{
  "type": "Domain",
  "indicator": "becauseproblem.net",
  "general": {
    "sections": [
      "general",
      "geo",
      "url_list",
      "passive_dns",
      "malware",
      "whois",
      "http_scans"
    ],
    "whois": "http://whois.domaintools.com/becauseproblem.net",
    "alexa": "http://www.alexa.com/siteinfo/becauseproblem.net",
    "indicator": "becauseproblem.net",
    "type": "domain",
    "type_title": "Domain",
    "validation": [],
    "base_indicator": {
      "id": 3456095858,
      "indicator": "becauseproblem.net",
      "type": "domain",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 8,
      "pulses": [
        {
          "id": "66eeef55e2c1ec3a4fa60ef4",
          "name": "Android",
          "description": "",
          "modified": "2024-10-25T00:05:34.912000",
          "created": "2024-09-21T16:07:49.763000",
          "tags": [
            "read c",
            "write c",
            "create c",
            "delete c",
            "process32nextw",
            "langchinese",
            "search",
            "regsetvalueexa",
            "medium",
            "show",
            "trojan",
            "malware",
            "copy",
            "write",
            "win32",
            "tools",
            "persistence",
            "execution",
            "local",
            "next",
            "count",
            "august",
            "scan endpoints",
            "all scoreblue",
            "url http",
            "pulse pulses",
            "http",
            "domain",
            "passive dns",
            "urls",
            "files related",
            "pulses otx",
            "unknown",
            "cname",
            "files",
            "ip address",
            "as16276",
            "spain unknown",
            "meta name",
            "frame src",
            "ok set",
            "cookie",
            "gmt date",
            "gmt content",
            "encrypt",
            "france",
            "nxdomain",
            "ns nxdomain",
            "aaaa nxdomain",
            "name servers",
            "soa nxdomain",
            "moved",
            "creation date",
            "date",
            "body",
            "aaaa",
            "asnone belgium",
            "united kingdom",
            "as16276 ovh",
            "sha256",
            "maltaterfb",
            "showing",
            "total",
            "read",
            "delete",
            "default",
            "systemroot",
            "high",
            "virtool",
            "virustotal",
            "hacktool",
            "drweb",
            "vipre",
            "panda",
            "et trojan",
            "msie",
            "windows nt",
            "entries",
            "ascii text",
            "intel",
            "ms windows",
            "salicode",
            "emails",
            "expiration date",
            "france unknown",
            "taskmail",
            "task3dmail",
            "capspdf1",
            "mboxinbox",
            "actionshow",
            "twitter",
            "canada unknown",
            "error",
            "ipv4",
            "backend",
            "alfper",
            "gmt contenttype",
            "gmt server",
            "apache",
            "exploit",
            "hostname",
            "dynamicloader",
            "yara rule",
            "delivery",
            "alpha criteria",
            "inno setup",
            "format",
            "june",
            "stack",
            "dummy",
            "overview domain",
            "pulses",
            "tags",
            "related tags",
            "google safe",
            "browsing",
            "record type",
            "ttl value",
            "status",
            "united",
            "asnone united",
            "record value",
            "trojanproxy",
            "servers",
            "as15169 google",
            "for privacy",
            "domains ii",
            "ransom",
            "checks",
            "bios",
            "cpu name",
            "dynamic",
            "filehash",
            "related nids",
            "files location",
            "ddos",
            "activity",
            "checkin",
            "win64",
            "mirai",
            "technology",
            "dns replication",
            "system label",
            "cloudflarenet",
            "apnic",
            "south brisbane",
            "asia pacific",
            "apnic whois",
            "po box",
            "cordelia st",
            "comment",
            "apnic research",
            "nethandle",
            "arin",
            "andariel",
            "yara detections",
            "malware traffic",
            "nids",
            "icmp traffic",
            "dns query",
            "tcp syn",
            "resolverror",
            "externalport",
            "internalport",
            "http headers",
            "home network",
            "pulse submit",
            "url analysis",
            "mitre att",
            "ta0002 shared",
            "modules t1129",
            "windows",
            "ta0004 access",
            "t1134",
            "defense evasion",
            "xor encrypt",
            "rc4 prga",
            "catalog tree",
            "analysis ob0001",
            "analysis ob0002",
            "command",
            "control ob0004",
            "ob0005 defense",
            "evasion ob0006",
            "file system",
            "oc0001 process",
            "oc0003 data",
            "hashes c2ae",
            "capa",
            "cape sandbox",
            "lastline",
            "microsoft",
            "memory pattern",
            "dns resolutions",
            "ip traffic",
            "urls tcp",
            "tiger rat",
            "hi",
            "helping sabey"
          ],
          "references": [
            "Andariel Backdoor Activity (Checkin)",
            "IDS: WGET Command Specifying Output in HTTP Headers",
            "IDS: D-Link Devices Home Network Administration Protocol Command Execution",
            "Trojan.NukeSped./TigerRat | Trojan[APT]/Win32.Lazarus | Cited: Andariel group \u00bb state-sponsored threat actor & Defense media",
            "Mr. Telephone man. there js something wrong with her line when she tries to dial a number, she gets a freak every time..."
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Trojan:Win32/Tonmye",
              "display_name": "Trojan:Win32/Tonmye",
              "target": "/malware/Trojan:Win32/Tonmye"
            },
            {
              "id": "Win32:Kamso",
              "display_name": "Win32:Kamso",
              "target": null
            },
            {
              "id": "VirTool:Win32/CeeInject.GF",
              "display_name": "VirTool:Win32/CeeInject.GF",
              "target": "/malware/VirTool:Win32/CeeInject.GF"
            },
            {
              "id": "ALFPER:PUA:Win32/InstallCore",
              "display_name": "ALFPER:PUA:Win32/InstallCore",
              "target": null
            },
            {
              "id": "Trojan:Win32/Tonmye!rfn",
              "display_name": "Trojan:Win32/Tonmye!rfn",
              "target": "/malware/Trojan:Win32/Tonmye!rfn"
            },
            {
              "id": "Ransom:Win32/Ako",
              "display_name": "Ransom:Win32/Ako",
              "target": "/malware/Ransom:Win32/Ako"
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "ARIN",
              "display_name": "ARIN",
              "target": null
            },
            {
              "id": "APNIC",
              "display_name": "APNIC",
              "target": null
            },
            {
              "id": "ELF:DDoS-Y\\ [Trj]",
              "display_name": "ELF:DDoS-Y\\ [Trj]",
              "target": null
            },
            {
              "id": "Unix.Trojan.Mirai-6981169-0",
              "display_name": "Unix.Trojan.Mirai-6981169-0",
              "target": null
            },
            {
              "id": "Trojan[APT]/Win32.Lazarus",
              "display_name": "Trojan[APT]/Win32.Lazarus",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1023",
              "name": "Shortcut Modification",
              "display_name": "T1023 - Shortcut Modification"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1089",
              "name": "Disabling Security Tools",
              "display_name": "T1089 - Disabling Security Tools"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1134",
              "name": "Access Token Manipulation",
              "display_name": "T1134 - Access Token Manipulation"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "66ebda7ebbe759bb12cebd4a",
          "export_count": 43,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "MayDay23",
            "id": "292773",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 889,
            "FileHash-SHA1": 817,
            "FileHash-SHA256": 3623,
            "domain": 755,
            "SSLCertFingerprint": 1,
            "URL": 396,
            "hostname": 732,
