malware",
            "malware site",
            "malicious site",
            "heur",
            "exploit",
            "alexa",
            "riskware",
            "team",
            "blacklist https",
            "blacklist",
            "facebook",
            "engineering",
            "iframe",
            "downloader",
            "unsafe",
            "artemis",
            "trojanx",
            "agent",
            "unruy",
            "win64",
            "fakealert",
            "fusioncore",
            "redirector",
            "killav",
            "trojan",
            "lokibot",
            "emotet",
            "redline stealer",
            "cobalt strike",
            "citadel",
            "vawtrak",
            "qakbot",
            "qbot",
            "bankerx",
            "dropper",
            "nimda",
            "formbook",
            "swrort",
            "adwind",
            "crack",
            "generic",
            "wacatac",
            "opencandy",
            "nircmd",
            "downldr",
            "filetour",
            "cleaner",
            "conduit",
            "tiggre",
            "presenoker",
            "zpevdo",
            "webcompanion",
            "seraph",
            "tofsee",
            "xrat",
            "xtrat",
            "patcher",
            "adload",
            "stealer",
            "vidar",
            "raccoon",
            "bank",
            "urls",
            "generic malware",
            "noname057",
            "reimer",
            "agency",
            "charles",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "name verdict",
            "date",
            "root ca",
            "markmonitor",
            "name server",
            "windir",
            "unknown",
            "swisscom root",
            "post root",
            "trust",
            "hybrid",
            "general",
            "click",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "defence",
            "fraud",
            "logistics",
            "ipv4",
            "scan endpoints",
            "all search",
            "otx octoseek",
            "report spam",
            "author",
            "cyber warfare",
            "created",
            "months ago",
            "modified",
            "next",
            "url https",
            "url http",
            "all octoseek",
            "month ago",
            "utmsourcemailer",
            "ck id",
            "t1140",
            "filehashsha256",
            "keylogger",
            "sample path",
            "Miles IT"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 74,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 166,
            "FileHash-SHA1": 125,
            "FileHash-SHA256": 5688,
            "URL": 15015,
            "domain": 3262,
            "hostname": 4687,
            "CVE": 16,
            "email": 8
          },
          "indicator_count": 28967,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "871 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "654136c8e530066ae793dc64",
          "name": "Cyber Espionage",
          "description": "Cyber warfare. Extravagant attack that includes, phishing, monitoring, spyware, tracking, remote vehicle tracking, API calls after identification of anything computerized; car, phone, mobile phone, mail, ups, television. Apple private data services nr-data.net. This may be a Honeypot. Interesting. Attacker alleging to be a  government contractor actively attacks and porn smears alleged SA victim assaulted by someone with his last name. Coincidence or Honeypot?\nTarget still at risk.\nTarget again is Tsara Brashears. \nSevere privacy invasion.\nShhhh....Active Silencing",
          "modified": "2023-11-30T07:01:37.424000",
          "created": "2023-10-31T17:18:00.623000",
          "tags": [
            "contacted",
            "resolutions",
            "origin1",
            "ip address",
            "list",
            "communicating",
            "cyber threat",
            "united",
            "phishing",
            "phishing site",
            "covid19",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "detection list",
            "installcore",
            "nymaim",
            "suppobox",
            "malicious",
            "cisco umbrella",
            "site",
            "alexa top",
            "million",
            "safe site",
            "malware",
            "malware site",
            "malicious site",
            "heur",
            "exploit",
            "alexa",
            "riskware",
            "team",
            "blacklist https",
            "blacklist",
            "facebook",
            "engineering",
            "iframe",
            "downloader",
            "unsafe",
            "artemis",
            "trojanx",
            "agent",
            "unruy",
            "win64",
            "fakealert",
            "fusioncore",
            "redirector",
            "killav",
            "trojan",
            "lokibot",
            "emotet",
            "redline stealer",
            "cobalt strike",
            "citadel",
            "vawtrak",
            "qakbot",
            "qbot",
            "bankerx",
            "dropper",
            "nimda",
            "formbook",
            "swrort",
            "adwind",
            "crack",
            "generic",
            "wacatac",
            "opencandy",
            "nircmd",
            "downldr",
            "filetour",
            "cleaner",
            "conduit",
            "tiggre",
            "presenoker",
            "zpevdo",
            "webcompanion",
            "seraph",
            "tofsee",
            "xrat",
            "xtrat",
            "patcher",
            "adload",
            "stealer",
            "vidar",
            "raccoon",
            "bank",
            "urls",
            "generic malware",
            "noname057",
            "reimer",
            "agency",
            "charles",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "name verdict",
            "date",
            "root ca",
            "markmonitor",
            "name server",
            "windir",
            "unknown",
            "swisscom root",
            "post root",
            "trust",
            "hybrid",
            "general",
            "click",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "defence",
            "fraud",
            "logistics",
            "ipv4",
            "scan endpoints",
            "all search",
            "otx octoseek",
            "report spam",
            "author",
            "cyber warfare",
            "created",
            "months ago",
            "modified",
            "next",
            "url https",
            "url http",
            "all octoseek",
            "month ago",
            "utmsourcemailer",
            "ck id",
            "t1140",
            "filehashsha256",
            "tsara brashears",
            "adult content",
            "pornography",
            "malvertizing",
            "privacy invasion",
            "privilege escalation",
            "packed",
            "aig.com",
            "aig.rastreator.mx",
            "apple",
            "ios",
            "tracking",
            "monitoring",
            "nr-data.net",
            "asp.net"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            }
          ],
          "industries": [
            "Defense",
            "Government"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 69,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 166,
            "FileHash-SHA1": 125,
            "FileHash-SHA256": 5806,
            "URL": 16475,
            "domain": 3302,
            "hostname": 5135,
            "CVE": 16,
            "email": 8
          },
          "indicator_count": 31033,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "871 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "wTools",
        "https://metro-tmo.com/",
        "Yara detected: Reads CPU information from /proc indicative of miner or evasive malware Compliance",
        "https://www.filescan.io/uploads/666d69ff6b8dba248b414767",
        "Crowdsourced IDS rules: 6b81d548c0fbd7a2275bb0d29deca0de96c1584ce7aadaf4f5dac3cb28ee9c29",
        "Win.Malware.Salat-10058846-0",
        "http://117-114-251-162-static.reverse.queryfoundry.net/ - queryfoundry.net",
        "TELNET SUSPICIOUS Path to BusyBox\", TELNET login failed\", is__elf \u007fELF dead_host",
        "YARA Rules",
        "https://www.google.com/?authuser=0",
        "103.246.145.111 phishing",
        "https://www.hallrender.com/attorney/brian-sabey",
        "tx-p2p-pull.video-voip.com.dorm.com",
        "https://colocrossing.com/ \u2022 https://www.colocrossing.com/colocation\t l",
        "https://twitter.com/PORNO_SEXYBABES",
        "https://polling.portal.gov.bd/js/npop.script.js",
        "Matches rule ET INFO Observed Cloudflare DNS over HTTPS Domain (cloudflare-dns .com in TLS SNI) Unique rule identifier: This rule belongs to a private collection.",
        "http://emrd.gov.bd/dead.php",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d00356dd8f43b723a915a",
        "https://www.youtube.com/watch?v=bJWJbOqg9cM - Falsely flagged to demonetize and not rank",
        "https://www.colorfulbox.jp/",
        "\"Nobody Love\" Tori Kelley \"'m the One\" DJ Khaled ft Justin Bieber (Pirated Hook)",
        "cdn-185-199-108-133.github.com",
        "BitRAT CnC: File Hash SHA256 23d60876953677ed4627f3449661dc549c0f747adb4b082078dac90d60ae7706",
        "OTX AlienVault",
        "Yara Detections is__elf",
        "https://viz.greynoise.io/query/AS60068%20classification:%22malicious%22",
        "a.nel.cloudflare.com / api.w.org",
        "http://titasgas.portal.gov.bd/dead.php",
        "Matches rule ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io)",
        "https://www.virustotal.com/graph/embed/gf1d5aa209c7f4fd086e4cb17dcd0af52421ea4bae87d49fe9b4076b382612f0e?theme=dark",
        "94.130.71.173 [scanning host]",
        "http://www.hallrender.com/resources/blog/",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d00975ea31558d54fceea",
        "ET Telnet |  https://www.colocrossing.com | velocity servers",
        "IP\u2019s Contacted 178.249.97.99  178.249.97.98  178.249.97.23  84.53.172.74  88.221.104.82",
        "https://tria.ge/240517-vdwb5shc71/behavioral1",
        "tvapp-server.de",
        "I apologize if you don\u2019t like my background stories",
        "Zercega \u2022  ootheca.pw",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d0107b44401771de9ebf2",
        "Alerts: queries_computer_name queries_keyboard_layout queries_locale_api",
        "https://tria.ge/240521-q4s79agb25/static1",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian | OS & iOS Password and Password Cracker",
        "Worked at some studios attacked by Lazarus Group who allegedly attacked Sony Music",
        "https://www.filescan.io/uploads/664bb40fbc04dffa92240ca2/reports/398074f2-c7b6-40e9-9b5c-4225cc990473/overview",
        "https://ladys.one/xxx/a-tsara-brashears-zafira-porn",
        "https://www.filescan.io/uploads/664ba368d5c40bffee63b1ee/reports/31817751-6b5d-45df-8813-472aa6c756a3/overview",
        "meta.com \u2022 meta.com.apple",
        "https://apple.k8s.joewa.com/\u2022 https://com.apple \u2022 freedns.afraid.org",
        "Matches rule Windows_API_Function from ruleset Windows_API_Function by InQuest Labs",
        "Research",
        "Matches rule Suspicious DNS Query for IP Lookup Service APIs by Brandon George (blog post), Thomas Patzke",
        "8-25-220-162-static.reverse.queryfoundry.net",
        "http://cabinet.gov.bd/dead.php",
        "https://www.wordfence.com/blog/2022/10/threat-advisory-monitoring-cve-2022-42889-text4shell-exploit-attempts/",
        "Matches rule ET INFO External IP Check (checkip .amazonaws .com)",
        "miles.ns.cloudflare.com",
        "Domains Contacted: accounts.google.com chrome.cloudflare-dns.com clients2.googleusercontent.com",
        "IP\u2019s Contacted: 142.250.147.101  88.221.104.56  13.33.141.29  35.186.249.72  151.101.1.192",
        "ww.google.com.uy",
        "Malware Hosting * Spyware: http://141.98.6.249/boat.arm7,  http://141.98.6.249/boat.ppc , http://141.98.6.249/boat.x86",
        "Data Analysis",
        "IP : 54.192.29.164",
        "IPv4 198.54.117.218 command_and_control",
        "https://prometheussteakhouse.lupi.delivery/ Thanks! I\u2019m heavy into Picinha. 2 Brazilian roasts please!",
        "https://imp0rtp3.wordpress.com/2021/08/12/tetris/",
        "https://www.rmvictimlaw.org/about-us/board-directors/hazel-heckers",
        "https://www.hybrid-analysis.com/sample/c0c84df54b890bb408fc2289f1e75a29991127bbe207aa30042616b5ea150342/655d9af5679c7afcc409895e",
        "Yara Detections is__elf ,  ELFHighEntropy ,  elf_empty_sections",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [phishing]",
        "https://tria.ge/240517-vqxezaaa33/behavioral1",
        "Thor Scan: S-I9VvMTB6cZU",
        "https://www.virustotal.com/en/domain/sipa.be (GoodCop - BadCop 404 error. This may have been a dorkingbeauty graph or collection. There seems to be several VT users experiencing similar issues w/overlap",
        "www.anyxxxtube.net",
        "https://sitereport.netcraft.com/?url=http://ualberta.ca",
        "Alerts: antisandbox_unhook hardware_id_profiling ntdll_memory_unhooking binary_yara",
        "https://rexxfield.com [ hmmm...inc.legal] is Alienvault a subsidiary of Rexxfields unwarranted investigation/spy campaign? Confused",
        "104.21.51.140, 172.67.181.41",
        "https://www.virustotal.com/gui/collection/b84a19d60ec7cd6d546a3f145dff8987128d0f499161118b46de22718d4713cd/iocs",
        "https://www.hudsonrock.com/search?domain=ualberta.ca",
        "https://itunes.apple.com/app/apple-store/id284815942/us/app/samsung-galaxy-watch-gear-s/id1117310635 (Apple remote hacktool that enter via Apple media)",
        "louisianarooflawyers.com [phishing| songculture.com redirect , compromised by threat actors]",
        "https://www.filescan.io/uploads/664799c9d5c40bffee6106d7",
        "Matches rule Adobe_XMP_Identifier from ruleset Adobe_XMP_Identifier by InQuest Labs",
        "185.199.108.133",
        "/etc/systemd/system/geomi.service File type: ASCII text",
        "Alerts: resumethread_remote_process enumerates_running_processes reads_self",
        "Alerts: recon _fingerprint registers_vectored_exception_handler creates_suspended_process",
        "103.246.145.111 [malware]",
        "http://www.objectaid.com/update/current/p2.index [AIN Phishing IOC's]",
        "(legitimate services will remain up-and-running usually) High |  ID dead_host",
        "hasownproperty.call",
        "Matches rule ET POLICY External IP Lookup ipinfo.io",
        "Michael Roberts Australia, Germany, Iowa, New York Friend of Ben",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/664f906322f5af13cdfb50be",
        "geomi.service \u2022 74b23c7dc3cca50a6d78e18116e31ca189a4549de35ff49903af2c4c0bd06a63",
        "https://www.akhaltsikhe.gov.ge/ | GMT Server LiteSpeed location",
        "https://otx.alienvault.com/indicator/url/https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian [ Walker | Apple Password Cracker]",
        "(TLI did you do her that dirty?) Why\u2019SCS\u2019? Pure shame on you.",
        "Alerts: dynamic_function_loading ipc_namedpipe  createtoolhelp32snapshot_module_enumeration",
        "IPv4 199.59.243.224  and  IPv4 67.21.93.249 - command_and_control",
        "https://brandyallen.com/2022/11/23/sexy",
        "https://polling.portal.gov.bd/js/npc.script.js",
        "IDS Detections SUSPICIOUS Path to BusyBox TELNET login failed Bad Login",
        "https://d3jjg4nf4bbybe.cloudfront.net/u/210425/397f80d871fe6dla1704cela4b712e387ed8a48a/large/kedence-out-of-my-sight",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d01d2b67682d81c00f37b - https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d01d2b67682d81c00f37b = Hidden Apps - Enterprise Apps List",
        "SRC URL : http://dl.frostwire.com/frostwire/5.3.9/frostwire-5.3.9.windows.exe",
        "https://tria.ge/240517-vc7c1shc62/behavioral1",
        "louisianarooflawyers.com         [phishing]",
        "https://otx.alienvault.com/indicator/hostname/00000000.apple.com#:~:text=%C3%97",