            "email": 14,
            "CVE": 3,
            "CIDR": 2
          },
          "indicator_count": 7232,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 10,
          "modified_text": "542 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "67176428e4871c2726288178",
          "name": "Android",
          "description": "",
          "modified": "2024-10-25T00:05:34.912000",
          "created": "2024-10-22T08:36:56.514000",
          "tags": [
            "read c",
            "write c",
            "create c",
            "delete c",
            "process32nextw",
            "langchinese",
            "search",
            "regsetvalueexa",
            "medium",
            "show",
            "trojan",
            "malware",
            "copy",
            "write",
            "win32",
            "tools",
            "persistence",
            "execution",
            "local",
            "next",
            "count",
            "august",
            "scan endpoints",
            "all scoreblue",
            "url http",
            "pulse pulses",
            "http",
            "domain",
            "passive dns",
            "urls",
            "files related",
            "pulses otx",
            "unknown",
            "cname",
            "files",
            "ip address",
            "as16276",
            "spain unknown",
            "meta name",
            "frame src",
            "ok set",
            "cookie",
            "gmt date",
            "gmt content",
            "encrypt",
            "france",
            "nxdomain",
            "ns nxdomain",
            "aaaa nxdomain",
            "name servers",
            "soa nxdomain",
            "moved",
            "creation date",
            "date",
            "body",
            "aaaa",
            "asnone belgium",
            "united kingdom",
            "as16276 ovh",
            "sha256",
            "maltaterfb",
            "showing",
            "total",
            "read",
            "delete",
            "default",
            "systemroot",
            "high",
            "virtool",
            "virustotal",
            "hacktool",
            "drweb",
            "vipre",
            "panda",
            "et trojan",
            "msie",
            "windows nt",
            "entries",
            "ascii text",
            "intel",
            "ms windows",
            "salicode",
            "emails",
            "expiration date",
            "france unknown",
            "taskmail",
            "task3dmail",
            "capspdf1",
            "mboxinbox",
            "actionshow",
            "twitter",
            "canada unknown",
            "error",
            "ipv4",
            "backend",
            "alfper",
            "gmt contenttype",
            "gmt server",
            "apache",
            "exploit",
            "hostname",
            "dynamicloader",
            "yara rule",
            "delivery",
            "alpha criteria",
            "inno setup",
            "format",
            "june",
            "stack",
            "dummy",
            "overview domain",
            "pulses",
            "tags",
            "related tags",
            "google safe",
            "browsing",
            "record type",
            "ttl value",
            "status",
            "united",
            "asnone united",
            "record value",
            "trojanproxy",
            "servers",
            "as15169 google",
            "for privacy",
            "domains ii",
            "ransom",
            "checks",
            "bios",
            "cpu name",
            "dynamic",
            "filehash",
            "related nids",
            "files location",
            "ddos",
            "activity",
            "checkin",
            "win64",
            "mirai",
            "technology",
            "dns replication",
            "system label",
            "cloudflarenet",
            "apnic",
            "south brisbane",
            "asia pacific",
            "apnic whois",
            "po box",
            "cordelia st",
            "comment",
            "apnic research",
            "nethandle",
            "arin",
            "andariel",
            "yara detections",
            "malware traffic",
            "nids",
            "icmp traffic",
            "dns query",
            "tcp syn",
            "resolverror",
            "externalport",
            "internalport",
            "http headers",
            "home network",
            "pulse submit",
            "url analysis",
            "mitre att",
            "ta0002 shared",
            "modules t1129",
            "windows",
            "ta0004 access",
            "t1134",
            "defense evasion",
            "xor encrypt",
            "rc4 prga",
            "catalog tree",
            "analysis ob0001",
            "analysis ob0002",
            "command",
            "control ob0004",
            "ob0005 defense",
            "evasion ob0006",
            "file system",
            "oc0001 process",
            "oc0003 data",
            "hashes c2ae",
            "capa",
            "cape sandbox",
            "lastline",
            "microsoft",
            "memory pattern",
            "dns resolutions",
            "ip traffic",
            "urls tcp",
            "tiger rat",
            "hi",
            "helping sabey"
          ],
          "references": [
            "Andariel Backdoor Activity (Checkin)",
            "IDS: WGET Command Specifying Output in HTTP Headers",
            "IDS: D-Link Devices Home Network Administration Protocol Command Execution",
            "Trojan.NukeSped./TigerRat | Trojan[APT]/Win32.Lazarus | Cited: Andariel group \u00bb state-sponsored threat actor & Defense media",
            "Mr. Telephone man. there js something wrong with her line when she tries to dial a number, she gets a freak every time..."
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Trojan:Win32/Tonmye",
              "display_name": "Trojan:Win32/Tonmye",
              "target": "/malware/Trojan:Win32/Tonmye"
            },
            {
              "id": "Win32:Kamso",
              "display_name": "Win32:Kamso",
              "target": null
            },
            {
              "id": "VirTool:Win32/CeeInject.GF",
              "display_name": "VirTool:Win32/CeeInject.GF",
              "target": "/malware/VirTool:Win32/CeeInject.GF"
            },
            {
              "id": "ALFPER:PUA:Win32/InstallCore",
              "display_name": "ALFPER:PUA:Win32/InstallCore",
              "target": null
            },
            {
              "id": "Trojan:Win32/Tonmye!rfn",
              "display_name": "Trojan:Win32/Tonmye!rfn",
              "target": "/malware/Trojan:Win32/Tonmye!rfn"
            },
            {
              "id": "Ransom:Win32/Ako",
              "display_name": "Ransom:Win32/Ako",
              "target": "/malware/Ransom:Win32/Ako"
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "ARIN",
              "display_name": "ARIN",
              "target": null
            },
            {
              "id": "APNIC",
              "display_name": "APNIC",
              "target": null
            },
            {
              "id": "ELF:DDoS-Y\\ [Trj]",
              "display_name": "ELF:DDoS-Y\\ [Trj]",
              "target": null
            },
            {
              "id": "Unix.Trojan.Mirai-6981169-0",
              "display_name": "Unix.Trojan.Mirai-6981169-0",
              "target": null
            },
            {
              "id": "Trojan[APT]/Win32.Lazarus",
              "display_name": "Trojan[APT]/Win32.Lazarus",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1023",
              "name": "Shortcut Modification",
              "display_name": "T1023 - Shortcut Modification"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1089",
              "name": "Disabling Security Tools",
              "display_name": "T1089 - Disabling Security Tools"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1134",
              "name": "Access Token Manipulation",
              "display_name": "T1134 - Access Token Manipulation"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "66eeef55e2c1ec3a4fa60ef4",
          "export_count": 33,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": true,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "jefivnguyen",
            "id": "293031",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 889,
            "FileHash-SHA1": 817,
            "FileHash-SHA256": 3623,
            "domain": 755,
            "SSLCertFingerprint": 1,
            "URL": 396,
            "hostname": 732,
            "email": 14,
            "CVE": 3,
            "CIDR": 2
          },
          "indicator_count": 7232,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 37,
          "modified_text": "542 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "66ebda7ebbe759bb12cebd4a",
          "name": "Andariel Backdoor Activity - Mirai found  in Android",