        "https://www.criminalip.io/domain/report?scan_id=13798622",
        "Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually)",
        "safebae.org",
        "IPv4 198.54.117.211 command_and_control",
        "Matches rule SERVER-OTHER Squid HTTP Vary response header denial of service attempt",
        "UrlVoid",
        "https://www.filescan.io/uploads/664bb683bc04dffa92241015/reports/92b70fd6-97d7-4386-8465-f3fd79043843/overview",
        "https://www.couriermail.com.au/ipad/custody-bid-strands-family/news-story/23c2c9a5fc984edc04d29655c641f484",
        "Zercega \u2022 IPv4 84.54.51.82",
        "https://alohatube.xyz/search/sex-mom-dog-animal",
        "Detections Win.Packed.ImminentMonitorRAT-9892275-0 ,  HackTool:MSIL/Boilod.C!bit",
        "AppRegistrationList.csv",
        "zeustracker.abuse.ch",
        "https://viz.greynoise.io/query/AS15169%20classification:%22malicious%22",
        "https://urlscan.io/search/#ualberta.ca",
        "There is money in the industry for well established , \u2018souled\u2019 out artists. It\u2019s a racket! T signed & exited early",
        "https://hybrid-analysis.com/sample/a1b9247b6ad18f1cda0304e406333459d4000fced5753f91e5c046f6577c388a",
        "https://wallpapers-nature.com/tsara-brashears/urlscan-io",
        "Alerts dead_host network_icmp tcp_syn_scan nolookup_communication nids_alert writes_to_stdout",
        "Alerts: procmem_yara injection_inter_process ransomware_file_modifications stack_pivot",
        "https://tenantresolution.pingcastle.com/Search - Tenant still active (07.19.24) - Good jobs ya'll",
        "screencasts.rexxfield.com",
        "m.pornsexer.xxx.3.1.adiosfil.roksit.net",
        "https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
        "AS : AS16509 Amazon.com, Inc",
        "http://benjamin.xww.de/",
        "http://www.bing.lt/search?q=",
        "Hybrid Analysis",
        "Any.run",
        "Urlscan",
        "\u2193Interesting\u2193",
        "poemhunter.com",
        "IPv4 188.114.96.1 In CDN range: provider=cloudflare \u2022 dns.google \u2022 push.apple.com",
        "More information: https://www.nextron-systems.com/notes-on-virustotal-matches/",
        "Malware Hosting: IPv4 185.199.108.133, 185.199.109.133, 185.199.110.133, 185.199.111.133",
        "All - EnterpriseAppsList.csv",
        "https://www.filescan.io/uploads/66479b483313f70f0afe3dbb",
        "http://103.246.145.111/gateonl.php?hwid=WALKER-PC-WALKER&cpuname=Intel [Apple exploit]",
        "https://otx.alienvault.com/indicator/url/https://www.bleepingcomputer.com/forums/t/268006/wormmalware-that-kills-run-system-restore-regedit/ [ phishing attack directed towards Tsara Brashears]",
        "IPv4 198.54.117.217 command_and_control",
        "https://www.colocrossing.com/",
        "alohatube.xyz",
        "Yara detected: Xmrig cryptocurrency miner",
        "frostwire-5.3.9.windows.exe",
        "http://appleid.apple.com.msg206.site/   http://www.icloud.com.msg206.site/   https://appleid.apple.com.msg206.site/",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667cffec5ea31558d54fcda2",
        "https://viz.greynoise.io/analysis/e51d9a15-d802-4d51-9a70-17803dc2693a",
        "ELF:Mirai-GH\\ [Trj] ,  Unix.Trojan.DarkNexus-7679166-0",
        "https://www.virustotal.com/gui/collection/b84a19d60ec7cd6d546a3f145dff8987128d0f499161118b46de22718d4713cd/summary",
        "Crowdsourced IDS rules:",
        "http://nhrc.portal.gov.bd/sites/default/files/files/nhrc.portal.gov.bd/page/348ec5eb_22f8_4754_bb62_6a0d15ba1513/Study-Report-on-Sexual-Offences_Final.pdf",
        "http://mincom.gov.bd/dead.php",
        "http://t.trkitok.com/track/rep?oid=2001&st=1&id=DP2441--w1VJE427J8SGGRTP02MD7UEG___93737493-c08b-4dc7-ad30-b17a2c09e771___$mid",
        "RULE_LINK: https://valhalla.nextron-systems.com/info/rule/SUSP_JS_Command",
        "https://songculture.com/tsara-brashears-music | Cloudfront below was attached to body of work",
        "https://www.virustotal.com/graph/embed/g9453a2f58a3340f18120987c2b4d710dbb44ded88c434abf8894458a98c7bd4b?theme=dark",
        "https://alohatube.xyz/search/tsara-brashears",
        "https://viz.greynoise.io/analysis/9635144c-db8f-47ab-a83a-5785602244cf - 07.03.24",
        "usw2-platform-dmchat-avengers-prod-ext.apple.com",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667cff1a5ea31558d54fcbf6",
        "https://viz.greynoise.io/analysis/33e9b33b-b932-4c43-9be1-3e2d6f9cb4b3",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "In all seriousness. The severity of  injuries and outcomes 1 victim had is aligned cyber attacks by Q.Gov",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [text, email, collection]",
        "https://www.endgamesystems.com/\t This is not a game. This is about people\u2019s lives",
        "music.apple.com \u2022 linktr.ee \u2022 sentient.industries?  samsara has been showing up often.",
        "Matches rule UPX from ruleset UPX by kevoreilly",
        "https://otx.alienvault.com/indicator/file/23d60876953677ed4627f3449661dc549c0f747adb4b082078dac90d60ae7706#:~:text=%C3%97",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d01d2b67682d81c00f37b",
        "https://app-portal.wsgc.com/saml20/idp/sso?SAMLRequest=jZFBb8IwDIX/SpR70zS0sEa0iA1NQ2IagrLDLlNII4jWJl2cwvj3qyhI7IJ2tPzs9/x5PPmpK3RQDrQ1GY4IxUgZaUttdhneFM/BA57kYxB1xRo+bf3erNR3q8CjbtAA7zsZbp3hVoAGbkStgHvJ19PXBWeE8sZZb6WtMJoCKOc7qydroK2VWyt30FJtVosM771vgIfhETTZCvkF3roTkXtnjZaVIqBk67Q/hUICRrMugzbCn3NfR0XTBI11XlTkCDtJpK3Dc0Ia6rIJASxG81mGP0dpOYqGVEZxGYkk3iaDVMZMKipGMR0kSScDaNXcgBfGZ5hRNghoGrC4YIzTlNMhidPkA6Pl5bhHbXpo90hsexHwl6JYBsu3dYHR+xV+J8AX1Pzs7m4Z318srmBx/m+M4/DWK7+Uf7+c/wI=&RelayState=AcE8QCtmc3hl5id4ZjN8p",
        "IPv4 198.54.117.215 command_and_control",
        "IDS Detections: Observed Cloudflare DNS over HTTPS Domain (cloudflare-dns .com in TLS SNI)",
        "Dr.Web violence/adult content (False) ThreatSeeker social web - youtube",
        "x.ss2.us",
        "IPv4 198.54.117.210 command_and_control",
        "distracted-chebyshev.84-54-51-82.plesk.page \u2022 domain plesk.page",
        "stealth_file cape_detected_threat injection_process_hollowing antiav_detectfile  injection_runpe",
        "Zercega \u2022  http://bot.hamsterrace.space:5966/",
        "https://viz.greynoise.io/query/AS36351%20classification:%22malicious%22",
        "https://www.virustotal.com/gui/collection/0ca12fcdd125ec5a5055180ee828b98d47b8b2e920660be559c2b602266b6b1d/iocs",
        "phishing-campaign-cloudstation-eu-west-98.githubusercontent.com [phishing]",
        "https://www.filescan.io/uploads/664bb0cd7c9fb1468fc610c5/reports/00c78e4d-2156-4906-a106-ebf7e2723251/overview",
        "nr-data.net [Apple Private Data Collection]",
        "98cc05d9c12c214deadfe71af22cd3862e7417c0 [backdoor | PPI User-Agent (InstallCapital)]",
        "https://www.assurant.com/?utm_source=email&utm_medium=email&utm_campaign=Mobile_Transactional_withad&utm_content=Deductible+Charge+Acknowledgement+PD-MB&utm_term= [Mobile transactional with ads/ malicious]",
        "www.akhaltsikhe.gov.ge [Germany?]",
        "apple-securityiphone-icloud.com",
        "This is hard to comprehend or put into indelible words.",
        "Contacted:  188.114.96.1 Domains Contacted dns.google",
        "CVE-2023-22518\tCVE-2018-10562\t CVE-2024-6387\tCVE-2025-20393",
        "Alienvault OTX",
        "https://www.filescan.io/uploads/664ba8a20663ff3c2ec6428a/reports/09d3d82a-7ec1-4804-93e5-5ae691fbb7f2/overview",
        "\u2018Passin\u2019 I deleted the pulses you asked me to. Your links were malicious. I haven\u2019t weaponize anything  I\u2019ve learned... yet",
        "Yara Detections: MacSync_AppleScript_Stealer",
        "https://www.filescan.io/uploads/666d69ff6b8dba248b414767/reports/dda2c8a1-96fd-4c00-9cbc-c64c4685a804/overview",
        "https://otx.alienvault.com/indicator/ip/185.199.108.133",
        "https://rexxfield.com/",
        "https://www.virustotal.com/gui/collection/b84a19d60ec7cd6d546a3f145dff8987128d0f499161118b46de22718d4713cd/graph",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "http://park.above.com/jr.php?gz=DjDNgvDQ0WlpBALxevxSvkF3jBH95b5riUvmgFjb1tbPDV06suYFlRcPA34ufLE5UZ8spiM7ya7tRXR8nLUgk920DSaIXniiR5hkoveznG%20mez7OU5R%20HKIczV475LuRwxm3J1pcRSpQcePtF/4aD%20frLO%205mYc0Maj8Z1IwBeAMESc9Gk3BzCkGUHNVeCAZ9vZrQhEeVvN%20QVBAu1boZNJTnvCAP0lB5ebMSP92bFHD/ItyL53LoVDSYWMd64KTNMMJaXE0kZVqQn/%20STriQbrA6cmW3Xj4sAJ3XXEbNNJzTbIvgsy00PlKWInEUK/iXzVecaBsXg3vkUcvkeM3HPPIajaBexXO7ATYz/qTeKAksI9l2IoDAsn0S9BYCTuP8uTYdgJAv0LO%20MkNBOrSqJnFQzTlNxG4NRSP6K4VDWklVPpCwQc/s/AfrwIdLcdrV6CQDLaluG1naOjXDc",
        "https://viz.greynoise.io/query/AS8075%20classification:%22malicious%22",
        "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net [BitCoinAussie ?]",
        "https://hybrid-analysis.com/sample/1f75fd5ec731cc5b1f338a5f7f44b42c9f1988214c373bf582d766934399b525",
        "Alerts: packer_unknown_pe_section_name script_tool_executed",
        "REFERENCE: https://goo.gl/hXbwiV",
        "Zercega \u2022  multi-user.target",
        "ELF contains segments with high entropy indicating compressed/encrypted content",
        "Alerts: cape_extracted_content infostealer_cookies recon_fingerprint powershell_download",
        "nr-data.net | Apple Private Data collection",
        "Matches rule Local System Accounts Discovery - Linux by Alejandro Ortuno, oscd.community",
        "Michael Roberts - murder suspect, victim, hacker, PI",
        "https://ms13p01if-qufw21344001.ms.if.apple.com:8083/",
        "http://updates.voicemailaccess.net/b0f6a00b15311023",
        "https://otx.alienvault.com/indicator/url/https://media.toxtren.com/redirect.aspx?pid=272789&&bid=1971&&lpid=2119&&subid=18b8dh9scxi7sbl11f&&sref=inhousecpa&&inhousecpa=Kiev_Dima_BR_Setki",
        "ransomwaretracker.abuse.ch",
        "Above Malcore Strings: All - EnterpriseAppsList, AppRegistration, EnterpriseAppslist, exportGroup, exportUsers, HiddenApps - EnterpriseAppsList****",
        "http://alohatube.xyz/search/tsara-brashears",
        "http://watchhers.net/index.php",
        "Matches rule Suspicious Network Connection to IP Lookup Service APIs by Janantha Marasinghe, Nasreddine Bencherchali (Nextron Systems)",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/664f906222f5af13cdfb5093",
        "https://tria.ge/240517-t9pc2ahb2t",
        "103.246.145.111  - scanning host",
        "00000000.apple.com  | remote SIM Swap",
        "Alerts: antidebug_setunhandledexceptionfilter stealth_timeout language_check_registry",
        "polling.portal.gov.bd",
        "www.pornhub.com [New Relic | nr-data.net | Apple Private Data Collection]",
        "IPv4 198.54.117.212 command_and_control"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": []
        },
        "other": {
          "adversary": [
            "Tulach | Mark Brian Sabey | Hall Render Law Firm"
          ],
          "malware_families": [
            "Cve-2014-2321",
            "Squirrelwaffle",
            "Br",
            "Ransom:win32/wannacrypt.a!rsm",
            "Backdoor:msil/bladabindi",
            "Trojanspy:win32/nivdort",
            "Virut",
            "Irata",
            "Ratel",
            "Alf:pua:win32/opencandy",
            "Noname057",
            "Webtoolbar",
            "Et",
            "Trojan:win32/installcore",
            "Ghost rat",
            "Hall render",
            "Babulya/collectorstealer user-agent",
            "Autoit",
            "Mimikatz",
            "Evo",
            "Adware.opencandy",
            "Cobalt strike",
            "Bazaar loader",
            "Wannacry kill switch",
            "Ransom",
            "Inmortal",
            "Win32:malware-gen",
            "Artemis",
            "Malware gen",
            "Rms",
            "Virtool",
            "Maltiverse",
            "Unix.trojan.darknexus-7679166-0",
            "Botnet",
            "Win.packed.kkrunchy-7049457-1",
            "Trojan:win32/wacatac",
            "Agent tesla",
            "Formbook",
            "Zergeca",
            "Trojandownloader:o97m/bazaloader",
            "Trojanclicker",
            "Tiggre",
            "Domains",
            "Racoon stealer",
            "Silk road",
            "Tofsee",
            "185.199.108.133.malware_host",
            "Feodo tracker",
            "Win.malware.downloadguide-6803841-0",
            "Hsbc",
            "Win.malware.salat-10058846-0",
            "Worm:win32/fesber.a",
            "Systweak",
            "Alf:hstr:hacktool:extremeinjector.s01",
            "Win32/ispen badnews fake user-agent",
            "Alf:jasyp:trojandownloader:win32/smallagent!",
            "Hacktool",
            "Ransomexx",
            "Ramnit",
            "Cobalt strike - s0154",
            "Mitre attack",
            "Cve-2024-6387",
            "Pony - s0453",
            "#lowfi:hstr:trojanspy:win32/xtrat",
            "Emotet",
            "Zpevdo",
            "Alf:heraklezeval:softwarebundler:win32/prepscram",
            "Trojandownloader:win32/upatre.a",
            "Trojanspy:win32/bradesco",
            "Beach research",
            "#lowfi:fop:virtool:win32/injector",
            "Alf:heraklezeval:trojan:bat/musecador",
            "Kraddare",
            "Virtool:msil/obfuscator.bv",
            "Detplock",
            "Worm:vbs/dapato",
            "Cve-2018-10562",
            "Trojandropper:vbs/swrort",
            "Azorult",
            "Alf:base64encodefunctionmonitorw",
            "Backdoor:win32/outbreak",
            "Blacknet",
            "Cve-2025-20393",
            "Lumma",
            "Virus:dos/metro",
            "Quasar rat",
            "Backdoor:win32/zbot",
            "Slfper:browsermodifier:win32/mediamagnet",
            "Trojanspy",
            "Multios.coinminer.miner-6781728-2",
            "Cutwail",
            "Malware",
            "Alfper:installcapital",
            "Trojan:win32/qbot.r!mtb",
            "Nivdort",
            "Zbot",
            "Mirai",
            "Redline stealer",
            "Installbrain",
            "Alf:pua:win32/fusioncore",
            "Swort",
            "Alf:heraklezeval:trojanclicker:js/faceliker",
            "Generic",
            "Trojan.mirai/genericrxui",
            "Hacktool:msil/boilod.c!bit",
            "Darkside .beware",
            "Win.trojan.tofsee-7102058-0\tbackdoor:win32/tofsee.t",
            "Iobit",
            "Alf:heraklezeval:pua:win32/spyrixkeylogger",
            "Yixun",
            "Occamy",
            "Worm:win32/autorun!atmn",
            "Alf:trojan:o97m/emotet",
            "Nymaim",
            "Nanocore rat",
            "Tulach malware",
            "Ransom:win32/g and crab!rfn",
            "!#hstr:win32/spectorsoft",
            "Redline",
            "Opencandy",
            "Virtool:msil/cryptinject.cf!mtb",
            "Radar ineractive",
            "Sality",
            "Alf:heraklezeval:trojan:win32/agenttesla!rfn",
            "Suppobox",
            "Win.trojan.emotet-9850453-0",
            "Cve-2023-22518",
            "Wacatac",
            "Backdoor:win32/wabot.a",
            "Vidar",
            "Installcore",
            "Win.malware.generic-9820446-0",
            "Lolkek",
            "Malvertizing",
            "Xrat",
            "Metro",
            "Ghandi",
            "Magic",
            "Njrat - s0385",
            "Blacknet rat"
          ],
          "industries": [
            "Gas",
            "Civil society",
            "Health",
            "Entertainment",
            "Insurance",
            "Media",
            "Technology",
            "Education",
            "Telecommunications",
            "Healthcare",
            "Food",
            "Government",
            "Defense"
          ]
        }
      }
    },
    "false_positive": []
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 50,
  "pulses": [
    {
      "id": "69e434769e2a43c088066ca2",
      "name": "Kraddare \u2022 Agent Tesla \u2022 CVE Jar clone credit octoseek",
      "description": "",
      "modified": "2026-04-19T07:36:41.138000",
      "created": "2026-04-19T01:48:38.335000",
      "tags": [
        "heur",
        "cisco umbrella",
        "site",
        "alexa top",
        "malware",
        "million",
        "xcnfe",
        "maltiverse",
        "malware site",
        "safe site",
        "malicious",
        "trojan",
        "artemis",
        "vidar",
        "redline stealer",
        "raccoon",
        "keylogger",
        "riskware",
        "agent tesla",
        "remcos",
        "stealer",
        "miner",
        "hacktool",
        "bank",
        "agenttesla",
        "agent",
        "unknown",
        "downloader",
        "unsafe",
        "detplock",
        "networm",
        "win64",
        "service",
        "smokeloader",
        "dropper",
        "crack",
        "alexa",
        "trojanspy",
        "detection list",
        "blacklist https",
        "kyriazhs1975",
        "noname057",
        "tag count",
        "threat report",
        "ip summary",
        "url summary",
        "summary",
        "sample",
        "samples",
        "blacklist",
        "cyber threat",
        "united",
        "engineering",
        "phishing",
        "covid19",
        "facebook",
        "phishing site",
        "paypal",
        "njrat",
        "emotet",
        "nanocore rat",
        "meterpreter",
        "azorult",
        "download",
        "msil",
        "bladabindi",
        "mirai",
        "pony",
        "nanocore",
        "bradesco",
        "cobalt strike",
        "cve201711882",
        "redline",
        "ssl certificate",
        "tsara brashears",
        "cyberstalking",
        "spyware",
        "apple ios",
        "quasar",
        "ransomware",
        "malware norad",
        "cry kill",
        "attack",
        "installer",
        "formbook",
        "lockbit",
        "open",
        "banker",
        "bazarloader",
        "core",
        "ransomexx",
        "name verdict",
        "pattern match",
        "et tor",
        "known tor",
        "relayrouter",
        "exit",
        "node traffic",
        "misc attack",
        "script",
        "beginstring",
        "ascii text",
        "null",
        "date",
        "error",
        "span",
        "refresh",
        "class",
        "generator",
        "critical",
        "body",
        "look",
        "verify",
        "restart",
        "meta",
        "hybrid",
        "general",
        "click",
        "strings",
        "tools",
        "as141773",
        "as63932",
        "moved",
        "passive dns",
        "search",
        "entries",
        "gmt content",
        "type",
        "keep alive",
        "scan endpoints",
        "all octoseek",
        "pulse pulses",
        "as17806 mango",
        "blacklist http",
        "phishtank",
        "malicious site",
        "apple",
        "blockchain",
        "runescape",
        "twitter",
        "qakbot",
        "asyncrat",
        "team",
        "internet storm",
        "generic",
        "union",
        "bazaloader",
        "media",
        "generic malware",
        "hostname",
        "suppobox",
        "netwire rc",
        "installcore",
        "conduit",
        "iobit",
        "mediaget",
        "outbreak",
        "acint",
        "installpack",
        "phish",
        "rostpay",
        "fakeinstaller",
        "spyrixkeylogger",
        "bitminer",
        "loadmoney",
        "filetour",
        "wacatac",
        "fusioncore",
        "dapato",
        "cleaner",
        "softonic",
        "encpk",
        "qbot",
        "predator",
        "swrort",
        "kraddare",
        "systweak",
        "dllinject",
        "driverpack",
        "iframe",
        "downldr",
        "presenoker",
        "as61317",
        "asnone united",
        "urls",
        "files",
        "next",
        "as15169 google",
        "japan unknown",
        "as17506 arteria",
        "as32244 liquid",
        "as49505",
        "russia unknown",
        "expired",
        "domain",
        "falcon",
        "as19969",
        "ipv4",
        "ransom",
        "encrypt",
        "file",
        "windows nt",
        "indicator",
        "response",
        "appdata",
        "gmt contenttype",
        "png image",
        "local",
        "contacted",
        "fali malicious",
        "dropped",
        "communicating",
        "referrer",
        "fali contacted",
        "silk road",
        "immediate",
        "cymulate2",
        "tsara brashears",
        "malvertizing"
      ],
      "references": [
        "https://wallpapers-nature.com/tsara-brashears/urlscan-io",
        "alohatube.xyz",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "http://alohatube.xyz/search/tsara-brashears",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "ww.google.com.uy",
        "https://alohatube.xyz/search/tsara-brashears",
        "https://wallpapers-nature.com/%20tsara-brashears/urlscan-io",
        "https://polling.portal.gov.bd/js/npc.script.js",
        "polling.portal.gov.bd",
        "https://polling.portal.gov.bd/js/npop.script.js",
        "http://watchhers.net/index.php",
        "https://brandyallen.com/2022/11/23/sexy",
        "m.pornsexer.xxx.3.1.adiosfil.roksit.net",
        "http://park.above.com/jr.php?gz=DjDNgvDQ0WlpBALxevxSvkF3jBH95b5riUvmgFjb1tbPDV06suYFlRcPA34ufLE5UZ8spiM7ya7tRXR8nLUgk920DSaIXniiR5hkoveznG%20mez7OU5R%20HKIczV475LuRwxm3J1pcRSpQcePtF/4aD%20frLO%205mYc0Maj8Z1IwBeAMESc9Gk3BzCkGUHNVeCAZ9vZrQhEeVvN%20QVBAu1boZNJTnvCAP0lB5ebMSP92bFHD/ItyL53LoVDSYWMd64KTNMMJaXE0kZVqQn/%20STriQbrA6cmW3Xj4sAJ3XXEbNNJzTbIvgsy00PlKWInEUK/iXzVecaBsXg3vkUcvkeM3HPPIajaBexXO7ATYz/qTeKAksI9l2IoDAsn0S9BYCTuP8uTYdgJAv0LO%20MkNBOrSqJnFQzTlNxG4NRSP6K4VDWklVPpCwQc/s/AfrwIdLcdrV6CQDLaluG1naOjXDc",
        "http://nhrc.portal.gov.bd/sites/default/files/files/nhrc.portal.gov.bd/page/348ec5eb_22f8_4754_bb62_6a0d15ba1513/Study-Report-on-Sexual-Offences_Final.pdf",
        "https://twitter.com/PORNO_SEXYBABES",
        "https://alohatube.xyz/search/sex-mom-dog-animal",
        "https://www.colorfulbox.jp/",
        "Hybrid Analysis",
        "Any.run",
        "OTX AlienVault",
        "Urlscan",
        "UrlVoid",
        "http://emrd.gov.bd/dead.php",
        "http://titasgas.portal.gov.bd/dead.php",
        "http://mincom.gov.bd/dead.php",
        "http://cabinet.gov.bd/dead.php"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Malaysia",
        "Bangladesh"
      ],
      "malware_families": [
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "RedLine",
          "display_name": "RedLine",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "Racoon Stealer",
          "display_name": "Racoon Stealer",
          "target": null
        },
        {
          "id": "Ransomexx",
          "display_name": "Ransomexx",
          "target": null
        },
        {
          "id": "Quasar RAT",
          "display_name": "Quasar RAT",
          "target": null
        },
        {
          "id": "njRAT - S0385",
          "display_name": "njRAT - S0385",
          "target": null
        },
        {
          "id": "FormBook",
          "display_name": "FormBook",
          "target": null
        },
        {
          "id": "Bazaar Loader",
          "display_name": "Bazaar Loader",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "Detplock",
          "display_name": "Detplock",
          "target": null
        },
        {
          "id": "WannaCry Kill Switch",
          "display_name": "WannaCry Kill Switch",
          "target": null
        },
        {
          "id": "Ghandi",
          "display_name": "Ghandi",
          "target": null
        },
        {
          "id": "Systweak",
          "display_name": "Systweak",
          "target": null
        },
        {
          "id": "Swort",
          "display_name": "Swort",
          "target": null
        },
        {
          "id": "Silk Road",
          "display_name": "Silk Road",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:PUA:Win32/SpyrixKeylogger",
          "display_name": "ALF:HeraklezEval:PUA:Win32/SpyrixKeylogger",
          "target": null
        },
        {
          "id": "Trojan:Win32/Wacatac",
          "display_name": "Trojan:Win32/Wacatac",
          "target": "/malware/Trojan:Win32/Wacatac"
        },
        {
          "id": "RansomEXX",
          "display_name": "RansomEXX",
          "target": null
        },
        {
          "id": "noname057",
          "display_name": "noname057",
          "target": null
        },
        {
          "id": "Nanocore RAT",
          "display_name": "Nanocore RAT",
          "target": null
        },
        {
          "id": "Worm:VBS/Dapato",
          "display_name": "Worm:VBS/Dapato",
          "target": "/malware/Worm:VBS/Dapato"
        },
        {
          "id": "Kraddare",
          "display_name": "Kraddare",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1110",
          "name": "Brute Force",
          "display_name": "T1110 - Brute Force"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1571",
          "name": "Non-Standard Port",
          "display_name": "T1571 - Non-Standard Port"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        },
        {
          "id": "T1491",
          "name": "Defacement",
          "display_name": "T1491 - Defacement"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "654a7a53317c717d1f4fee7f",
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 2522,
        "FileHash-SHA1": 862,
        "FileHash-SHA256": 2855,
        "URL": 7963,
        "domain": 1168,
        "hostname": 3181,
        "CVE": 13,
        "email": 2,
        "IPv4": 1
      },
      "indicator_count": 18567,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 47,
      "modified_text": "15 hours ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "69e1d9cd805ecfc463bed935",
      "name": "BlackNet RAT clone credit octoseek",
      "description": "",
      "modified": "2026-04-18T00:51:09.427000",
      "created": "2026-04-17T06:57:17.378000",
      "tags": [
        "united",
        "heur",
        "bank",
        "covid19 scam",
        "anonymizer",
        "malicious site",
        "telefonica peru",
        "cyber threat",
        "proxy",
        "malware",
        "phishing",
        "zbot",
        "suppobox",
        "team",
        "trojanx",
        "service",
        "facebook",
        "win64",
        "trojan",
        "artemis",
        "cisco umbrella",
        "site",
        "alexa top",
        "million",
        "safe site",
        "engineering",
        "download",
        "microsoft",
        "generic",
        "union",
        "bazaloader",
        "media",
        "runescape",
        "blacklist https",
        "generic malware",
        "metro",
        "tmobile",
        "on us",
        "mls season",
        "home internet",
        "shop",
        "autopay",
        "free",
        "metro store",
        "limit",
        "pass",
        "close",
        "galaxy",
        "easy",
        "back",
        "stream",
        "find",
        "twitter",
        "intnavfnav",
        "conditions",
        "service url",
        "search live",
        "api blog",
        "docs pricing",
        "september",
        "instagram url",
        "facebook url",
        "value",
        "variables",
        "visitor object",
        "alpine object",
        "cookies",
        "taq boolean",
        "get h2",
        "kb script",
        "b xhr",
        "post h2",
        "frame",
        "b image",
        "kb image",
        "redirect chain",
        "frame c0bc",
        "kb stylesheet",
        "covid19",
        "phishing site",
        "malicious",
        "cve201711882",
        "cobalt strike",
        "squirrelwaffle",
        "pony",
        "binder",
        "virut",
        "ramnit",
        "dropper",
        "formbook",
        "azorult",
        "bambernek",
        "alexa",
        "unsafe",
        "opencandy",
        "downldr",
        "irata",
        "dbatloader",
        "vidar",
        "outbreak",
        "downloader",
        "blocker",
        "ransom",
        "autoit",
        "bladabindi",
        "emotet",
        "blacknet rat",
        "stealer",
        "presenoker",
        "fusioncore",
        "cleaner",
        "wacatac",
        "riskware",
        "coinminer",
        "xrat",
        "swrort",
        "installcore",
        "trojanspy",
        "mbydkqdhtu0h",
        "pbiptbmvd0k4",
        "pbzpdldtg",
        "detection list",
        "glelexoputyh",
        "linkid252669",
        "s2okorbdpt2x",
        "el9km",
        "mtap2vnnnpj",
        "blacklist",
        "x22x22",
        "x22scriptx22",
        "x22dntx22",
        "date",
        "u002d2",
        "linkcode u002d",
        "srclang",
        "urllang",
        "srcurl",
        "qzid",
        "pattern match",
        "intnavtnav",
        "q0o0mahttp",
        "login",
        "windows nt",
        "bad traffic",
        "et info",
        "tls handshake",
        "failure",
        "http traffic",
        "http",
        "suricata alerts",
        "event category",
        "description sid",
        "external",
        "logo",
        "av detection",
        "default browser",
        "guest system",
        "professional",
        "general",
        "file",
        "get fwlink",
        "geckohost",
        "suidm",
        "edgev1",
        "srchdafnoform",
        "srchuidv2",
        "edgesf1",
        "malware site",
        "agent",
        "exploit",
        "mimikatz",
        "quasar rat",
        "iframe",
        "beach research",
        "sgeneric",
        "static engine",
        "umbrella",
        "malware service",
        "exploit source",
        "scanning host",
        "Command and Control",
        "malicious url",
        "team malicious",
        "tor known",
        "tor relayrouter",
        "exit",
        "node tcp",
        "traffic",
        "bad traffic"
      ],
      "references": [
        "https://metro-tmo.com/",
        "Hybrid Analysis",
        "Alienvault OTX",
        "Data Analysis"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "South Africa",
        "Japan"
      ],
      "malware_families": [
        {
          "id": "TrojanDownloader:O97M/BazaLoader",
          "display_name": "TrojanDownloader:O97M/BazaLoader",
          "target": "/malware/TrojanDownloader:O97M/BazaLoader"
        },
        {
          "id": "SuppoBox",
          "display_name": "SuppoBox",
          "target": null
        },
        {
          "id": "Backdoor:Win32/Zbot",
          "display_name": "Backdoor:Win32/Zbot",
          "target": "/malware/Backdoor:Win32/Zbot"
        },
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "Beach Research",
          "display_name": "Beach Research",
          "target": null
        },
        {
          "id": "BlackNET RAT",
          "display_name": "BlackNET RAT",
          "target": null
        },
        {
          "id": "Backdoor:MSIL/Bladabindi",
          "display_name": "Backdoor:MSIL/Bladabindi",
          "target": "/malware/Backdoor:MSIL/Bladabindi"
        },
        {
          "id": "FormBook",
          "display_name": "FormBook",
          "target": null
        },
        {
          "id": "MimiKatz",
          "display_name": "MimiKatz",
          "target": null
        },
        {
          "id": "Squirrelwaffle",
          "display_name": "Squirrelwaffle",
          "target": null
        },
        {
          "id": "Pony - S0453",
          "display_name": "Pony - S0453",
          "target": null
        },
        {
          "id": "TrojanDropper:VBS/Swrort",
          "display_name": "TrojanDropper:VBS/Swrort",
          "target": "/malware/TrojanDropper:VBS/Swrort"
        },
        {
          "id": "Quasar RAT",
          "display_name": "Quasar RAT",
          "target": null
        },
        {
          "id": "Virus:DOS/Metro",
          "display_name": "Virus:DOS/Metro",
          "target": "/malware/Virus:DOS/Metro"
        },
        {
          "id": "Metro",
          "display_name": "Metro",
          "target": null
        },
        {
          "id": "Virut",
          "display_name": "Virut",
          "target": null
        },
        {
          "id": "Vidar",
          "display_name": "Vidar",
          "target": null
        },
        {
          "id": "AZORult",
          "display_name": "AZORult",
          "target": null
        },
        {
          "id": "Ramnit",
          "display_name": "Ramnit",
          "target": null
        },
        {