          "description": "Andariel Backdoor Activity: Cited as a state sponsored threat group, this ET malware Check in) can be accessed by decent hackers. Found in a targets android device. \n\nDevice being used to attack , manipulate accounts , files and every CnC  Botmaster task desired.\n\nNote:. Hack responsibly.. Stop attacking innocent civilians.",
          "modified": "2024-10-19T07:01:20.116000",
          "created": "2024-09-19T08:02:06.265000",
          "tags": [
            "read c",
            "write c",
            "create c",
            "delete c",
            "process32nextw",
            "langchinese",
            "search",
            "regsetvalueexa",
            "medium",
            "show",
            "trojan",
            "malware",
            "copy",
            "write",
            "win32",
            "tools",
            "persistence",
            "execution",
            "local",
            "next",
            "count",
            "august",
            "scan endpoints",
            "all scoreblue",
            "url http",
            "pulse pulses",
            "http",
            "domain",
            "passive dns",
            "urls",
            "files related",
            "pulses otx",
            "unknown",
            "cname",
            "files",
            "ip address",
            "as16276",
            "spain unknown",
            "meta name",
            "frame src",
            "ok set",
            "cookie",
            "gmt date",
            "gmt content",
            "encrypt",
            "france",
            "nxdomain",
            "ns nxdomain",
            "aaaa nxdomain",
            "name servers",
            "soa nxdomain",
            "moved",
            "creation date",
            "date",
            "body",
            "aaaa",
            "asnone belgium",
            "united kingdom",
            "as16276 ovh",
            "sha256",
            "maltaterfb",
            "showing",
            "total",
            "read",
            "delete",
            "default",
            "systemroot",
            "high",
            "virtool",
            "virustotal",
            "hacktool",
            "drweb",
            "vipre",
            "panda",
            "et trojan",
            "msie",
            "windows nt",
            "entries",
            "ascii text",
            "intel",
            "ms windows",
            "salicode",
            "emails",
            "expiration date",
            "france unknown",
            "taskmail",
            "task3dmail",
            "capspdf1",
            "mboxinbox",
            "actionshow",
            "twitter",
            "canada unknown",
            "error",
            "ipv4",
            "backend",
            "alfper",
            "gmt contenttype",
            "gmt server",
            "apache",
            "exploit",
            "hostname",
            "dynamicloader",
            "yara rule",
            "delivery",
            "alpha criteria",
            "inno setup",
            "format",
            "june",
            "stack",
            "dummy",
            "overview domain",
            "pulses",
            "tags",
            "related tags",
            "google safe",
            "browsing",
            "record type",
            "ttl value",
            "status",
            "united",
            "asnone united",
            "record value",
            "trojanproxy",
            "servers",
            "as15169 google",
            "for privacy",
            "domains ii",
            "ransom",
            "checks",
            "bios",
            "cpu name",
            "dynamic",
            "filehash",
            "related nids",
            "files location",
            "ddos",
            "activity",
            "checkin",
            "win64",
            "mirai",
            "technology",
            "dns replication",
            "system label",
            "cloudflarenet",
            "apnic",
            "south brisbane",
            "asia pacific",
            "apnic whois",
            "po box",
            "cordelia st",
            "comment",
            "apnic research",
            "nethandle",
            "arin",
            "andariel",
            "yara detections",
            "malware traffic",
            "nids",
            "icmp traffic",
            "dns query",
            "tcp syn",
            "resolverror",
            "externalport",
            "internalport",
            "http headers",
            "home network",
            "pulse submit",
            "url analysis",
            "mitre att",
            "ta0002 shared",
            "modules t1129",
            "windows",
            "ta0004 access",
            "t1134",
            "defense evasion",
            "xor encrypt",
            "rc4 prga",
            "catalog tree",
            "analysis ob0001",
            "analysis ob0002",
            "command",
            "control ob0004",
            "ob0005 defense",
            "evasion ob0006",
            "file system",
            "oc0001 process",
            "oc0003 data",
            "hashes c2ae",
            "capa",
            "cape sandbox",
            "lastline",
            "microsoft",
            "memory pattern",
            "dns resolutions",
            "ip traffic",
            "urls tcp",
            "tiger rat",
            "hi",
            "helping sabey"
          ],
          "references": [
            "Andariel Backdoor Activity (Checkin)",
            "IDS: WGET Command Specifying Output in HTTP Headers",
            "IDS: D-Link Devices Home Network Administration Protocol Command Execution",
            "Trojan.NukeSped./TigerRat | Trojan[APT]/Win32.Lazarus | Cited: Andariel group \u00bb state-sponsored threat actor & Defense media",
            "Mr. Telephone man. there js something wrong with her line when she tries to dial a number, she gets a freak every time..."
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Trojan:Win32/Tonmye",
              "display_name": "Trojan:Win32/Tonmye",
              "target": "/malware/Trojan:Win32/Tonmye"
            },
            {
              "id": "Win32:Kamso",
              "display_name": "Win32:Kamso",
              "target": null
            },
            {
              "id": "VirTool:Win32/CeeInject.GF",
              "display_name": "VirTool:Win32/CeeInject.GF",
              "target": "/malware/VirTool:Win32/CeeInject.GF"
            },
            {
              "id": "ALFPER:PUA:Win32/InstallCore",
              "display_name": "ALFPER:PUA:Win32/InstallCore",
              "target": null
            },
            {
              "id": "Trojan:Win32/Tonmye!rfn",
              "display_name": "Trojan:Win32/Tonmye!rfn",
              "target": "/malware/Trojan:Win32/Tonmye!rfn"
            },
            {
              "id": "Ransom:Win32/Ako",
              "display_name": "Ransom:Win32/Ako",
              "target": "/malware/Ransom:Win32/Ako"
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "ARIN",
              "display_name": "ARIN",
              "target": null
            },
            {
              "id": "APNIC",
              "display_name": "APNIC",
              "target": null
            },
            {
              "id": "ELF:DDoS-Y\\ [Trj]",
              "display_name": "ELF:DDoS-Y\\ [Trj]",
              "target": null
            },
            {
              "id": "Unix.Trojan.Mirai-6981169-0",
              "display_name": "Unix.Trojan.Mirai-6981169-0",
              "target": null
            },
            {
              "id": "Trojan[APT]/Win32.Lazarus",
              "display_name": "Trojan[APT]/Win32.Lazarus",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1023",
              "name": "Shortcut Modification",
              "display_name": "T1023 - Shortcut Modification"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1089",
              "name": "Disabling Security Tools",
              "display_name": "T1089 - Disabling Security Tools"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1134",
              "name": "Access Token Manipulation",
              "display_name": "T1134 - Access Token Manipulation"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 25,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 889,
            "FileHash-SHA1": 817,
            "FileHash-SHA256": 3623,
            "domain": 755,
            "SSLCertFingerprint": 1,
            "URL": 396,
            "hostname": 732,
            "email": 14,
            "CVE": 3,
            "CIDR": 2
          },
          "indicator_count": 7232,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 234,
          "modified_text": "548 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "66eb3ef6d765187a437767e4",
          "name": "Hijacked 'Operation Endgame' Tofsee  Ransomware",