          "id": "Backdoor:Win32/Outbreak",
          "display_name": "Backdoor:Win32/Outbreak",
          "target": "/malware/Backdoor:Win32/Outbreak"
        },
        {
          "id": "ALF:PUA:Win32/OpenCandy",
          "display_name": "ALF:PUA:Win32/OpenCandy",
          "target": null
        },
        {
          "id": "IRATA",
          "display_name": "IRATA",
          "target": null
        },
        {
          "id": "Artemis",
          "display_name": "Artemis",
          "target": null
        },
        {
          "id": "Cobalt Strike - S0154",
          "display_name": "Cobalt Strike - S0154",
          "target": null
        },
        {
          "id": "ALF:PUA:Win32/FusionCore",
          "display_name": "ALF:PUA:Win32/FusionCore",
          "target": null
        },
        {
          "id": "ALF:Trojan:O97M/Emotet",
          "display_name": "ALF:Trojan:O97M/Emotet",
          "target": null
        },
        {
          "id": "Trojan:Win32/InstallCore",
          "display_name": "Trojan:Win32/InstallCore",
          "target": "/malware/Trojan:Win32/InstallCore"
        }
      ],
      "attack_ids": [
        {
          "id": "T1550",
          "name": "Use Alternate Authentication Material",
          "display_name": "T1550 - Use Alternate Authentication Material"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1071.003",
          "name": "Mail Protocols",
          "display_name": "T1071.003 - Mail Protocols"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1560",
          "name": "Archive Collected Data",
          "display_name": "T1560 - Archive Collected Data"
        }
      ],
      "industries": [
        "Food",
        "Gas",
        "Entertainment"
      ],
      "TLP": "white",
      "cloned_from": "650d0c66e0b02a6dde4a8b7a",
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 781,
        "FileHash-SHA256": 3085,
        "domain": 528,
        "URL": 3130,
        "CVE": 6,
        "FileHash-MD5": 610,
        "FileHash-SHA1": 368
      },
      "indicator_count": 8508,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 49,
      "modified_text": "1 day ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "69d586108786e7be59439809",
      "name": "Bot.io",
      "description": "",
      "modified": "2026-04-07T22:32:48.996000",
      "created": "2026-04-07T22:32:48.996000",
      "tags": [
        "added active",
        "related pulses",
        "found",
        "zergeca botnet",
        "zergeca",
        "upx packer",
        "khtml",
        "gecko",
        "united",
        "ids detections",
        "yara detections",
        "https domain",
        "tls sni",
        "ip lookup",
        "external ip",
        "malware",
        "encrypt",
        "techniques",
        "modify system",
        "process",
        "https",
        "performs dns",
        "tls version",
        "reads cpu",
        "proc indicative",
        "urls",
        "downloads",
        "persistence",
        "data upload",
        "extraction",
        "find s",
        "failed",
        "typ don",
        "ipv4 url",
        "canreb",
        "type ipv4",
        "url domail",
        "domail showing",
        "elf conta",
        "typ url",
        "zercega",
        "enter sc",
        "type",
        "include",
        "review",
        "n1 exclude",
        "suggestedincc",
        "a50 typ",
        "ipv4",
        "matches yara",
        "dete data",
        "yara detectea",
        "cro intormation",
        "exclude sugges",
        "sc car",
        "extra lte",
        "referen",
        "l extraction",
        "droo anv",
        "extr referen",
        "lte all",
        "je matches",
        "yara detel",
        "yara dete",
        "include review",
        "exchange lte",
        "je elf",
        "passive dns",
        "certificate",
        "files",
        "trojan",
        "related tags",
        "worm",
        "medium",
        "write c",
        "write",
        "high",
        "binary",
        "yara rule",
        "default",
        "moved",
        "schaan",
        "as834 ipxo",
        "dynamicloader",
        "program",
        "ee fc",
        "users",
        "ff d5",
        "python",
        "windows",
        "autoit",
        "confuserex",
        "stream",
        "guard",
        "launcher",
        "updater",
        "global",
        "america flag",
        "ashburn",
        "america related",
        "tags",
        "indicator facts",
        "historical otx",
        "controller fake",
        "akamai rank",
        "russia",
        "present nov",
        "aaaa",
        "link",
        "a domains",
        "ip address",
        "meta",
        "cve -2014-2321",
        "handle",
        "address range",
        "cidr",
        "network name",
        "allocation type",
        "pa status",
        "whois server",
        "included iocs",
        "manually add",
        "iocs o",
        "iocs",
        "sugges",
        "stop show",
        "types",
        "external",
        "ripe",
        "pa abusec",
        "neterra",
        "sofia",
        "bulgaria phone",
        "filtered person",
        "neven dilkov",
        "bg phone",
        "filtered route",
        "a5ip",
        "aa2023",
        "aamirai",
        "a2scanner",
        "apple inc",
        "issuer",
        "valid",
        "algorit",
        "thum",
        "name",
        "a9 a8",
        "status",
        "macho",
        "macho 64bit",
        "mac os",
        "x macho",
        "intel",
        "typ no",
        "td td",
        "td tr",
        "a td",
        "dynamic dns",
        "date",
        "name servers",
        "arial",
        "error",
        "null",
        "enough",
        "hosts",
        "win32",
        "fast",
        "contacted",
        "MacSync_AppleScript_Stealer",
        "cve-2018-10562",
        "source",
        "roboto",
        "robotodraft",
        "helvetica",
        "iframe",
        "manually ada",
        "review iocs",
        "abv0",
        "qaeaav0",
        "cptbdev",
        "w4uninitialized",
        "qaeaav01",
        "abv01",
        "qaexn",
        "qbenxz",
        "phoneidentify",
        "qbepaxxz"
      ],
      "references": [
        "https://apple.k8s.joewa.com/\u2022 https://com.apple \u2022 freedns.afraid.org",
        "IPv4 188.114.96.1 In CDN range: provider=cloudflare \u2022 dns.google \u2022 push.apple.com",
        "Zercega \u2022 IPv4 84.54.51.82",
        "Zercega \u2022  http://bot.hamsterrace.space:5966/",
        "Zercega \u2022  multi-user.target",
        "Zercega \u2022  ootheca.pw",
        "CVE-2023-22518\tCVE-2018-10562\t CVE-2024-6387\tCVE-2025-20393",
        "Crowdsourced IDS rules: 6b81d548c0fbd7a2275bb0d29deca0de96c1584ce7aadaf4f5dac3cb28ee9c29",
        "Matches rule Suspicious DNS Query for IP Lookup Service APIs by Brandon George (blog post), Thomas Patzke",
        "Matches rule Suspicious Network Connection to IP Lookup Service APIs by Janantha Marasinghe, Nasreddine Bencherchali (Nextron Systems)",
        "Matches rule Local System Accounts Discovery - Linux by Alejandro Ortuno, oscd.community",
        "Crowdsourced IDS rules:",
        "Matches rule ET POLICY External IP Lookup ipinfo.io",
        "Matches rule ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io)",
        "Matches rule ET INFO External IP Check (checkip .amazonaws .com)",
        "Matches rule SERVER-OTHER Squid HTTP Vary response header denial of service attempt",
        "Matches rule ET INFO Observed Cloudflare DNS over HTTPS Domain (cloudflare-dns .com in TLS SNI) Unique rule identifier: This rule belongs to a private collection.",
        "Yara detected: Xmrig cryptocurrency miner",
        "Yara detected: Reads CPU information from /proc indicative of miner or evasive malware Compliance",
        "meta.com \u2022 meta.com.apple",
        "geomi.service \u2022 74b23c7dc3cca50a6d78e18116e31ca189a4549de35ff49903af2c4c0bd06a63",
        "ELF contains segments with high entropy indicating compressed/encrypted content",
        "/etc/systemd/system/geomi.service File type: ASCII text",
        "http://www.bing.lt/search?q=",
        "Win.Malware.Salat-10058846-0",
        "Yara Detections: MacSync_AppleScript_Stealer",
        "Alerts: antisandbox_unhook hardware_id_profiling ntdll_memory_unhooking binary_yara",
        "Alerts: recon _fingerprint registers_vectored_exception_handler creates_suspended_process",
        "Alerts: resumethread_remote_process enumerates_running_processes reads_self",
        "Alerts: packer_unknown_pe_section_name script_tool_executed",
        "Alerts: queries_computer_name queries_keyboard_layout queries_locale_api",
        "Alerts: antidebug_setunhandledexceptionfilter stealth_timeout language_check_registry",
        "Contacted:  188.114.96.1 Domains Contacted dns.google",
        "distracted-chebyshev.84-54-51-82.plesk.page \u2022 domain plesk.page"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Zergeca",
          "display_name": "Zergeca",
          "target": null
        },
        {
          "id": "AutoIT",
          "display_name": "AutoIT",
          "target": null
        },
        {
          "id": "Win.Malware.Salat-10058846-0",
          "display_name": "Win.Malware.Salat-10058846-0",
          "target": null
        },
        {
          "id": "ALF:JASYP:TrojanDownloader:Win32/SmallAgent!",
          "display_name": "ALF:JASYP:TrojanDownloader:Win32/SmallAgent!",
          "target": null
        },
        {
          "id": "Win.Trojan.Emotet-9850453-0",
          "display_name": "Win.Trojan.Emotet-9850453-0",
          "target": null
        },
        {
          "id": "Worm:Win32/AutoRun!atmn",
          "display_name": "Worm:Win32/AutoRun!atmn",
          "target": "/malware/Worm:Win32/AutoRun!atmn"
        },
        {
          "id": "Win.Trojan.Tofsee-7102058-0\tBackdoor:Win32/Tofsee.T",
          "display_name": "Win.Trojan.Tofsee-7102058-0\tBackdoor:Win32/Tofsee.T",
          "target": "/malware/Win.Trojan.Tofsee-7102058-0\tBackdoor:Win32/Tofsee.T"
        },
        {
          "id": "CVE-2023-22518",
          "display_name": "CVE-2023-22518",
          "target": null
        },
        {
          "id": "CVE-2024-6387",
          "display_name": "CVE-2024-6387",
          "target": null
        },
        {
          "id": "CVE-2025-20393",
          "display_name": "CVE-2025-20393",
          "target": null
        },
        {
          "id": "CVE-2014-2321",
          "display_name": "CVE-2014-2321",
          "target": null
        },
        {
          "id": "Botnet",
          "display_name": "Botnet",
          "target": null
        },
        {
          "id": "CVE-2018-10562",
          "display_name": "CVE-2018-10562",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1543",
          "name": "Create or Modify System Process",
          "display_name": "T1543 - Create or Modify System Process"
        },
        {
          "id": "TA0003",
          "name": "Persistence",
          "display_name": "TA0003 - Persistence"
        },
        {
          "id": "TA0004",
          "name": "Privilege Escalation",
          "display_name": "TA0004 - Privilege Escalation"
        },
        {
          "id": "T1543.002",
          "name": "Systemd Service",
          "display_name": "T1543.002 - Systemd Service"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "TA0005",
          "name": "Defense Evasion",
          "display_name": "TA0005 - Defense Evasion"
        },
        {
          "id": "T1222",
          "name": "File and Directory Permissions Modification",
          "display_name": "T1222 - File and Directory Permissions Modification"
        },
        {
          "id": "T1222.002",
          "name": "Linux and Mac File and Directory Permissions Modification",
          "display_name": "T1222.002 - Linux and Mac File and Directory Permissions Modification"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1003",
          "name": "OS Credential Dumping",
          "display_name": "T1003 - OS Credential Dumping"
        },
        {
          "id": "T1016",
          "name": "System Network Configuration Discovery",
          "display_name": "T1016 - System Network Configuration Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1095",
          "name": "Non-Application Layer Protocol",
          "display_name": "T1095 - Non-Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1571",
          "name": "Non-Standard Port",
          "display_name": "T1571 - Non-Standard Port"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1070.004",
          "name": "File Deletion",
          "display_name": "T1070.004 - File Deletion"
        },
        {
          "id": "T1518.001",
          "name": "Security Software Discovery",
          "display_name": "T1518.001 - Security Software Discovery"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1155",
          "name": "AppleScript",
          "display_name": "T1155 - AppleScript"
        },
        {
          "id": "T1037.002",
          "name": "Logon Script (Mac)",
          "display_name": "T1037.002 - Logon Script (Mac)"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "69d5859750dfad7fe7989ef4",
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "IPv4": 169,
        "URL": 1871,
        "domain": 393,
        "hostname": 925,
        "FileHash-MD5": 391,
        "FileHash-SHA1": 390,
        "FileHash-SHA256": 2452,
        "CVE": 1,
        "SSLCertFingerprint": 1,
        "IPv6": 9,
        "email": 4,
        "CIDR": 1
      },
      "indicator_count": 6607,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "12 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "69d5859750dfad7fe7989ef4",
      "name": "Apple / Cloud/ Data Network within Zergeca / Zerg Botnet \u2022 MacSync_AppleScript_Stealer",
      "description": "",
      "modified": "2026-04-07T22:30:47.312000",
      "created": "2026-04-07T22:30:47.312000",
      "tags": [
        "added active",
        "related pulses",
        "found",
        "zergeca botnet",
        "zergeca",
        "upx packer",
        "khtml",
        "gecko",
        "united",
        "ids detections",
        "yara detections",
        "https domain",
        "tls sni",
        "ip lookup",
        "external ip",
        "malware",
        "encrypt",
        "techniques",
        "modify system",
        "process",
        "https",
        "performs dns",
        "tls version",
        "reads cpu",
        "proc indicative",
        "urls",
        "downloads",
        "persistence",
        "data upload",
        "extraction",
        "find s",
        "failed",
        "typ don",
        "ipv4 url",
        "canreb",
        "type ipv4",
        "url domail",
        "domail showing",
        "elf conta",
        "typ url",
        "zercega",
        "enter sc",
        "type",
        "include",
        "review",
        "n1 exclude",
        "suggestedincc",
        "a50 typ",
        "ipv4",
        "matches yara",
        "dete data",
        "yara detectea",
        "cro intormation",
        "exclude sugges",
        "sc car",
        "extra lte",
        "referen",
        "l extraction",
        "droo anv",
        "extr referen",
        "lte all",
        "je matches",
        "yara detel",
        "yara dete",
        "include review",
        "exchange lte",
        "je elf",
        "passive dns",
        "certificate",
        "files",
        "trojan",
        "related tags",
        "worm",
        "medium",
        "write c",
        "write",
        "high",
        "binary",
        "yara rule",
        "default",
        "moved",
        "schaan",
        "as834 ipxo",
        "dynamicloader",
        "program",
        "ee fc",
        "users",
        "ff d5",
        "python",
        "windows",
        "autoit",
        "confuserex",
        "stream",
        "guard",
        "launcher",
        "updater",
        "global",
        "america flag",
        "ashburn",
        "america related",
        "tags",
        "indicator facts",
        "historical otx",
        "controller fake",
        "akamai rank",
        "russia",
        "present nov",
        "aaaa",
        "link",
        "a domains",
        "ip address",
        "meta",
        "cve -2014-2321",
        "handle",
        "address range",
        "cidr",
        "network name",
        "allocation type",
        "pa status",
        "whois server",
        "included iocs",
        "manually add",
        "iocs o",
        "iocs",
        "sugges",
        "stop show",
        "types",
        "external",
        "ripe",
        "pa abusec",
        "neterra",
        "sofia",
        "bulgaria phone",
        "filtered person",
        "neven dilkov",
        "bg phone",
        "filtered route",
        "a5ip",
        "aa2023",
        "aamirai",
        "a2scanner",
        "apple inc",
        "issuer",
        "valid",
        "algorit",
        "thum",
        "name",
        "a9 a8",
        "status",
        "macho",
        "macho 64bit",
        "mac os",
        "x macho",
        "intel",
        "typ no",
        "td td",
        "td tr",
        "a td",
        "dynamic dns",
        "date",
        "name servers",
        "arial",
        "error",
        "null",
        "enough",
        "hosts",
        "win32",
        "fast",
        "contacted",
        "MacSync_AppleScript_Stealer",
        "cve-2018-10562",
        "source",
        "roboto",
        "robotodraft",
        "helvetica",
        "iframe",
        "manually ada",
        "review iocs",
        "abv0",
        "qaeaav0",
        "cptbdev",
        "w4uninitialized",
        "qaeaav01",
        "abv01",
        "qaexn",
        "qbenxz",
        "phoneidentify",
        "qbepaxxz"
      ],
      "references": [
        "https://apple.k8s.joewa.com/\u2022 https://com.apple \u2022 freedns.afraid.org",
        "IPv4 188.114.96.1 In CDN range: provider=cloudflare \u2022 dns.google \u2022 push.apple.com",
        "Zercega \u2022 IPv4 84.54.51.82",
        "Zercega \u2022  http://bot.hamsterrace.space:5966/",
        "Zercega \u2022  multi-user.target",
        "Zercega \u2022  ootheca.pw",
        "CVE-2023-22518\tCVE-2018-10562\t CVE-2024-6387\tCVE-2025-20393",
        "Crowdsourced IDS rules: 6b81d548c0fbd7a2275bb0d29deca0de96c1584ce7aadaf4f5dac3cb28ee9c29",
        "Matches rule Suspicious DNS Query for IP Lookup Service APIs by Brandon George (blog post), Thomas Patzke",
        "Matches rule Suspicious Network Connection to IP Lookup Service APIs by Janantha Marasinghe, Nasreddine Bencherchali (Nextron Systems)",
        "Matches rule Local System Accounts Discovery - Linux by Alejandro Ortuno, oscd.community",
        "Crowdsourced IDS rules:",
        "Matches rule ET POLICY External IP Lookup ipinfo.io",
        "Matches rule ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io)",
        "Matches rule ET INFO External IP Check (checkip .amazonaws .com)",
        "Matches rule SERVER-OTHER Squid HTTP Vary response header denial of service attempt",
        "Matches rule ET INFO Observed Cloudflare DNS over HTTPS Domain (cloudflare-dns .com in TLS SNI) Unique rule identifier: This rule belongs to a private collection.",
        "Yara detected: Xmrig cryptocurrency miner",
        "Yara detected: Reads CPU information from /proc indicative of miner or evasive malware Compliance",
        "meta.com \u2022 meta.com.apple",
        "geomi.service \u2022 74b23c7dc3cca50a6d78e18116e31ca189a4549de35ff49903af2c4c0bd06a63",
        "ELF contains segments with high entropy indicating compressed/encrypted content",
        "/etc/systemd/system/geomi.service File type: ASCII text",
        "http://www.bing.lt/search?q=",
        "Win.Malware.Salat-10058846-0",
        "Yara Detections: MacSync_AppleScript_Stealer",
        "Alerts: antisandbox_unhook hardware_id_profiling ntdll_memory_unhooking binary_yara",
        "Alerts: recon _fingerprint registers_vectored_exception_handler creates_suspended_process",
        "Alerts: resumethread_remote_process enumerates_running_processes reads_self",
        "Alerts: packer_unknown_pe_section_name script_tool_executed",
        "Alerts: queries_computer_name queries_keyboard_layout queries_locale_api",
        "Alerts: antidebug_setunhandledexceptionfilter stealth_timeout language_check_registry",
        "Contacted:  188.114.96.1 Domains Contacted dns.google",
        "distracted-chebyshev.84-54-51-82.plesk.page \u2022 domain plesk.page"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Zergeca",
          "display_name": "Zergeca",
          "target": null
        },
        {
          "id": "AutoIT",
          "display_name": "AutoIT",
          "target": null
        },
        {
          "id": "Win.Malware.Salat-10058846-0",
          "display_name": "Win.Malware.Salat-10058846-0",
          "target": null
        },
        {
          "id": "ALF:JASYP:TrojanDownloader:Win32/SmallAgent!",
          "display_name": "ALF:JASYP:TrojanDownloader:Win32/SmallAgent!",
          "target": null
        },
        {
          "id": "Win.Trojan.Emotet-9850453-0",
          "display_name": "Win.Trojan.Emotet-9850453-0",
          "target": null
        },
        {
          "id": "Worm:Win32/AutoRun!atmn",
          "display_name": "Worm:Win32/AutoRun!atmn",
          "target": "/malware/Worm:Win32/AutoRun!atmn"
        },
        {
          "id": "Win.Trojan.Tofsee-7102058-0\tBackdoor:Win32/Tofsee.T",
          "display_name": "Win.Trojan.Tofsee-7102058-0\tBackdoor:Win32/Tofsee.T",
          "target": "/malware/Win.Trojan.Tofsee-7102058-0\tBackdoor:Win32/Tofsee.T"
        },
        {
          "id": "CVE-2023-22518",
          "display_name": "CVE-2023-22518",
          "target": null
        },
        {
          "id": "CVE-2024-6387",
          "display_name": "CVE-2024-6387",
          "target": null
        },
        {
          "id": "CVE-2025-20393",
          "display_name": "CVE-2025-20393",
          "target": null
        },
        {
          "id": "CVE-2014-2321",
          "display_name": "CVE-2014-2321",
          "target": null
        },
        {
          "id": "Botnet",
          "display_name": "Botnet",
          "target": null
        },
        {
          "id": "CVE-2018-10562",
          "display_name": "CVE-2018-10562",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1543",
          "name": "Create or Modify System Process",
          "display_name": "T1543 - Create or Modify System Process"
        },
        {
          "id": "TA0003",
          "name": "Persistence",
          "display_name": "TA0003 - Persistence"
        },
        {
          "id": "TA0004",
          "name": "Privilege Escalation",
          "display_name": "TA0004 - Privilege Escalation"
        },
        {
          "id": "T1543.002",
          "name": "Systemd Service",
          "display_name": "T1543.002 - Systemd Service"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "TA0005",
          "name": "Defense Evasion",
          "display_name": "TA0005 - Defense Evasion"
        },
        {
          "id": "T1222",
          "name": "File and Directory Permissions Modification",
          "display_name": "T1222 - File and Directory Permissions Modification"
        },
        {
          "id": "T1222.002",
          "name": "Linux and Mac File and Directory Permissions Modification",
          "display_name": "T1222.002 - Linux and Mac File and Directory Permissions Modification"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1003",
          "name": "OS Credential Dumping",
          "display_name": "T1003 - OS Credential Dumping"
        },
        {
          "id": "T1016",
          "name": "System Network Configuration Discovery",
          "display_name": "T1016 - System Network Configuration Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1095",
          "name": "Non-Application Layer Protocol",
          "display_name": "T1095 - Non-Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1571",
          "name": "Non-Standard Port",
          "display_name": "T1571 - Non-Standard Port"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1070.004",
          "name": "File Deletion",
          "display_name": "T1070.004 - File Deletion"
        },
        {
          "id": "T1518.001",
          "name": "Security Software Discovery",
          "display_name": "T1518.001 - Security Software Discovery"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1155",
          "name": "AppleScript",
          "display_name": "T1155 - AppleScript"
        },
        {
          "id": "T1037.002",
          "name": "Logon Script (Mac)",
          "display_name": "T1037.002 - Logon Script (Mac)"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "IPv4": 169,
        "URL": 1871,
        "domain": 393,
        "hostname": 925,
        "FileHash-MD5": 391,
        "FileHash-SHA1": 390,
        "FileHash-SHA256": 2452,
        "CVE": 1,
        "SSLCertFingerprint": 1,
        "IPv6": 9,
        "email": 4,
        "CIDR": 1
      },
      "indicator_count": 6607,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "12 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "6958780c8479a9d69920c3d8",
      "name": "Telnet - Mirai \u2022 Dark Nexus BusyBox iOS Attack",
      "description": "There\u2019s enough here to cause an outage. I will stop here. Illegal activities to silence victim and block her from financial settlement award for permanent injuries under workers compensation in a premise and healthcare worker assault scenario. Attorneys estimated her case to be above $100 million but knew she\u2019d be tampered with. Mark Montano MD  forewarned her but is culpable. Still attacking family of victim.\n[ True- otx auto generated: Adversaries may be able to gain access to a victim's network through a drive-by attack, as well as using a short-term SSL certificate, in order to target the victim.] |||\nPositive:\nT1140 - Deobfuscate/Decode Files or Information\nSuspicious IP Address\n104.21.51.140, 172.67.181.41\nLocation United States ASN\nModif AS13335 cloudflare\nAutomate Nameservers:\nns1.colocrossing.com.",
      "modified": "2026-02-02T01:02:46.327000",
      "created": "2026-01-03T01:59:40.530000",
      "tags": [
        "united",
        "moved",
        "title",
        "passive dns",
        "ipv4 add",
        "urls",
        "files",
        "hosting",
        "reverse dns",
        "location united",
        "hash avast",
        "avg clamav",
        "msdefender mar",
        "read c",
        "create c",
        "medium",
        "search",
        "memcommit",
        "high",
        "checks",
        "windows",
        "execution",
        "dock",
        "write",
        "persistence",
        "capture",
        "local",
        "ref b",
        "wed may",
        "backdoor",
        "mtb aug",
        "next associated",
        "mtb dec",
        "twitter",
        "smoke loader",
        "malware",
        "virtool",
        "hacktool",
        "data upload",
        "present dec",
        "mtb apr",
        "win32",
        "trojan",
        "worm",
        "lowfi",
        "cybota",
        "expiration date",
        "name servers",
        "ipv4",
        "url analysis",
        "port",
        "destination",
        "telnet login",
        "bad login",
        "gpl telnet",
        "suspicious path",
        "busybox",
        "tcp syn",
        "et telnet",
        "path",
        "mirai",
        "filehash",
        "av detections",
        "ids detections",
        "yara detections",
        "alerts",
        "analysis date",
        "file score",
        "america",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "learn",
        "t1179 hooking",
        "installs",
        "t1035 service",
        "adversaries",
        "msie",
        "windows nt",
        "slcc2",
        "media center",
        "y013",
        "flag",
        "span",
        "accept",
        "core",
        "february",
        "hybrid",
        "malicious",
        "general",
        "click",
        "strings",
        "roboto",
        "next",
        "usa windows",
        "finished",
        "queueprogress",
        "timestamp input",
        "threat level",
        "october",
        "september",
        "hwp support",
        "fresh",
        "win64",
        "khtml",
        "gecko",
        "brand",
        "microsoft edge",
        "programfiles",
        "comspec",
        "model",
        "iframe",
        "form",
        "listeners",
        "initial access",
        "t1590 gather",
        "victim network",
        "ssl certificate",
        "quasi government",
        "jeffrey reimer",
        "palantir",
        "Regis university",
        "otx hp",
        "apple",
        "pegasus",
        "h5 data center",
        "florence colorado",
        "brian sabey",
        "target : Tsara Brasheaers",
        "aig",
        "industry and commerce",
        "united states",
        "State of Colorado.",
        "date",
        "status",
        "domain",
        "hostname add",
        "pulse pulses",
        "files ip",
        "address",
        "url https",
        "url http",
        "hostname",
        "show",
        "type indicator",
        "source hostname",
        "entries",
        "Prometheus Intelligence Technology",
        "pulse submit",
        "america flag",
        "body",
        "dynamicloader",
        "microsoft azure",
        "tls issuing",
        "named pipe",
        "json",
        "ascii text",
        "lredmond",
        "Apple",
        "Telnet",
        "BusyBox",
        "Pegasus",
        "Colorado State Fixer: Christopher P. Ahmann",
        "Hijacker: Brian Sabey",
        "For: Concentra",
        "Protecting Assaulter: Jeffrey Reimer",
        "For: AIG",
        "For Industry and Commerce",
        "For: Quasi Government",
        "For: Workers Compensation",
        "Authorities",
        "Law Enforcement Dark",
        "Silencing",
        "Tampering with a Victim",
        "Meta",
        "Palantir",
        "Google",
        "Bing",
        "Microsoft",
        "ColoCrossing",
        "Associates",
        "hit men"
      ],
      "references": [
        "ET Telnet |  https://www.colocrossing.com | velocity servers",
        "https://www.endgamesystems.com/\t This is not a game. This is about people\u2019s lives",
        "TELNET SUSPICIOUS Path to BusyBox\", TELNET login failed\", is__elf \u007fELF dead_host",
        "Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually)",
        "(legitimate services will remain up-and-running usually) High |  ID dead_host",
        "ELF:Mirai-GH\\ [Trj] ,  Unix.Trojan.DarkNexus-7679166-0",
        "IDS Detections SUSPICIOUS Path to BusyBox TELNET login failed Bad Login",
        "Yara Detections is__elf",
        "Alerts dead_host network_icmp tcp_syn_scan nolookup_communication nids_alert writes_to_stdout",
        "Yara Detections is__elf ,  ELFHighEntropy ,  elf_empty_sections",
        "http://appleid.apple.com.msg206.site/   http://www.icloud.com.msg206.site/   https://appleid.apple.com.msg206.site/",
        "https://colocrossing.com/ \u2022 https://www.colocrossing.com/colocation\t l",
        "https://prometheussteakhouse.lupi.delivery/ Thanks! I\u2019m heavy into Picinha. 2 Brazilian roasts please!",
        "https://www.colocrossing.com/",
        "(TLI did you do her that dirty?) Why\u2019SCS\u2019? Pure shame on you.",
        "In all seriousness. The severity of  injuries and outcomes 1 victim had is aligned cyber attacks by Q.Gov",
        "104.21.51.140, 172.67.181.41",
        "Detections Win.Packed.ImminentMonitorRAT-9892275-0 ,  HackTool:MSIL/Boilod.C!bit",
        "IDS Detections: Observed Cloudflare DNS over HTTPS Domain (cloudflare-dns .com in TLS SNI)",
        "Alerts: procmem_yara injection_inter_process ransomware_file_modifications stack_pivot",
        "stealth_file cape_detected_threat injection_process_hollowing antiav_detectfile  injection_runpe",
        "Alerts: cape_extracted_content infostealer_cookies recon_fingerprint powershell_download",
        "Alerts: dynamic_function_loading ipc_namedpipe  createtoolhelp32snapshot_module_enumeration",
        "IP\u2019s Contacted: 142.250.147.101  88.221.104.56  13.33.141.29  35.186.249.72  151.101.1.192",
        "IP\u2019s Contacted 178.249.97.99  178.249.97.98  178.249.97.23  84.53.172.74  88.221.104.82",
        "Domains Contacted: accounts.google.com chrome.cloudflare-dns.com clients2.googleusercontent.com",
        "This is hard to comprehend or put into indelible words."