          "description": "This a project. A target has been put into  different Operations: Project Hilo, Project Helix, Operation Endgame, The NSO Cellebrite Pegasus hit list. These are real and very serious serious threat. Severe Cyber issues made their way to her infected devices as well as the devices of family members. Death threats continue to come in. Several DoD IP addresses found in a PDF. It's unresearched at this time,, DoD via BGP HE has been questionable considering use gateway abuse by SWIPPER. \n\nStill no authority can confirm victim is a suspect. Must be a crazy high to help Jeffrey Scott Reiner PT. DPT  get away with assault in such a ridiculous manner. Court report posted online by Trellis (BS) is of course a falsified , vulnerability filled 'made you click'  document.. Faldif0, empty docmpty doc, citing  it was refreshed in 2023. \nThere is no doubt these  masqueraders mean to intimidate, humiliate, isolate & harm target. These people are not in China. False attribution is likely.  Attack is disseminates from USA.",
          "modified": "2024-10-18T20:04:41.836000",
          "created": "2024-09-18T20:58:30.691000",
          "tags": [
            "as8075",
            "united",
            "pid425870621",
            "tid700443057",
            "tpid425870621",
            "slot1",
            "mascore2",
            "bcnt1",
            "unid88000705",
            "nct1",
            "date",
            "china",
            "china unknown",
            "passive dns",
            "body xml",
            "error code",
            "requestid",
            "hostid ec",
            "server",
            "gmt content",
            "type",
            "registry",
            "intel",
            "ms windows",
            "show",
            "entries",
            "search",
            "high",
            "pe32",
            "high process",
            "injection t1055",
            "salicode",
            "worm",
            "copy",
            "tools",
            "service",
            "write",
            "win32",
            "persistence",
            "execution",
            "april",
            "urls",
            "http",
            "unique",
            "scan endpoints",
            "all scoreblue",
            "url http",
            "pulse pulses",
            "ip address",
            "related nids",
            "code",
            "as54113",
            "unknown",
            "body",
            "fastly error",
            "please",
            "sea p",
            "msil",
            "accept",
            "aaaa",
            "nxdomain",
            "whitelisted",
            "as15169 google",
            "status",
            "as44273 host",
            "as46691",
            "domain",
            "url https",
            "files location",
            "info",
            "script urls",
            "path max",
            "age86400 set",
            "cookie",
            "script domains",
            "javascript",
            "script script",
            "trojanspy",
            "cname",
            "emails",
            "servers",
            "all search",
            "related pulses",
            "file samples",
            "files matching",
            "creation date",
            "germany unknown",
            "yara detections",
            "filehash",
            "av detections",
            "ids detections",
            "alerts",
            "analysis date",
            "file score",
            "meta",
            "home welcome",
            "write c",
            "delete c",
            "query",
            "local",
            "hostname",
            "a domains",
            "lowfi",
            "content type",
            "record value",
            "suite",
            "showing",
            "asnone united",
            "as29873",
            "ipv4",
            "pulse submit",
            "url analysis",
            "files",
            "pe32 executable",
            "potential scan",
            "0pgtwhu",
            "t1045",
            "port",
            "infection",
            "recon",
            "malware",
            "june",
            "delphi",
            "taobao network",
            "as45102 alibaba",
            "as4812 china",
            "next",
            "expiration date",
            "name servers",
            "dynamicloader",
            "dynamic",
            "sha256",
            "dynamic link",
            "library exe",
            "adobe",
            "incorporated",
            "read",
            "yara rule",
            "delete",
            "binary file",
            "push",
            "malicious",
            "july",
            "iocs",
            "levelbluelabs",
            "jeff4son",
            "adversaries",
            "registry run",
            "flow t1574",
            "dll sideloading",
            "boot",
            "logon autostart",
            "execution t1547",
            "keys",
            "startup folder",
            "t1497 may",
            "encryption",
            "catalog tree",
            "analysis ob0001",
            "virtual machine",
            "detection b0009",
            "check registry",
            "analysis ob0002",
            "executable code",
            "stack strings",
            "control ob0004",
            "get http",
            "http requests",
            "dns resolutions",
            "ip traffic",
            "pattern domains",
            "memory pattern",
            "urls http",
            "request",
            "response",
            "connection",
            "trojan",
            "otx scoreblue",
            "windows",
            "embeddedwb",
            "medium",
            "shellexecuteexw",
            "msie",
            "windows nt",
            "displayname",
            "tofsee",
            "hashes",
            "vhash",
            "authentihash",
            "ssdeep",
            "win32 exe",
            "magic pe32",
            "trid win32",
            "library",
            "read c",
            "file guard",
            "rtversion",
            "langchinese",
            "legalcopyright",
            "reserved",
            "ransom",
            "moved",
            "media",
            "ascii text",
            "default",
            "upack",
            "mike",
            "contacted",
            "x87xe1x1d",
            "regsetvalueexa",
            "x95xd3xa4",
            "regbinary",
            "x84xa8xe8i",
            "x8dxb7xb7",
            "hx88x9ax1e",
            "mx81xd1r",
            "x92xac",
            "xc2x84",
            "stream",
            "swipper",
            "pdfcreator.sf.net",
            "botnet",
            "black mercedes",
            "please forgive me",
            "therahand thouroughhand"
          ],
          "references": [
            "Project Endgame - pegausintel.com -Unsjre if related to NSO Group",
            "Antivirus Detections: ALF:HeraklezEval:Rogue:Win32/FakeRean",
            "Yara Detections: compromised_site_redirector_fromcharcode ,  Cabinet_Archive ,  SFX_CAB",
            "Alerts: infostealer_cookies persistence_autorun recon_programs recon_fingerprint removes_zoneid_ads anomalous_deletefile",
            "P\u2019s Contacted:  93.184.221.240  3.33.130.190 |  Domains Contacted: counterslocal.com",
            "compromised_site_redirector_fromcharcode fromCharCode",
            "Interesting Strings: http://www.interoperabilitybridges.com/wmp http://crbug.com/40902 http://crbug.com/516527",
            "Interesting Strings: http://service.real.com/realplayer/security/02062012_player/en/",
            "Interesting Strings: https://support.google.com/chrome/?p=plugin_pdf",
            "https://support.google.com/chrome/?p=plugin_quicktime https://chrome.google.com/",
            "Interesting Strings: http://schema.org/GovernmentOrganization https://support.google.com/chrome/?p=plugin_java https://crbug.com/593166",
            "Pdf.Phishing.TtraffRobotInstall-7605656-0 00004feb58be42ba1bd506ea89f90c5e1d83e6e1fb84841931949a454b0bb539",
            "Antivirus Detections Cryp_Xed-12 ,  Mal/Generic-S ,  Packed/Upack Yara Detections Upackv039finalDwing ,  UpackV037Dwing",
            "https://pin.it/ | https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Worm:Win32/Macoute.A",
              "display_name": "Worm:Win32/Macoute.A",
              "target": "/malware/Worm:Win32/Macoute.A"
            },
            {
              "id": "TrojanDownloader:Win32/Nemucod",
              "display_name": "TrojanDownloader:Win32/Nemucod",
              "target": "/malware/TrojanDownloader:Win32/Nemucod"
            },
            {
              "id": "TrojanSpy:Win32/Nivdort",
              "display_name": "TrojanSpy:Win32/Nivdort",
              "target": "/malware/TrojanSpy:Win32/Nivdort"
            },
            {
              "id": "ALF:HeraklezEval:Rogue:Win32/FakeRean",
              "display_name": "ALF:HeraklezEval:Rogue:Win32/FakeRean",
              "target": null
            },
            {
              "id": "Worm:Win32/Fesber.A",
              "display_name": "Worm:Win32/Fesber.A",
              "target": "/malware/Worm:Win32/Fesber.A"
            },
            {
              "id": "Ransom:Win32/Eniqma.A",
              "display_name": "Ransom:Win32/Eniqma.A",
              "target": "/malware/Ransom:Win32/Eniqma.A"
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "UpackV037Dwing",
              "display_name": "UpackV037Dwing",
              "target": null
            },
            {
              "id": "Cryp_Xed-12",
              "display_name": "Cryp_Xed-12",
              "target": null
            },
            {
              "id": "Mal/Generic-S",
              "display_name": "Mal/Generic-S",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1089",
              "name": "Disabling Security Tools",
              "display_name": "T1089 - Disabling Security Tools"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1018",
              "name": "Remote System Discovery",
              "display_name": "T1018 - Remote System Discovery"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            },
            {
              "id": "T1096",
              "name": "NTFS File Attributes",
              "display_name": "T1096 - NTFS File Attributes"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 29,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1493,
            "FileHash-SHA1": 1393,
            "FileHash-SHA256": 5881,
            "URL": 1495,
            "domain": 1947,
            "hostname": 1360,
            "email": 18,
            "CVE": 1
          },
          "indicator_count": 13588,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 229,
          "modified_text": "548 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65c012b5e56cc9474ebb701f",
          "name": "Cyber espionage & Ransomware attacks spread via Phone calls",
          "description": "Very strange and critical occurrences of businesses, healthcare facilities and individuals becoming part of a botnet and hacking attack when call connects with certain individuals. Healthcare facilities may be spreading this very critical vulnerability.  Attacker has access to every device & camera of affected.\n*Smoke Loader\nSmoke Loader is a malicious bot application that can be used to load other malware.Smoke Loader has been seen in the wild since at least 2011 and has included a number of different payloads. It is notorious for its use of deception and self-protection. It also comes with several plug-ins.",
          "modified": "2024-03-05T22:00:26.685000",
          "created": "2024-02-04T22:41:55.432000",
          "tags": [
            "ssl certificate",
            "whois record",
            "contacted",
            "execution",
            "historical ssl",
            "contacted urls",
            "whois whois",
            "zfglddkl58a url",
            "q0gpyr1balpdgpo",
            "relacionada",
            "formbook",
            "smoke loader",
            "iframe",
            "january",
            "resolutions",
            "referrer",
            "threat roundup",
            "snatch",
            "ransomware",
            "hacktool",
            "record type",
            "ttl value",
            "tsara brashears",
            "apple",
            "apple ios",
            "password bypass",
            "malware",
            "password",
            "apple phone",
            "download",
            "crypto",
            "relic",
            "monitoring",
            "installer",
            "tofsee",
            "core",
            "qakbot",
            "lumma stealer",
            "ransomexx",
            "communicating",
            "el0kpmhlfz",
            "qdkxgr24yz",
            "kgs0",
            "kls0",
            "malicious",
            "phi",
            "pii",
            "dofoil",
            "worn",
            "rat",
            "network",
            "dns",
            "trojan",
            "remote",
            "phone hacking",
            "hacked by phone call",
            "http response",
            "final url",
            "ip address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers",
            "nginx",
            "html info",
            "information",
            "meta tags",
            "network",
            "march",
            "july",
            "september",
            "february",
            "redline stealer",
            "probe",
            "raccoonstealer",
            "no data",
            "tag count",
            "thu apr",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "asyncrat",
            "redlinestealer",
            "diamondfox",
            "first",
            "botnet command and control",
            "python connection",
            "tulach"
          ],
          "references": [
            "https://www.crccolorado.com/dr-adam-sang",
            "CS IDS Rules: MALWARE Possible Compromised Host",
            "CS IDS Rules: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz",
            "CS IDS Rules: SERVER-OTHER Squid HTTP Vary response header denial of service attempt",
            "CS IDS Rules: ET MALWARE Possible Zeus GameOver/FluBot Related DGA NXDOMAIN Responses",
            "CS IDS Rules: ET AnubisNetworks Sinkhole Cookie Value btst",
            "http://www.defi-realty.com/jem9/  [phishing]",
            "http://45.159.189.105/bot/regex    [phishing | tracking]",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/    [phishing | data collection| browser vulnerability]",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian  [password decryption]",
            "https://www.sentinelone.com/blog/going-deep-a-guide-to-reversing-smoke-loader-malware/",
            "https://attack.mitre.org/software/S0226/",
            "http://watchhers.net/index.php. [ data collection]",
            "remotewd.com",
            "https://remote.krogerlaw.com",
            "device-local-7e6b3aa6-e3de-4e8f-9213-9f15c92d1d81.remotewd.com",
            "www.pornhub.com [password decryption]",
            "www.supernetforme.com [CnC]",
            "ddos.dnsnb8.net  [CnC]",
            "http://happylifehappywife.com/wp-content/themes/theme78222/images/top-right.jpg    [phishing]",
            "http://amaiorpascoadetodas2.com/cgi-sys/suspendedpage.cgi?smart-tv-led-55-samsung-55ru7100-ultra-hd-4k-com-conversor-digital-3-hdmi-2-usb-wi-fi-visual-livre-de-cabos-controle-remoto-%C3%9Anico-e-bluetooth-&skullid=539293743",
            "http://amaiorpascoadetodas2.com/cgi-sys/suspendedpage.cgi?smart-tv-led-55-samsung-55ru7100-ultra-hd-4k-com-conversor-digital-3-hdmi-2-usb-wi-fi-visual-livre-de-cabos-controle-remoto-%C3%9Anico-e-bluetooth-&skullid=539293743",
            "http://url7639.ascglobal-email.com/wf/open?upn=HDu-2BON2WuckNVJ2U1s3AlMizU2CbfEvFl7S9TXTdQm2nLS-2F0QX6mc4PxuUDVyCyIzMeTvJRSiC633rEV-2B8mukshW0CHiC-2FvQOWOgJR6RGOtzDWutJV4OtjBHGduMDUigvEESSJQD8KXk1UU3bXtRdyd7QpBC-2F7Ti-2Bq6tNr1C4yz-2FXcUbYvtJX4ip5d5t5eXud233BW97tdcojPu0yKWZ0Zm2DyXbj1RIwt-2FO0RcYLC7feNtrpw6OxBd8r4Tc3uHoT7Z9NFErDUBbBuYpsze-2FiBRziGeeMExS5l82Xna4au56co0IdOcfscmwGtC-2BxD3xiJW4v560wXMZQU0G9hqqPVeYTnwZwyfebBz1KLSW-2BIJtHMF6DCNHhatvrb3WM84-2BGpgCxOK1dFKPiKsmPzSc-2BdCAO9BzU3K6G7EaDYNu2cRHdGmat-2BCJs",
            "https://darkforums.me/Thread-Check-Any-Indian-Vehicle-Owner-Details-home-address-phone-number [Whoa Nelly!]",
            "https://us-bankofamerica.com/PhoneVerification.php/",
            "http://www.w3.org/TR/html4/loose.dtd | www.w3.org  [collection]",
            "http://dl.ariamobile.net/mobile/2008.10.a/applications/My_Phone-v2.01-S60v3-[wWw.Ariamobile.Net].zip",
            "http://iphones.email   [redirection chain]",
            "*Patient PII & PHI at critical risk"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Lumma Stealer",
              "display_name": "Lumma Stealer",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Smoke Loader",
              "display_name": "Smoke Loader",
              "target": null
            },
            {
              "id": "Relic",
              "display_name": "Relic",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "Qakbot",
              "display_name": "Qakbot",
              "target": null
            },
            {
              "id": "RansomEXX",
              "display_name": "RansomEXX",
              "target": null
            },
            {
              "id": "Generic.Malware",
              "display_name": "Generic.Malware",
              "target": null
            },
            {
              "id": "Gen:Variant.Zusy",
              "display_name": "Gen:Variant.Zusy",
              "target": null
            },
            {
              "id": "Razy",
              "display_name": "Razy",
              "target": null
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "SuppoBox",
              "display_name": "SuppoBox",
              "target": null
            },
            {
              "id": "DangerousObject.Multi",
              "display_name": "DangerousObject.Multi",
              "target": null
            },
            {
              "id": "Trojan.Injector",
              "display_name": "Trojan.Injector",
              "target": null
            },
            {
              "id": "Simda",