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "Unix.Trojan.DarkNexus-7679166-0",
          "display_name": "Unix.Trojan.DarkNexus-7679166-0",
          "target": null
        },
        {
          "id": "HackTool:MSIL/Boilod.C!bit",
          "display_name": "HackTool:MSIL/Boilod.C!bit",
          "target": "/malware/HackTool:MSIL/Boilod.C!bit"
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        },
        {
          "id": "T1035",
          "name": "Service Execution",
          "display_name": "T1035 - Service Execution"
        },
        {
          "id": "T1179",
          "name": "Hooking",
          "display_name": "T1179 - Hooking"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1189",
          "name": "Drive-by Compromise",
          "display_name": "T1189 - Drive-by Compromise"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1147",
          "name": "Hidden Users",
          "display_name": "T1147 - Hidden Users"
        },
        {
          "id": "T1155",
          "name": "AppleScript",
          "display_name": "T1155 - AppleScript"
        },
        {
          "id": "T1080",
          "name": "Taint Shared Content",
          "display_name": "T1080 - Taint Shared Content"
        },
        {
          "id": "T1098",
          "name": "Account Manipulation",
          "display_name": "T1098 - Account Manipulation"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1557",
          "name": "Man-in-the-Middle",
          "display_name": "T1557 - Man-in-the-Middle"
        },
        {
          "id": "T1185",
          "name": "Man in the Browser",
          "display_name": "T1185 - Man in the Browser"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1583.001",
          "name": "Domains",
          "display_name": "T1583.001 - Domains"
        },
        {
          "id": "T1204.001",
          "name": "Malicious Link",
          "display_name": "T1204.001 - Malicious Link"
        },
        {
          "id": "T1553.002",
          "name": "Code Signing",
          "display_name": "T1553.002 - Code Signing"
        },
        {
          "id": "T1518.001",
          "name": "Security Software Discovery",
          "display_name": "T1518.001 - Security Software Discovery"
        },
        {
          "id": "T1568.002",
          "name": "Domain Generation Algorithms",
          "display_name": "T1568.002 - Domain Generation Algorithms"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1071.003",
          "name": "Mail Protocols",
          "display_name": "T1071.003 - Mail Protocols"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1204.002",
          "name": "Malicious File",
          "display_name": "T1204.002 - Malicious File"
        },
        {
          "id": "T1462",
          "name": "Malicious Software Development Tools",
          "display_name": "T1462 - Malicious Software Development Tools"
        },
        {
          "id": "T1457",
          "name": "Malicious Media Content",
          "display_name": "T1457 - Malicious Media Content"
        },
        {
          "id": "TA0037",
          "name": "Command and Control",
          "display_name": "TA0037 - Command and Control"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1459",
          "name": "Device Unlock Code Guessing or Brute Force",
          "display_name": "T1459 - Device Unlock Code Guessing or Brute Force"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        }
      ],
      "industries": [
        "Technology",
        "Healthcare",
        "Insurance",
        "Civil Society"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 9,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 6390,
        "domain": 723,
        "hostname": 1978,
        "FileHash-SHA256": 1912,
        "FileHash-MD5": 410,
        "FileHash-SHA1": 306,
        "email": 3,
        "SSLCertFingerprint": 28,
        "CVE": 3
      },
      "indicator_count": 11753,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 142,
      "modified_text": "76 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "68a956460f257cf96c454071",
      "name": "Piracy \u2022 Cloudfront \u2022 Ransom \u2022 Code Overlaps \u2022 Unrelenting attacks.",
      "description": "Indie songwriter , publisher,  promoter, producer & her artists affected by years long copyright infringement , hacking & reputation damage. Website now downed.\n\nBrashears had been involved in music under  pseudonyms for decades as a was songwriter , ghostwriter, sold catalogs , charting singles,  chops was sponsored. In this instance music was grossly pirated. Initially asked for hook rights then told  hook would be used without her permission. Believed dispute resolved verbally + copyright.\n\nTsara learned from an insider/s her hook was pirated & used by artists listed. Modifications  make songs pirated samples.\nBrashears song written in 2010 later vaulted in a  private catalog later released by her artist.  YouTube audio quality tampering on pirated song. \n\nBrashears loved music, not the industry as an artist; preferring business. Always held her  privacy to remain unknown. Tsara lived 10 lives at once.\n\nLikely involves male who contacted her @ by email as mentioned in earlier pulse.\n#trulymissed",
      "modified": "2025-09-21T21:03:28.771000",
      "created": "2025-08-23T05:48:54.534000",
      "tags": [
        "domains",
        "hashes",
        "passive dns",
        "urls",
        "url add",
        "http",
        "hostname",
        "files domain",
        "files related",
        "related tags",
        "a domains",
        "entries",
        "next associated",
        "files show",
        "date hash",
        "avast avg",
        "trojanspy",
        "entries http",
        "scans show",
        "search",
        "body",
        "body doctype",
        "dynamicloader",
        "medium",
        "reg add",
        "regsz d",
        "high",
        "windows",
        "audio drivers",
        "write c",
        "virtool",
        "copy",
        "write",
        "june",
        "united",
        "unknown ns",
        "samsara",
        "new york",
        "city ny",
        "ip address",
        "record value",
        "meta",
        "date",
        "music",
        "encrypt",
        "win32",
        "dangeroussig",
        "lowfi",
        "msie",
        "chrome",
        "precondition",
        "trojan",
        "title",
        "canada unknown",
        "unknown cname",
        "domain add",
        "files",
        "location united",
        "hostname add",
        "verdict",
        "domain",
        "files ip",
        "address",
        "asn as13335",
        "hash avast",
        "avg clamav",
        "msdefender feb",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "command",
        "adversaries",
        "spawns",
        "mitre att",
        "ck techniques",
        "file",
        "size",
        "ascii text",
        "pattern match",
        "august",
        "hybrid",
        "general",
        "path",
        "click",
        "strings",
        "roboto",
        "mozilla",
        "contact",
        "t1179 hooking",
        "installs",
        "t1035 service",
        "crlf line",
        "runtime process",
        "malicious",
        "unknown",
        "ssl certificate",
        "defense evasion",
        "amazon02",
        "americachicago",
        "windows nt",
        "win64",
        "khtml",
        "gecko",
        "veryhigh",
        "found",
        "geo menifee",
        "california",
        "as30148",
        "us note",
        "route",
        "ptr record",
        "information",
        "t1053",
        "taskjob",
        "t1055",
        "injection",
        "t1082",
        "t1112",
        "modify registry",
        "t1119",
        "t1129",
        "service",
        "capture",
        "url http",
        "url https",
        "type indicator",
        "role title",
        "added active",
        "related pulses",
        "showing",
        "ipv6",
        "ipv4",
        "dicator role",
        "title added",
        "active related",
        "sweden",
        "netherlands",
        "scan",
        "iocs",
        "learn more",
        "types of",
        "kingdom",
        "united kingdom",
        "denmark",
        "icator role",
        "malware attacks",
        "find encrypted",
        "t1021",
        "remote",
        "t1068",
        "ta0043",
        "t1016",
        "discovery",
        "t1221",
        "nobody love",
        "tori",
        "kelley",
        "dj khaled",
        "justin bieber",
        "sophos video",
        "x rack",
        "x frame",
        "october",
        "songculture",
        "song culture",
        "tsara brashears",
        "jess 4",
        "queryfoundry",
        "beyond sampling",
        "pirated",
        "youtube",
        "spotify",
        "twitter",
        "spy",
        "tracking"
      ],
      "references": [
        "https://songculture.com/tsara-brashears-music | Cloudfront below was attached to body of work",
        "https://d3jjg4nf4bbybe.cloudfront.net/u/210425/397f80d871fe6dla1704cela4b712e387ed8a48a/large/kedence-out-of-my-sight",
        "\"Nobody Love\" Tori Kelley \"'m the One\" DJ Khaled ft Justin Bieber (Pirated Hook)",
        "8-25-220-162-static.reverse.queryfoundry.net",
        "http://117-114-251-162-static.reverse.queryfoundry.net/ - queryfoundry.net",
        "https://www.youtube.com/watch?v=bJWJbOqg9cM - Falsely flagged to demonetize and not rank",
        "Dr.Web violence/adult content (False) ThreatSeeker social web - youtube",
        "music.apple.com \u2022 linktr.ee \u2022 sentient.industries?  samsara has been showing up often.",
        "There is money in the industry for well established , \u2018souled\u2019 out artists. It\u2019s a racket! T signed & exited early",
        "Worked at some studios attacked by Lazarus Group who allegedly attacked Sony Music",
        "I apologize if you don\u2019t like my background stories",
        "\u2018Passin\u2019 I deleted the pulses you asked me to. Your links were malicious. I haven\u2019t weaponize anything  I\u2019ve learned... yet"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Nivdort",
          "display_name": "Nivdort",
          "target": null
        },
        {
          "id": "Virtool",
          "display_name": "Virtool",
          "target": null
        },
        {
          "id": "Evo",
          "display_name": "Evo",
          "target": null
        },
        {
          "id": "Trojanspy",
          "display_name": "Trojanspy",
          "target": null
        },
        {
          "id": "Malware",
          "display_name": "Malware",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "TrojanSpy:Win32/Nivdort",
          "display_name": "TrojanSpy:Win32/Nivdort",
          "target": "/malware/TrojanSpy:Win32/Nivdort"
        },
        {
          "id": "Ransom",
          "display_name": "Ransom",
          "target": null
        },
        {
          "id": "Malware Gen",
          "display_name": "Malware Gen",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1590",
          "name": "Gather Victim Network Information",
          "display_name": "T1590 - Gather Victim Network Information"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1035",
          "name": "Service Execution",
          "display_name": "T1035 - Service Execution"
        },
        {
          "id": "T1179",
          "name": "Hooking",
          "display_name": "T1179 - Hooking"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        },
        {
          "id": "T1016",
          "name": "System Network Configuration Discovery",
          "display_name": "T1016 - System Network Configuration Discovery"
        },
        {
          "id": "T1021",
          "name": "Remote Services",
          "display_name": "T1021 - Remote Services"
        },
        {
          "id": "T1022",
          "name": "Data Encrypted",
          "display_name": "T1022 - Data Encrypted"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1132",
          "name": "Data Encoding",
          "display_name": "T1132 - Data Encoding"
        },
        {
          "id": "T1221",
          "name": "Template Injection",
          "display_name": "T1221 - Template Injection"
        },
        {
          "id": "T1222",
          "name": "File and Directory Permissions Modification",
          "display_name": "T1222 - File and Directory Permissions Modification"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1593.001",
          "name": "Social Media",
          "display_name": "T1593.001 - Social Media"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1486",
          "name": "Data Encrypted for Impact",
          "display_name": "T1486 - Data Encrypted for Impact"
        },
        {
          "id": "T1155",
          "name": "AppleScript",
          "display_name": "T1155 - AppleScript"
        }
      ],
      "industries": [
        "Media",
        "Technology",
        "Telecommunications"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 33,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 1833,
        "hostname": 902,
        "domain": 386,
        "FileHash-MD5": 406,
        "FileHash-SHA1": 402,
        "FileHash-SHA256": 1437,
        "email": 2,
        "SSLCertFingerprint": 5,
        "CIDR": 2
      },
      "indicator_count": 5375,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 144,
      "modified_text": "210 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "6647908c09468f42bc1249f1",
      "name": "University of Alberta Azure/Entra Compromised Tenant Compromized Institution",
      "description": "Update: Academic/Non-Academic Staff Unions, 3rd party org, & some profs/students/alumni tried raising concerns to Admins/President/IST & CISO => Maintaining position they will not be looking into reported problems re: Cybersecurity under any circumstances = more time more problems? Attempts to advocate -> Harrass./Discrim./De-humanizing responses from admins (representing all folks - recorded). \nTenant ID: 718b8a9b-44d8-441a-a344-4294ea842172 = This pulse is 1 example (small) of problems.\n\nPrimary domain\nualbertaca.onmicrosoft.com\nCustom Domain Names\nualberta.ca\nVerified\nualbertaca.onmicrosoft.com",
      "modified": "2025-03-01T04:59:57.222000",
      "created": "2024-05-17T17:14:52.317000",
      "tags": [
        "false",
        "true",
        "visible",
        "application",
        "microsoft teams",
        "microsoft azure",
        "office",
        "service",
        "dynamics",
        "hidden",
        "android",
        "explorer",
        "write",
        "connector",
        "test",
        "sharepoint",
        "live",
        "meister",
        "tools",
        "desktop",
        "spark",
        "front",
        "enterprise",
        "designer",
        "atlas",
        "premium",
        "assistant",
        "allow",
        "azureadmyorg",
        "game",
        "verify",
        "microsoft power",
        "channelsurfcli",
        "mtd1",
        "file transfer",
        "magnus",
        "microsoft crm",
        "youth"
      ],
      "references": [
        "All - EnterpriseAppsList.csv",
        "AppRegistrationList.csv",
        "https://tria.ge/240517-vc7c1shc62/behavioral1",
        "https://tria.ge/240517-vdwb5shc71/behavioral1",
        "https://tria.ge/240517-vqxezaaa33/behavioral1",
        "https://tria.ge/240517-t9pc2ahb2t",
        "https://www.virustotal.com/graph/embed/g9453a2f58a3340f18120987c2b4d710dbb44ded88c434abf8894458a98c7bd4b?theme=dark",
        "https://www.virustotal.com/gui/collection/b84a19d60ec7cd6d546a3f145dff8987128d0f499161118b46de22718d4713cd/iocs",
        "https://www.virustotal.com/gui/collection/b84a19d60ec7cd6d546a3f145dff8987128d0f499161118b46de22718d4713cd/graph",
        "https://www.virustotal.com/gui/collection/b84a19d60ec7cd6d546a3f145dff8987128d0f499161118b46de22718d4713cd/summary",
        "https://www.filescan.io/uploads/66479b483313f70f0afe3dbb",
        "https://www.filescan.io/uploads/664799c9d5c40bffee6106d7",
        "Thor Scan: S-I9VvMTB6cZU",
        "https://www.filescan.io/uploads/664ba368d5c40bffee63b1ee/reports/31817751-6b5d-45df-8813-472aa6c756a3/overview",
        "https://www.filescan.io/uploads/664ba8a20663ff3c2ec6428a/reports/09d3d82a-7ec1-4804-93e5-5ae691fbb7f2/overview",
        "https://imp0rtp3.wordpress.com/2021/08/12/tetris/",
        "https://www.filescan.io/uploads/664bb0cd7c9fb1468fc610c5/reports/00c78e4d-2156-4906-a106-ebf7e2723251/overview",
        "https://www.filescan.io/uploads/664bb40fbc04dffa92240ca2/reports/398074f2-c7b6-40e9-9b5c-4225cc990473/overview",
        "https://www.filescan.io/uploads/664bb683bc04dffa92241015/reports/92b70fd6-97d7-4386-8465-f3fd79043843/overview",
        "https://tria.ge/240521-q4s79agb25/static1",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/664f906322f5af13cdfb50be",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/664f906222f5af13cdfb5093",
        "https://www.filescan.io/uploads/666d69ff6b8dba248b414767/reports/dda2c8a1-96fd-4c00-9cbc-c64c4685a804/overview",
        "https://www.filescan.io/uploads/666d69ff6b8dba248b414767",
        "https://viz.greynoise.io/analysis/33e9b33b-b932-4c43-9be1-3e2d6f9cb4b3",
        "https://viz.greynoise.io/analysis/e51d9a15-d802-4d51-9a70-17803dc2693a",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d01d2b67682d81c00f37b",