              "display_name": "Simda",
              "target": null
            },
            {
              "id": "Defacement",
              "display_name": "Defacement",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1110",
              "name": "Brute Force",
              "display_name": "T1110 - Brute Force"
            },
            {
              "id": "T1111",
              "name": "Two-Factor Authentication Interception",
              "display_name": "T1111 - Two-Factor Authentication Interception"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1110.002",
              "name": "Password Cracking",
              "display_name": "T1110.002 - Password Cracking"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1491",
              "name": "Defacement",
              "display_name": "T1491 - Defacement"
            },
            {
              "id": "T1547.001",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1547.001 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1555.003",
              "name": "Credentials from Web Browsers",
              "display_name": "T1555.003 - Credentials from Web Browsers"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1055.012",
              "name": "Process Hollowing",
              "display_name": "T1055.012 - Process Hollowing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1552.001",
              "name": "Credentials In Files",
              "display_name": "T1552.001 - Credentials In Files"
            },
            {
              "id": "T1497.001",
              "name": "System Checks",
              "display_name": "T1497.001 - System Checks"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1059.006",
              "name": "Python",
              "display_name": "T1059.006 - Python"
            },
            {
              "id": "T1059.005",
              "name": "Visual Basic",
              "display_name": "T1059.005 - Visual Basic"
            }
          ],
          "industries": [
            "Healthcare",
            "Civil Society",
            "Patients"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 62,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 244,
            "FileHash-SHA1": 237,
            "FileHash-SHA256": 5468,
            "URL": 3747,
            "domain": 2512,
            "hostname": 1593,
            "CVE": 4
          },
          "indicator_count": 13805,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "775 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65c09e487b3899f3442aed96",
          "name": "Cyber espionage & Ransomware attacks spread via Phone call?",
          "description": "",
          "modified": "2024-03-05T22:00:26.685000",
          "created": "2024-02-05T08:37:28.774000",
          "tags": [
            "ssl certificate",
            "whois record",
            "contacted",
            "execution",
            "historical ssl",
            "contacted urls",
            "whois whois",
            "zfglddkl58a url",
            "q0gpyr1balpdgpo",
            "relacionada",
            "formbook",
            "smoke loader",
            "iframe",
            "january",
            "resolutions",
            "referrer",
            "threat roundup",
            "snatch",
            "ransomware",
            "hacktool",
            "record type",
            "ttl value",
            "tsara brashears",
            "apple",
            "apple ios",
            "password bypass",
            "malware",
            "password",
            "apple phone",
            "download",
            "crypto",
            "relic",
            "monitoring",
            "installer",
            "tofsee",
            "core",
            "qakbot",
            "lumma stealer",
            "ransomexx",
            "communicating",
            "el0kpmhlfz",
            "qdkxgr24yz",
            "kgs0",
            "kls0",
            "malicious",
            "phi",
            "pii",
            "dofoil",
            "worn",
            "rat",
            "network",
            "dns",
            "trojan",
            "remote",
            "phone hacking",
            "hacked by phone call",
            "http response",
            "final url",
            "ip address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers",
            "nginx",
            "html info",
            "information",
            "meta tags",
            "network",
            "march",
            "july",
            "september",
            "february",
            "redline stealer",
            "probe",
            "raccoonstealer",
            "no data",
            "tag count",
            "thu apr",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "asyncrat",
            "redlinestealer",
            "diamondfox",
            "first",
            "botnet command and control",
            "python connection",
            "tulach"
          ],
          "references": [
            "https://www.crccolorado.com/dr-adam-sang",
            "CS IDS Rules: MALWARE Possible Compromised Host",
            "CS IDS Rules: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz",
            "CS IDS Rules: SERVER-OTHER Squid HTTP Vary response header denial of service attempt",
            "CS IDS Rules: ET MALWARE Possible Zeus GameOver/FluBot Related DGA NXDOMAIN Responses",
            "CS IDS Rules: ET AnubisNetworks Sinkhole Cookie Value btst",
            "http://www.defi-realty.com/jem9/  [phishing]",
            "http://45.159.189.105/bot/regex    [phishing | tracking]",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/    [phishing | data collection| browser vulnerability]",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian  [password decryption]",
            "https://www.sentinelone.com/blog/going-deep-a-guide-to-reversing-smoke-loader-malware/",
            "https://attack.mitre.org/software/S0226/",
            "http://watchhers.net/index.php. [ data collection]",
            "remotewd.com",
            "https://remote.krogerlaw.com",
            "device-local-7e6b3aa6-e3de-4e8f-9213-9f15c92d1d81.remotewd.com",
            "www.pornhub.com [password decryption]",
            "www.supernetforme.com [CnC]",
            "ddos.dnsnb8.net  [CnC]",
            "http://happylifehappywife.com/wp-content/themes/theme78222/images/top-right.jpg    [phishing]",
            "http://amaiorpascoadetodas2.com/cgi-sys/suspendedpage.cgi?smart-tv-led-55-samsung-55ru7100-ultra-hd-4k-com-conversor-digital-3-hdmi-2-usb-wi-fi-visual-livre-de-cabos-controle-remoto-%C3%9Anico-e-bluetooth-&skullid=539293743",
            "http://amaiorpascoadetodas2.com/cgi-sys/suspendedpage.cgi?smart-tv-led-55-samsung-55ru7100-ultra-hd-4k-com-conversor-digital-3-hdmi-2-usb-wi-fi-visual-livre-de-cabos-controle-remoto-%C3%9Anico-e-bluetooth-&skullid=539293743",
            "http://url7639.ascglobal-email.com/wf/open?upn=HDu-2BON2WuckNVJ2U1s3AlMizU2CbfEvFl7S9TXTdQm2nLS-2F0QX6mc4PxuUDVyCyIzMeTvJRSiC633rEV-2B8mukshW0CHiC-2FvQOWOgJR6RGOtzDWutJV4OtjBHGduMDUigvEESSJQD8KXk1UU3bXtRdyd7QpBC-2F7Ti-2Bq6tNr1C4yz-2FXcUbYvtJX4ip5d5t5eXud233BW97tdcojPu0yKWZ0Zm2DyXbj1RIwt-2FO0RcYLC7feNtrpw6OxBd8r4Tc3uHoT7Z9NFErDUBbBuYpsze-2FiBRziGeeMExS5l82Xna4au56co0IdOcfscmwGtC-2BxD3xiJW4v560wXMZQU0G9hqqPVeYTnwZwyfebBz1KLSW-2BIJtHMF6DCNHhatvrb3WM84-2BGpgCxOK1dFKPiKsmPzSc-2BdCAO9BzU3K6G7EaDYNu2cRHdGmat-2BCJs",
            "https://darkforums.me/Thread-Check-Any-Indian-Vehicle-Owner-Details-home-address-phone-number [Whoa Nelly!]",
            "https://us-bankofamerica.com/PhoneVerification.php/",
            "http://www.w3.org/TR/html4/loose.dtd | www.w3.org  [collection]",
            "http://dl.ariamobile.net/mobile/2008.10.a/applications/My_Phone-v2.01-S60v3-[wWw.Ariamobile.Net].zip",
            "http://iphones.email   [redirection chain]",
            "*Patient PII & PHI at critical risk"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Lumma Stealer",
              "display_name": "Lumma Stealer",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Smoke Loader",
              "display_name": "Smoke Loader",
              "target": null
            },
            {
              "id": "Relic",
              "display_name": "Relic",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "Qakbot",
              "display_name": "Qakbot",
              "target": null
            },
            {
              "id": "RansomEXX",
              "display_name": "RansomEXX",
              "target": null
            },
            {
              "id": "Generic.Malware",
              "display_name": "Generic.Malware",
              "target": null
            },
            {
              "id": "Gen:Variant.Zusy",
              "display_name": "Gen:Variant.Zusy",
              "target": null
            },
            {
              "id": "Razy",
              "display_name": "Razy",
              "target": null
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "SuppoBox",
              "display_name": "SuppoBox",
              "target": null
            },
            {
              "id": "DangerousObject.Multi",
              "display_name": "DangerousObject.Multi",
              "target": null
            },
            {
              "id": "Trojan.Injector",
              "display_name": "Trojan.Injector",
              "target": null
            },
            {
              "id": "Simda",
              "display_name": "Simda",
              "target": null
            },
            {
              "id": "Defacement",
              "display_name": "Defacement",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1110",
              "name": "Brute Force",
              "display_name": "T1110 - Brute Force"
            },
            {
              "id": "T1111",
              "name": "Two-Factor Authentication Interception",
              "display_name": "T1111 - Two-Factor Authentication Interception"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1110.002",
              "name": "Password Cracking",
              "display_name": "T1110.002 - Password Cracking"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1491",
              "name": "Defacement",
              "display_name": "T1491 - Defacement"
            },
            {
              "id": "T1547.001",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1547.001 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1555.003",
              "name": "Credentials from Web Browsers",
              "display_name": "T1555.003 - Credentials from Web Browsers"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1055.012",
              "name": "Process Hollowing",
              "display_name": "T1055.012 - Process Hollowing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1552.001",
              "name": "Credentials In Files",
              "display_name": "T1552.001 - Credentials In Files"
            },
            {
              "id": "T1497.001",
              "name": "System Checks",
              "display_name": "T1497.001 - System Checks"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1059.006",
              "name": "Python",
              "display_name": "T1059.006 - Python"
            },
            {
              "id": "T1059.005",
              "name": "Visual Basic",
              "display_name": "T1059.005 - Visual Basic"
            }
          ],
          "industries": [
            "Healthcare",
            "Civil Society",
            "Patients"
          ],
          "TLP": "white",
          "cloned_from": "65c012b5e56cc9474ebb701f",
          "export_count": 58,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 244,
            "FileHash-SHA1": 237,
            "FileHash-SHA256": 5468,
            "URL": 3747,
            "domain": 2512,
            "hostname": 1593,
            "CVE": 4
          },
          "indicator_count": 13805,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 228,
          "modified_text": "775 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65c970ef974adf44ef24c9a2",
          "name": "Cyber espionage & Ransomware attacks spread via Phone call?",
          "description": "",
          "modified": "2024-03-05T22:00:26.685000",
          "created": "2024-02-12T01:14:23.337000",
          "tags": [
            "ssl certificate",
            "whois record",
            "contacted",
            "execution",
            "historical ssl",
            "contacted urls",
            "whois whois",
            "zfglddkl58a url",
            "q0gpyr1balpdgpo",
            "relacionada",
            "formbook",
            "smoke loader",
            "iframe",
            "january",
            "resolutions",
            "referrer",
            "threat roundup",
            "snatch",
            "ransomware",
            "hacktool",
            "record type",
            "ttl value",
            "tsara brashears",
            "apple",
            "apple ios",
            "password bypass",
            "malware",
            "password",
            "apple phone",
            "download",
            "crypto",
            "relic",
            "monitoring",
            "installer",
            "tofsee",
            "core",
            "qakbot",
            "lumma stealer",
            "ransomexx",
            "communicating",
            "el0kpmhlfz",
            "qdkxgr24yz",
            "kgs0",
            "kls0",
            "malicious",
            "phi",
            "pii",
            "dofoil",
            "worn",
            "rat",
            "network",
            "dns",
            "trojan",
            "remote",
            "phone hacking",
            "hacked by phone call",
            "http response",
            "final url",
            "ip address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers",
            "nginx",
            "html info",
            "information",
            "meta tags",
            "network",
            "march",
            "july",
            "september",
            "february",
            "redline stealer",
            "probe",
            "raccoonstealer",
            "no data",
            "tag count",
            "thu apr",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "asyncrat",
            "redlinestealer",
            "diamondfox",
            "first",
            "botnet command and control",
            "python connection",
            "tulach"
          ],
          "references": [
            "https://www.crccolorado.com/dr-adam-sang",
            "CS IDS Rules: MALWARE Possible Compromised Host",
            "CS IDS Rules: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz",
            "CS IDS Rules: SERVER-OTHER Squid HTTP Vary response header denial of service attempt",
            "CS IDS Rules: ET MALWARE Possible Zeus GameOver/FluBot Related DGA NXDOMAIN Responses",
            "CS IDS Rules: ET AnubisNetworks Sinkhole Cookie Value btst",
            "http://www.defi-realty.com/jem9/  [phishing]",
            "http://45.159.189.105/bot/regex    [phishing | tracking]",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/    [phishing | data collection| browser vulnerability]",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian  [password decryption]",
            "https://www.sentinelone.com/blog/going-deep-a-guide-to-reversing-smoke-loader-malware/",
            "https://attack.mitre.org/software/S0226/",
            "http://watchhers.net/index.php. [ data collection]",
            "remotewd.com",
            "https://remote.krogerlaw.com",
            "device-local-7e6b3aa6-e3de-4e8f-9213-9f15c92d1d81.remotewd.com",
            "www.pornhub.com [password decryption]",
            "www.supernetforme.com [CnC]",
            "ddos.dnsnb8.net  [CnC]",
            "http://happylifehappywife.com/wp-content/themes/theme78222/images/top-right.jpg    [phishing]",
            "http://amaiorpascoadetodas2.com/cgi-sys/suspendedpage.cgi?smart-tv-led-55-samsung-55ru7100-ultra-hd-4k-com-conversor-digital-3-hdmi-2-usb-wi-fi-visual-livre-de-cabos-controle-remoto-%C3%9Anico-e-bluetooth-&skullid=539293743",
            "http://amaiorpascoadetodas2.com/cgi-sys/suspendedpage.cgi?smart-tv-led-55-samsung-55ru7100-ultra-hd-4k-com-conversor-digital-3-hdmi-2-usb-wi-fi-visual-livre-de-cabos-controle-remoto-%C3%9Anico-e-bluetooth-&skullid=539293743",
            "http://url7639.ascglobal-email.com/wf/open?upn=HDu-2BON2WuckNVJ2U1s3AlMizU2CbfEvFl7S9TXTdQm2nLS-2F0QX6mc4PxuUDVyCyIzMeTvJRSiC633rEV-2B8mukshW0CHiC-2FvQOWOgJR6RGOtzDWutJV4OtjBHGduMDUigvEESSJQD8KXk1UU3bXtRdyd7QpBC-2F7Ti-2Bq6tNr1C4yz-2FXcUbYvtJX4ip5d5t5eXud233BW97tdcojPu0yKWZ0Zm2DyXbj1RIwt-2FO0RcYLC7feNtrpw6OxBd8r4Tc3uHoT7Z9NFErDUBbBuYpsze-2FiBRziGeeMExS5l82Xna4au56co0IdOcfscmwGtC-2BxD3xiJW4v560wXMZQU0G9hqqPVeYTnwZwyfebBz1KLSW-2BIJtHMF6DCNHhatvrb3WM84-2BGpgCxOK1dFKPiKsmPzSc-2BdCAO9BzU3K6G7EaDYNu2cRHdGmat-2BCJs",
            "https://darkforums.me/Thread-Check-Any-Indian-Vehicle-Owner-Details-home-address-phone-number [Whoa Nelly!]",
            "https://us-bankofamerica.com/PhoneVerification.php/",
            "http://www.w3.org/TR/html4/loose.dtd | www.w3.org  [collection]",
            "http://dl.ariamobile.net/mobile/2008.10.a/applications/My_Phone-v2.01-S60v3-[wWw.Ariamobile.Net].zip",
            "http://iphones.email   [redirection chain]",
            "*Patient PII & PHI at critical risk"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Lumma Stealer",
              "display_name": "Lumma Stealer",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Smoke Loader",
              "display_name": "Smoke Loader",
              "target": null
            },
            {
              "id": "Relic",
              "display_name": "Relic",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "Qakbot",
              "display_name": "Qakbot",
              "target": null
            },
            {
              "id": "RansomEXX",
              "display_name": "RansomEXX",
              "target": null
            },
            {
              "id": "Generic.Malware",
              "display_name": "Generic.Malware",
              "target": null
            },
            {
              "id": "Gen:Variant.Zusy",