        "Above Malcore Strings: All - EnterpriseAppsList, AppRegistration, EnterpriseAppslist, exportGroup, exportUsers, HiddenApps - EnterpriseAppsList****",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d00975ea31558d54fceea",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667cff1a5ea31558d54fcbf6",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d0107b44401771de9ebf2",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d00356dd8f43b723a915a",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667cffec5ea31558d54fcda2",
        "https://www.hudsonrock.com/search?domain=ualberta.ca",
        "https://www.criminalip.io/domain/report?scan_id=13798622",
        "https://viz.greynoise.io/analysis/9635144c-db8f-47ab-a83a-5785602244cf - 07.03.24",
        "https://urlscan.io/search/#ualberta.ca",
        "https://www.virustotal.com/gui/collection/0ca12fcdd125ec5a5055180ee828b98d47b8b2e920660be559c2b602266b6b1d/iocs",
        "https://sitereport.netcraft.com/?url=http://ualberta.ca",
        "https://www.wordfence.com/blog/2022/10/threat-advisory-monitoring-cve-2022-42889-text4shell-exploit-attempts/",
        "https://tenantresolution.pingcastle.com/Search - Tenant still active (07.19.24) - Good jobs ya'll",
        "https://www.virustotal.com/graph/embed/gf1d5aa209c7f4fd086e4cb17dcd0af52421ea4bae87d49fe9b4076b382612f0e?theme=dark",
        "https://viz.greynoise.io/query/AS36351%20classification:%22malicious%22",
        "https://viz.greynoise.io/query/AS60068%20classification:%22malicious%22",
        "https://viz.greynoise.io/query/AS8075%20classification:%22malicious%22",
        "https://viz.greynoise.io/query/AS15169%20classification:%22malicious%22",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d01d2b67682d81c00f37b - https://app.malcore.io/share/652553f6aec33d70a1dbbd25/667d01d2b67682d81c00f37b = Hidden Apps - Enterprise Apps List"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Canada"
      ],
      "malware_families": [],
      "attack_ids": [],
      "industries": [
        "Education",
        "Technology",
        "Healthcare",
        "Telecommunications",
        "Government"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 25,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 7,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Disable_Duck",
        "id": "244325",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 1703,
        "FileHash-SHA256": 90472,
        "URL": 99185,
        "domain": 82954,
        "hostname": 39041,
        "FileHash-SHA1": 1624,
        "email": 4658,
        "CVE": 12
      },
      "indicator_count": 319649,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "414 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65eb9b25110526c6b2a0ada5",
      "name": "VirTool:MSIL/CryptInject.CF!MTB | Rexxfield? Weird stuff",
      "description": "",
      "modified": "2024-03-08T23:11:33.426000",
      "created": "2024-03-08T23:11:33.426000",
      "tags": [
        "threat",
        "feeds ioc",
        "new ioc",
        "teams api",
        "contact",
        "paste",
        "iocs",
        "analyze",
        "ssl certificate",
        "whois record",
        "historical ssl",
        "resolutions",
        "referrer",
        "whois whois",
        "communicating",
        "contacted",
        "family",
        "roots",
        "lolkek",
        "redline stealer",
        "hacktool",
        "html info",
        "title rexxfield",
        "services",
        "identify",
        "meta tags",
        "rexxfield cyber",
        "investigation",
        "divi child",
        "site kit",
        "google",
        "united",
        "unknown",
        "as24940 hetzner",
        "germany unknown",
        "passive dns",
        "urls",
        "title",
        "moved",
        "scan endpoints",
        "all octoseek",
        "body",
        "cyber stalking",
        "pornographer",
        "urls url",
        "files",
        "ip address",
        "execution",
        "metro",
        "medium",
        "show",
        "search",
        "ids detections",
        "yara detections",
        "win32",
        "ppi useragent",
        "installcapital",
        "http",
        "packing t1045",
        "malware",
        "write",
        "obsession",
        "malvertizing",
        "masquerading",
        "ipv4",
        "pulse submit",
        "url analysis",
        "cookie",
        "status",
        "domain",
        "creation date",
        "trojan",
        "date",
        "expiration date",
        "name servers",
        "trojanclicker",
        "encrypt",
        "error",
        "ransomware",
        "malware generator",
        "meta",
        "for privacy",
        "aaaa",
        "komodo",
        "asnone united",
        "alfper",
        "as22612",
        "nxdomain",
        "gmt x",
        "ransom",
        "virtool",
        "log id",
        "gmtn",
        "digicert tls",
        "rsa sha256",
        "tls web",
        "full name",
        "digicert inc",
        "california",
        "false",
        "pulse pulses",
        "location united",
        "as16276",
        "as14061",
        "code",
        "next",
        "url http",
        "hostname",
        "files domain",
        "files related",
        "ghost rat",
        "webtoolbar",
        "nanocore rat",
        "gamehack",
        "cobalt strike",
        "redlinestealer",
        "installcore",
        "installbrain",
        "emotet",
        "tofsee",
        "bradesco",
        "agent tesla",
        "trojanspy",
        "suppobox",
        "occamy",
        "dnspionage",
        "stealer",
        "networm",
        "as13414 twitter",
        "as32934",
        "script urls",
        "a domains",
        "worm",
        "entries",
        "meta http",
        "window",
        "select contact",
        "domain holder",
        "nexus category",
        "tackle company",
        "postal code",
        "component loop",
        "apache",
        "pragma",
        "value0",
        "ioc search",
        "threat analyzer",
        "hostnames",
        "dangerous",
        "target",
        "targeting",
        "hacker profile",
        "cybercrime",
        "fraud services",
        "strange",
        "tsara brashears",
        "michael roberts",
        "tracey richter",
        "voyeurism",
        "slander",
        "password",
        "hijacker"
      ],
      "references": [
        "https://rexxfield.com/",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian | OS & iOS Password and Password Cracker",
        "www.akhaltsikhe.gov.ge [Germany?]",
        "screencasts.rexxfield.com",
        "https://rexxfield.com [ hmmm...inc.legal] is Alienvault a subsidiary of Rexxfields unwarranted investigation/spy campaign? Confused",
        "https://www.akhaltsikhe.gov.ge/ | GMT Server LiteSpeed location",
        "94.130.71.173 [scanning host]",
        "http://www.objectaid.com/update/current/p2.index [AIN Phishing IOC's]",
        "https://www.couriermail.com.au/ipad/custody-bid-strands-family/news-story/23c2c9a5fc984edc04d29655c641f484",
        "Michael Roberts Australia, Germany, Iowa, New York Friend of Ben",
        "Michael Roberts - murder suspect, victim, hacker, PI",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [text, email, collection]",
        "https://ladys.one/xxx/a-tsara-brashears-zafira-porn",
        "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net [BitCoinAussie ?]",
        "98cc05d9c12c214deadfe71af22cd3862e7417c0 [backdoor | PPI User-Agent (InstallCapital)]",
        "a.nel.cloudflare.com / api.w.org",
        "miles.ns.cloudflare.com",
        "https://otx.alienvault.com/indicator/url/https://media.toxtren.com/redirect.aspx?pid=272789&&bid=1971&&lpid=2119&&subid=18b8dh9scxi7sbl11f&&sref=inhousecpa&&inhousecpa=Kiev_Dima_BR_Setki",
        "https://www.google.com/?authuser=0"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "LolKek",
          "display_name": "LolKek",
          "target": null
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        },
        {
          "id": "RedLine Stealer",
          "display_name": "RedLine Stealer",
          "target": null
        },
        {
          "id": "TrojanClicker",
          "display_name": "TrojanClicker",
          "target": null
        },
        {
          "id": "Win32:Malware-gen",
          "display_name": "Win32:Malware-gen",
          "target": null
        },
        {
          "id": "ALFPER:InstallCapital",
          "display_name": "ALFPER:InstallCapital",
          "target": null
        },
        {
          "id": "VirTool:MSIL/CryptInject.CF!MTB",
          "display_name": "VirTool:MSIL/CryptInject.CF!MTB",
          "target": "/malware/VirTool:MSIL/CryptInject.CF!MTB"
        },
        {
          "id": "Win.Malware.Downloadguide-6803841-0",
          "display_name": "Win.Malware.Downloadguide-6803841-0",
          "target": null
        },
        {
          "id": "Win.Packed.kkrunchy-7049457-1",
          "display_name": "Win.Packed.kkrunchy-7049457-1",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:SoftwareBundler:Win32/Prepscram",
          "display_name": "ALF:HeraklezEval:SoftwareBundler:Win32/Prepscram",
          "target": null
        },
        {
          "id": "TrojanDownloader:Win32/Upatre.A",
          "display_name": "TrojanDownloader:Win32/Upatre.A",
          "target": "/malware/TrojanDownloader:Win32/Upatre.A"
        },
        {
          "id": "Trojan:Win32/Qbot.R!MTB",
          "display_name": "Trojan:Win32/Qbot.R!MTB",
          "target": "/malware/Trojan:Win32/Qbot.R!MTB"
        },
        {
          "id": "ALF:HeraklezEval:Trojan:BAT/Musecador",
          "display_name": "ALF:HeraklezEval:Trojan:BAT/Musecador",
          "target": null
        },
        {
          "id": "Backdoor:Win32/Wabot.A",
          "display_name": "Backdoor:Win32/Wabot.A",
          "target": "/malware/Backdoor:Win32/Wabot.A"
        },
        {
          "id": "Ransom:Win32/G And Crab!rfn",
          "display_name": "Ransom:Win32/G And Crab!rfn",
          "target": "/malware/Ransom:Win32/G And Crab!rfn"
        },
        {
          "id": "Ransom:Win32/WannaCrypt.A!rsm",
          "display_name": "Ransom:Win32/WannaCrypt.A!rsm",
          "target": "/malware/Ransom:Win32/WannaCrypt.A!rsm"
        },
        {
          "id": "Tofsee",
          "display_name": "Tofsee",
          "target": null
        },
        {
          "id": "#Lowfi:FOP:VirTool:Win32/Injector",
          "display_name": "#Lowfi:FOP:VirTool:Win32/Injector",
          "target": null
        },
        {
          "id": "Nanocore RAT",
          "display_name": "Nanocore RAT",
          "target": null
        },
        {
          "id": "Worm:Win32/Fesber.A",
          "display_name": "Worm:Win32/Fesber.A",
          "target": "/malware/Worm:Win32/Fesber.A"
        },
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        },
        {
          "id": "#LowFi:HSTR:TrojanSpy:Win32/Xtrat",
          "display_name": "#LowFi:HSTR:TrojanSpy:Win32/Xtrat",
          "target": null
        },
        {
          "id": "InstallBrain",
          "display_name": "InstallBrain",
          "target": null
        },
        {
          "id": "InstallCore",
          "display_name": "InstallCore",
          "target": null
        },
        {
          "id": "Ghost RAT",
          "display_name": "Ghost RAT",
          "target": null
        },
        {
          "id": "Cobalt Strike",
          "display_name": "Cobalt Strike",
          "target": null
        },
        {
          "id": "SuppoBox",
          "display_name": "SuppoBox",
          "target": null
        },
        {
          "id": "Occamy",
          "display_name": "Occamy",
          "target": null
        },
        {
          "id": "Agent Tesla",
          "display_name": "Agent Tesla",
          "target": null
        },
        {
          "id": "TrojanSpy:Win32/Bradesco",
          "display_name": "TrojanSpy:Win32/Bradesco",
          "target": "/malware/TrojanSpy:Win32/Bradesco"
        },
        {
          "id": "ALF:HeraklezEval:TrojanClicker:JS/Faceliker",
          "display_name": "ALF:HeraklezEval:TrojanClicker:JS/Faceliker",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1415",
          "name": "URL Scheme Hijacking",
          "display_name": "T1415 - URL Scheme Hijacking"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1122",
          "name": "Component Object Model Hijacking",
          "display_name": "T1122 - Component Object Model Hijacking"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1100",
          "name": "Web Shell",
          "display_name": "T1100 - Web Shell"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.003",
          "name": "Mail Protocols",
          "display_name": "T1071.003 - Mail Protocols"
        },
        {
          "id": "T1030",
          "name": "Data Transfer Size Limits",
          "display_name": "T1030 - Data Transfer Size Limits"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "65a342310ab3d2c69778d608",
      "export_count": 53,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 143,
        "FileHash-SHA1": 130,
        "FileHash-SHA256": 1524,
        "URL": 3340,
        "domain": 1735,
        "hostname": 1398,
        "CVE": 1,
        "email": 6,
        "SSLCertFingerprint": 2
      },
      "indicator_count": 8279,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 226,
      "modified_text": "772 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65eb98d47b74b50cf8ce6797",
      "name": "VirTool:Win32/AccessMe | Ghost RAT",
      "description": "",
      "modified": "2024-03-08T23:01:40.129000",
      "created": "2024-03-08T23:01:40.129000",
      "tags": [
        "threat",
        "feeds ioc",
        "new ioc",
        "teams api",
        "contact",
        "paste",
        "iocs",
        "analyze",
        "ssl certificate",
        "whois record",
        "historical ssl",
        "resolutions",
        "referrer",
        "whois whois",
        "communicating",
        "contacted",
        "family",
        "roots",
        "lolkek",
        "redline stealer",
        "hacktool",
        "html info",
        "title rexxfield",
        "services",
        "identify",
        "meta tags",
        "rexxfield cyber",
        "investigation",
        "divi child",
        "site kit",
        "google",
        "united",
        "unknown",
        "as24940 hetzner",
        "germany unknown",
        "passive dns",
        "urls",
        "title",
        "moved",
        "scan endpoints",
        "all octoseek",
        "body",
        "cyber stalking",
        "pornographer",
        "urls url",
        "files",
        "ip address",
        "execution",
        "metro",
        "medium",
        "show",
        "search",
        "ids detections",
        "yara detections",
        "win32",
        "ppi useragent",
        "installcapital",
        "http",
        "packing t1045",
        "malware",
        "write",
        "obsession",
        "malvertizing",
        "masquerading",
        "ipv4",
        "pulse submit",
        "url analysis",
        "cookie",
        "status",
        "domain",
        "creation date",
        "trojan",
        "date",
        "expiration date",
        "name servers",
        "trojanclicker",
        "encrypt",
        "error",
        "ransomware",
        "malware generator",
        "meta",
        "for privacy",
        "aaaa",
        "komodo",
        "asnone united",
        "alfper",
        "as22612",
        "nxdomain",
        "gmt x",
        "ransom",
        "virtool",
        "log id",
        "gmtn",
        "digicert tls",
        "rsa sha256",
        "tls web",
        "full name",
        "digicert inc",
        "california",
        "false",
        "pulse pulses",
        "location united",
        "as16276",
        "as14061",
        "code",
        "next",
        "url http",
        "hostname",
        "files domain",
        "files related",
        "ghost rat",
        "webtoolbar",
        "nanocore rat",
        "gamehack",
        "cobalt strike",
        "redlinestealer",
        "installcore",
        "installbrain",
        "emotet",
        "tofsee",
        "bradesco",
        "agent tesla",
        "trojanspy",
        "suppobox",
        "occamy",
        "dnspionage",
        "stealer",
        "networm",
        "as13414 twitter",
        "as32934",
        "script urls",
        "a domains",
        "worm",
        "entries",
        "meta http",
        "window",
        "select contact",
        "domain holder",
        "nexus category",
        "tackle company",
        "postal code",
        "component loop",
        "apache",
        "pragma",
        "value0",
        "ioc search",
        "threat analyzer",
        "hostnames",
        "dangerous",
        "target",
        "targeting",
        "hacker profile",
        "cybercrime",
        "fraud services",
        "strange",
        "tsara brashears",
        "michael roberts",
        "tracey richter",
        "voyeurism",
        "slander",
        "password",
        "hijacker"
      ],
      "references": [
        "https://rexxfield.com/",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian | OS & iOS Password and Password Cracker",
        "www.akhaltsikhe.gov.ge [Germany?]",
        "screencasts.rexxfield.com",
        "https://rexxfield.com [ hmmm...inc.legal] is Alienvault a subsidiary of Rexxfields unwarranted investigation/spy campaign? Confused",
        "https://www.akhaltsikhe.gov.ge/ | GMT Server LiteSpeed location",
        "94.130.71.173 [scanning host]",
        "http://www.objectaid.com/update/current/p2.index [AIN Phishing IOC's]",
        "https://www.couriermail.com.au/ipad/custody-bid-strands-family/news-story/23c2c9a5fc984edc04d29655c641f484",
        "Michael Roberts Australia, Germany, Iowa, New York Friend of Ben",
        "Michael Roberts - murder suspect, victim, hacker, PI",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [text, email, collection]",
        "https://ladys.one/xxx/a-tsara-brashears-zafira-porn",
        "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net [BitCoinAussie ?]",
        "98cc05d9c12c214deadfe71af22cd3862e7417c0 [backdoor | PPI User-Agent (InstallCapital)]",
        "a.nel.cloudflare.com / api.w.org",
        "miles.ns.cloudflare.com",
        "https://otx.alienvault.com/indicator/url/https://media.toxtren.com/redirect.aspx?pid=272789&&bid=1971&&lpid=2119&&subid=18b8dh9scxi7sbl11f&&sref=inhousecpa&&inhousecpa=Kiev_Dima_BR_Setki",
        "https://www.google.com/?authuser=0"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "LolKek",
          "display_name": "LolKek",
          "target": null
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        },
        {
          "id": "RedLine Stealer",
          "display_name": "RedLine Stealer",
          "target": null
        },
        {
          "id": "TrojanClicker",
          "display_name": "TrojanClicker",
          "target": null
        },
        {
          "id": "Win32:Malware-gen",
          "display_name": "Win32:Malware-gen",
          "target": null
        },
        {
          "id": "ALFPER:InstallCapital",
          "display_name": "ALFPER:InstallCapital",
          "target": null
        },
        {
          "id": "VirTool:MSIL/CryptInject.CF!MTB",
          "display_name": "VirTool:MSIL/CryptInject.CF!MTB",
          "target": "/malware/VirTool:MSIL/CryptInject.CF!MTB"
        },
        {
          "id": "Win.Malware.Downloadguide-6803841-0",
          "display_name": "Win.Malware.Downloadguide-6803841-0",
          "target": null
        },
        {
          "id": "Win.Packed.kkrunchy-7049457-1",
          "display_name": "Win.Packed.kkrunchy-7049457-1",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:SoftwareBundler:Win32/Prepscram",
          "display_name": "ALF:HeraklezEval:SoftwareBundler:Win32/Prepscram",
          "target": null
        },
        {
          "id": "TrojanDownloader:Win32/Upatre.A",
          "display_name": "TrojanDownloader:Win32/Upatre.A",
          "target": "/malware/TrojanDownloader:Win32/Upatre.A"
        },
        {
          "id": "Trojan:Win32/Qbot.R!MTB",
          "display_name": "Trojan:Win32/Qbot.R!MTB",
          "target": "/malware/Trojan:Win32/Qbot.R!MTB"
        },
        {
          "id": "ALF:HeraklezEval:Trojan:BAT/Musecador",
          "display_name": "ALF:HeraklezEval:Trojan:BAT/Musecador",
          "target": null
        },
        {
          "id": "Backdoor:Win32/Wabot.A",
          "display_name": "Backdoor:Win32/Wabot.A",
          "target": "/malware/Backdoor:Win32/Wabot.A"
        },
        {
          "id": "Ransom:Win32/G And Crab!rfn",
          "display_name": "Ransom:Win32/G And Crab!rfn",
          "target": "/malware/Ransom:Win32/G And Crab!rfn"
        },
        {
          "id": "Ransom:Win32/WannaCrypt.A!rsm",
          "display_name": "Ransom:Win32/WannaCrypt.A!rsm",
          "target": "/malware/Ransom:Win32/WannaCrypt.A!rsm"
        },
        {
          "id": "Tofsee",
          "display_name": "Tofsee",
          "target": null
        },
        {
          "id": "#Lowfi:FOP:VirTool:Win32/Injector",
          "display_name": "#Lowfi:FOP:VirTool:Win32/Injector",
          "target": null
        },
        {
          "id": "Nanocore RAT",
          "display_name": "Nanocore RAT",
          "target": null
        },
        {
          "id": "Worm:Win32/Fesber.A",
          "display_name": "Worm:Win32/Fesber.A",
          "target": "/malware/Worm:Win32/Fesber.A"
        },
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        },
        {
          "id": "#LowFi:HSTR:TrojanSpy:Win32/Xtrat",
          "display_name": "#LowFi:HSTR:TrojanSpy:Win32/Xtrat",
          "target": null
        },
        {
          "id": "InstallBrain",
          "display_name": "InstallBrain",
          "target": null
        },
        {
          "id": "InstallCore",
          "display_name": "InstallCore",
          "target": null
        },
        {
          "id": "Ghost RAT",
          "display_name": "Ghost RAT",
          "target": null
        },
        {
          "id": "Cobalt Strike",
          "display_name": "Cobalt Strike",
          "target": null
        },
        {
          "id": "SuppoBox",
          "display_name": "SuppoBox",
          "target": null
        },
        {
          "id": "Occamy",
          "display_name": "Occamy",
          "target": null
        },
        {
          "id": "Agent Tesla",
          "display_name": "Agent Tesla",
          "target": null
        },
        {
          "id": "TrojanSpy:Win32/Bradesco",
          "display_name": "TrojanSpy:Win32/Bradesco",
          "target": "/malware/TrojanSpy:Win32/Bradesco"
        },
        {
          "id": "ALF:HeraklezEval:TrojanClicker:JS/Faceliker",
          "display_name": "ALF:HeraklezEval:TrojanClicker:JS/Faceliker",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1415",
          "name": "URL Scheme Hijacking",
          "display_name": "T1415 - URL Scheme Hijacking"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1122",
          "name": "Component Object Model Hijacking",
          "display_name": "T1122 - Component Object Model Hijacking"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1100",
          "name": "Web Shell",
          "display_name": "T1100 - Web Shell"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.003",
          "name": "Mail Protocols",
          "display_name": "T1071.003 - Mail Protocols"
        },
        {
          "id": "T1030",
          "name": "Data Transfer Size Limits",
          "display_name": "T1030 - Data Transfer Size Limits"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "65acace20c18a7d6c5da2e27",
      "export_count": 43,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 143,
        "FileHash-SHA1": 130,
        "FileHash-SHA256": 1524,
        "URL": 3340,
        "domain": 1735,
        "hostname": 1398,
        "CVE": 1,
        "email": 6,
        "SSLCertFingerprint": 2
      },
      "indicator_count": 8279,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 228,
      "modified_text": "772 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65acace20c18a7d6c5da2e27",
      "name": "VirTool:Win32/AccessMe | Ghost RAT",
      "description": "",
      "modified": "2024-02-13T00:04:59.507000",
      "created": "2024-01-21T05:34:26.800000",
      "tags": [
        "threat",
        "feeds ioc",
        "new ioc",
        "teams api",
        "contact",
        "paste",
        "iocs",
        "analyze",
        "ssl certificate",
        "whois record",
        "historical ssl",
        "resolutions",
        "referrer",
        "whois whois",
        "communicating",
        "contacted",
        "family",
        "roots",
        "lolkek",
        "redline stealer",
        "hacktool",
        "html info",
        "title rexxfield",
        "services",
        "identify",
        "meta tags",
        "rexxfield cyber",
        "investigation",
        "divi child",
        "site kit",
        "google",
        "united",
        "unknown",
        "as24940 hetzner",
        "germany unknown",
        "passive dns",
        "urls",
        "title",
        "moved",
        "scan endpoints",
        "all octoseek",
        "body",
        "cyber stalking",
        "pornographer",
        "urls url",
        "files",
        "ip address",
        "execution",
        "metro",
        "medium",
        "show",
        "search",
        "ids detections",
        "yara detections",
        "win32",
        "ppi useragent",
        "installcapital",
        "http",
        "packing t1045",
        "malware",
        "write",
        "obsession",
        "malvertizing",
        "masquerading",
        "ipv4",
        "pulse submit",
        "url analysis",
        "cookie",
        "status",
        "domain",
        "creation date",
        "trojan",
        "date",
        "expiration date",
        "name servers",
        "trojanclicker",
        "encrypt",
        "error",
        "ransomware",
        "malware generator",
        "meta",
        "for privacy",
        "aaaa",
        "komodo",
        "asnone united",
        "alfper",
        "as22612",
        "nxdomain",
        "gmt x",
        "ransom",
        "virtool",
        "log id",
        "gmtn",
        "digicert tls",
        "rsa sha256",
        "tls web",
        "full name",
        "digicert inc",
        "california",
        "false",
        "pulse pulses",
        "location united",
        "as16276",
        "as14061",
        "code",
        "next",
        "url http",
        "hostname",
        "files domain",
        "files related",
        "ghost rat",
        "webtoolbar",
        "nanocore rat",
        "gamehack",
        "cobalt strike",
        "redlinestealer",
        "installcore",
        "installbrain",
        "emotet",
        "tofsee",
        "bradesco",
        "agent tesla",
        "trojanspy",
        "suppobox",
        "occamy",
        "dnspionage",
        "stealer",
        "networm",
        "as13414 twitter",
        "as32934",
        "script urls",
        "a domains",
        "worm",
        "entries",
        "meta http",
        "window",
        "select contact",
        "domain holder",
        "nexus category",
        "tackle company",
        "postal code",
        "component loop",
        "apache",
        "pragma",
        "value0",
        "ioc search",
        "threat analyzer",
        "hostnames",
        "dangerous",
        "target",
        "targeting",
        "hacker profile",
        "cybercrime",
        "fraud services",
        "strange",
        "tsara brashears",
        "michael roberts",
        "tracey richter",
        "voyeurism",
        "slander",
        "password",
        "hijacker"
      ],
      "references": [
        "https://rexxfield.com/",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian | OS & iOS Password and Password Cracker",
        "www.akhaltsikhe.gov.ge [Germany?]",
        "screencasts.rexxfield.com",
        "https://rexxfield.com [ hmmm...inc.legal] is Alienvault a subsidiary of Rexxfields unwarranted investigation/spy campaign? Confused",
        "https://www.akhaltsikhe.gov.ge/ | GMT Server LiteSpeed location",
        "94.130.71.173 [scanning host]",
        "http://www.objectaid.com/update/current/p2.index [AIN Phishing IOC's]",
        "https://www.couriermail.com.au/ipad/custody-bid-strands-family/news-story/23c2c9a5fc984edc04d29655c641f484",
        "Michael Roberts Australia, Germany, Iowa, New York Friend of Ben",
        "Michael Roberts - murder suspect, victim, hacker, PI",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/ [text, email, collection]",
        "https://ladys.one/xxx/a-tsara-brashears-zafira-porn",
        "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net [BitCoinAussie ?]",
        "98cc05d9c12c214deadfe71af22cd3862e7417c0 [backdoor | PPI User-Agent (InstallCapital)]",
        "a.nel.cloudflare.com / api.w.org",
        "miles.ns.cloudflare.com",
        "https://otx.alienvault.com/indicator/url/https://media.toxtren.com/redirect.aspx?pid=272789&&bid=1971&&lpid=2119&&subid=18b8dh9scxi7sbl11f&&sref=inhousecpa&&inhousecpa=Kiev_Dima_BR_Setki",
        "https://www.google.com/?authuser=0"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "LolKek",
          "display_name": "LolKek",
          "target": null
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        },
        {
          "id": "RedLine Stealer",
          "display_name": "RedLine Stealer",
          "target": null
        },
        {
          "id": "TrojanClicker",
          "display_name": "TrojanClicker",
          "target": null
        },
        {
          "id": "Win32:Malware-gen",
          "display_name": "Win32:Malware-gen",
          "target": null
        },
        {
          "id": "ALFPER:InstallCapital",
          "display_name": "ALFPER:InstallCapital",
          "target": null
        },
        {
          "id": "VirTool:MSIL/CryptInject.CF!MTB",
          "display_name": "VirTool:MSIL/CryptInject.CF!MTB",
          "target": "/malware/VirTool:MSIL/CryptInject.CF!MTB"
        },
        {
          "id": "Win.Malware.Downloadguide-6803841-0",
          "display_name": "Win.Malware.Downloadguide-6803841-0",
          "target": null
        },
        {
          "id": "Win.Packed.kkrunchy-7049457-1",
          "display_name": "Win.Packed.kkrunchy-7049457-1",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:SoftwareBundler:Win32/Prepscram",
          "display_name": "ALF:HeraklezEval:SoftwareBundler:Win32/Prepscram",
          "target": null
        },
        {
          "id": "TrojanDownloader:Win32/Upatre.A",
          "display_name": "TrojanDownloader:Win32/Upatre.A",
          "target": "/malware/TrojanDownloader:Win32/Upatre.A"
        },
        {
          "id": "Trojan:Win32/Qbot.R!MTB",
          "display_name": "Trojan:Win32/Qbot.R!MTB",
          "target": "/malware/Trojan:Win32/Qbot.R!MTB"
        },
        {
          "id": "ALF:HeraklezEval:Trojan:BAT/Musecador",
          "display_name": "ALF:HeraklezEval:Trojan:BAT/Musecador",
          "target": null
        },
        {
          "id": "Backdoor:Win32/Wabot.A",
          "display_name": "Backdoor:Win32/Wabot.A",
          "target": "/malware/Backdoor:Win32/Wabot.A"
        },
        {
          "id": "Ransom:Win32/G And Crab!rfn",
          "display_name": "Ransom:Win32/G And Crab!rfn",
          "target": "/malware/Ransom:Win32/G And Crab!rfn"
        },
        {
          "id": "Ransom:Win32/WannaCrypt.A!rsm",
          "display_name": "Ransom:Win32/WannaCrypt.A!rsm",
          "target": "/malware/Ransom:Win32/WannaCrypt.A!rsm"
        },
        {
          "id": "Tofsee",
          "display_name": "Tofsee",
          "target": null
        },
        {
          "id": "#Lowfi:FOP:VirTool:Win32/Injector",
          "display_name": "#Lowfi:FOP:VirTool:Win32/Injector",
          "target": null
        },
        {
          "id": "Nanocore RAT",
          "display_name": "Nanocore RAT",
          "target": null
        },
        {
          "id": "Worm:Win32/Fesber.A",
          "display_name": "Worm:Win32/Fesber.A",
          "target": "/malware/Worm:Win32/Fesber.A"
        },
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        },
        {
          "id": "#LowFi:HSTR:TrojanSpy:Win32/Xtrat",
          "display_name": "#LowFi:HSTR:TrojanSpy:Win32/Xtrat",
          "target": null
        },
        {
          "id": "InstallBrain",
          "display_name": "InstallBrain",
          "target": null
        },
        {
          "id": "InstallCore",
          "display_name": "InstallCore",
          "target": null
        },
        {
          "id": "Ghost RAT",
          "display_name": "Ghost RAT",
          "target": null
        },
        {
          "id": "Cobalt Strike",
          "display_name": "Cobalt Strike",
          "target": null
        },
        {
          "id": "SuppoBox",
          "display_name": "SuppoBox",
          "target": null
        },
        {
          "id": "Occamy",
          "display_name": "Occamy",
          "target": null
        },
        {
          "id": "Agent Tesla",
          "display_name": "Agent Tesla",
          "target": null
        },
        {
          "id": "TrojanSpy:Win32/Bradesco",
          "display_name": "TrojanSpy:Win32/Bradesco",
          "target": "/malware/TrojanSpy:Win32/Bradesco"
        },
        {
          "id": "ALF:HeraklezEval:TrojanClicker:JS/Faceliker",
          "display_name": "ALF:HeraklezEval:TrojanClicker:JS/Faceliker",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1415",
          "name": "URL Scheme Hijacking",
          "display_name": "T1415 - URL Scheme Hijacking"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1122",
          "name": "Component Object Model Hijacking",
          "display_name": "T1122 - Component Object Model Hijacking"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1100",
          "name": "Web Shell",
          "display_name": "T1100 - Web Shell"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.003",
          "name": "Mail Protocols",
          "display_name": "T1071.003 - Mail Protocols"
        },
        {
          "id": "T1030",
          "name": "Data Transfer Size Limits",
          "display_name": "T1030 - Data Transfer Size Limits"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "65a342310ab3d2c69778d608",
      "export_count": 24,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 143,
        "FileHash-SHA1": 130,
        "FileHash-SHA256": 1524,
        "URL": 3340,
        "domain": 1735,
        "hostname": 1398,
        "CVE": 1,
        "email": 6,
        "SSLCertFingerprint": 2
      },
      "indicator_count": 8279,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 219,
      "modified_text": "796 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "aptracking1.com",
    "type": "Domain"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "aptracking1.com",
    "found": false,
    "verdict": "clean",
    "urls": [],
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776641776.006645
}