              "display_name": "Gen:Variant.Zusy",
              "target": null
            },
            {
              "id": "Razy",
              "display_name": "Razy",
              "target": null
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "SuppoBox",
              "display_name": "SuppoBox",
              "target": null
            },
            {
              "id": "DangerousObject.Multi",
              "display_name": "DangerousObject.Multi",
              "target": null
            },
            {
              "id": "Trojan.Injector",
              "display_name": "Trojan.Injector",
              "target": null
            },
            {
              "id": "Simda",
              "display_name": "Simda",
              "target": null
            },
            {
              "id": "Defacement",
              "display_name": "Defacement",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1110",
              "name": "Brute Force",
              "display_name": "T1110 - Brute Force"
            },
            {
              "id": "T1111",
              "name": "Two-Factor Authentication Interception",
              "display_name": "T1111 - Two-Factor Authentication Interception"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1110.002",
              "name": "Password Cracking",
              "display_name": "T1110.002 - Password Cracking"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1491",
              "name": "Defacement",
              "display_name": "T1491 - Defacement"
            },
            {
              "id": "T1547.001",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1547.001 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1555.003",
              "name": "Credentials from Web Browsers",
              "display_name": "T1555.003 - Credentials from Web Browsers"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1055.012",
              "name": "Process Hollowing",
              "display_name": "T1055.012 - Process Hollowing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1552.001",
              "name": "Credentials In Files",
              "display_name": "T1552.001 - Credentials In Files"
            },
            {
              "id": "T1497.001",
              "name": "System Checks",
              "display_name": "T1497.001 - System Checks"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1059.006",
              "name": "Python",
              "display_name": "T1059.006 - Python"
            },
            {
              "id": "T1059.005",
              "name": "Visual Basic",
              "display_name": "T1059.005 - Visual Basic"
            }
          ],
          "industries": [
            "Healthcare",
            "Civil Society",
            "Patients"
          ],
          "TLP": "white",
          "cloned_from": "65c09e487b3899f3442aed96",
          "export_count": 65,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 244,
            "FileHash-SHA1": 237,
            "FileHash-SHA256": 5468,
            "URL": 3747,
            "domain": 2512,
            "hostname": 1593,
            "CVE": 4
          },
          "indicator_count": 13805,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "775 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65e1ece3b935bda6b9d3e10b",
          "name": "Cyber espionage & Ransomware attacks spread via Phone call? II.",
          "description": "",
          "modified": "2024-03-05T22:00:26.685000",
          "created": "2024-03-01T14:57:39.828000",
          "tags": [
            "ssl certificate",
            "whois record",
            "contacted",
            "execution",
            "historical ssl",
            "contacted urls",
            "whois whois",
            "zfglddkl58a url",
            "q0gpyr1balpdgpo",
            "relacionada",
            "formbook",
            "smoke loader",
            "iframe",
            "january",
            "resolutions",
            "referrer",
            "threat roundup",
            "snatch",
            "ransomware",
            "hacktool",
            "record type",
            "ttl value",
            "tsara brashears",
            "apple",
            "apple ios",
            "password bypass",
            "malware",
            "password",
            "apple phone",
            "download",
            "crypto",
            "relic",
            "monitoring",
            "installer",
            "tofsee",
            "core",
            "qakbot",
            "lumma stealer",
            "ransomexx",
            "communicating",
            "el0kpmhlfz",
            "qdkxgr24yz",
            "kgs0",
            "kls0",
            "malicious",
            "phi",
            "pii",
            "dofoil",
            "worn",
            "rat",
            "network",
            "dns",
            "trojan",
            "remote",
            "phone hacking",
            "hacked by phone call",
            "http response",
            "final url",
            "ip address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers",
            "nginx",
            "html info",
            "information",
            "meta tags",
            "network",
            "march",
            "july",
            "september",
            "february",
            "redline stealer",
            "probe",
            "raccoonstealer",
            "no data",
            "tag count",
            "thu apr",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "asyncrat",
            "redlinestealer",
            "diamondfox",
            "first",
            "botnet command and control",
            "python connection",
            "tulach"
          ],
          "references": [
            "https://www.crccolorado.com/dr-adam-sang",
            "CS IDS Rules: MALWARE Possible Compromised Host",
            "CS IDS Rules: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz",
            "CS IDS Rules: SERVER-OTHER Squid HTTP Vary response header denial of service attempt",
            "CS IDS Rules: ET MALWARE Possible Zeus GameOver/FluBot Related DGA NXDOMAIN Responses",
            "CS IDS Rules: ET AnubisNetworks Sinkhole Cookie Value btst",
            "http://www.defi-realty.com/jem9/  [phishing]",
            "http://45.159.189.105/bot/regex    [phishing | tracking]",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/    [phishing | data collection| browser vulnerability]",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian  [password decryption]",
            "https://www.sentinelone.com/blog/going-deep-a-guide-to-reversing-smoke-loader-malware/",
            "https://attack.mitre.org/software/S0226/",
            "http://watchhers.net/index.php. [ data collection]",
            "remotewd.com",
            "https://remote.krogerlaw.com",
            "device-local-7e6b3aa6-e3de-4e8f-9213-9f15c92d1d81.remotewd.com",
            "www.pornhub.com [password decryption]",
            "www.supernetforme.com [CnC]",
            "ddos.dnsnb8.net  [CnC]",
            "http://happylifehappywife.com/wp-content/themes/theme78222/images/top-right.jpg    [phishing]",
            "http://amaiorpascoadetodas2.com/cgi-sys/suspendedpage.cgi?smart-tv-led-55-samsung-55ru7100-ultra-hd-4k-com-conversor-digital-3-hdmi-2-usb-wi-fi-visual-livre-de-cabos-controle-remoto-%C3%9Anico-e-bluetooth-&skullid=539293743",
            "http://amaiorpascoadetodas2.com/cgi-sys/suspendedpage.cgi?smart-tv-led-55-samsung-55ru7100-ultra-hd-4k-com-conversor-digital-3-hdmi-2-usb-wi-fi-visual-livre-de-cabos-controle-remoto-%C3%9Anico-e-bluetooth-&skullid=539293743",
            "http://url7639.ascglobal-email.com/wf/open?upn=HDu-2BON2WuckNVJ2U1s3AlMizU2CbfEvFl7S9TXTdQm2nLS-2F0QX6mc4PxuUDVyCyIzMeTvJRSiC633rEV-2B8mukshW0CHiC-2FvQOWOgJR6RGOtzDWutJV4OtjBHGduMDUigvEESSJQD8KXk1UU3bXtRdyd7QpBC-2F7Ti-2Bq6tNr1C4yz-2FXcUbYvtJX4ip5d5t5eXud233BW97tdcojPu0yKWZ0Zm2DyXbj1RIwt-2FO0RcYLC7feNtrpw6OxBd8r4Tc3uHoT7Z9NFErDUBbBuYpsze-2FiBRziGeeMExS5l82Xna4au56co0IdOcfscmwGtC-2BxD3xiJW4v560wXMZQU0G9hqqPVeYTnwZwyfebBz1KLSW-2BIJtHMF6DCNHhatvrb3WM84-2BGpgCxOK1dFKPiKsmPzSc-2BdCAO9BzU3K6G7EaDYNu2cRHdGmat-2BCJs",
            "https://darkforums.me/Thread-Check-Any-Indian-Vehicle-Owner-Details-home-address-phone-number [Whoa Nelly!]",
            "https://us-bankofamerica.com/PhoneVerification.php/",
            "http://www.w3.org/TR/html4/loose.dtd | www.w3.org  [collection]",
            "http://dl.ariamobile.net/mobile/2008.10.a/applications/My_Phone-v2.01-S60v3-[wWw.Ariamobile.Net].zip",
            "http://iphones.email   [redirection chain]",
            "*Patient PII & PHI at critical risk"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Lumma Stealer",
              "display_name": "Lumma Stealer",
              "target": null
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "Smoke Loader",
              "display_name": "Smoke Loader",
              "target": null
            },
            {
              "id": "Relic",
              "display_name": "Relic",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "Qakbot",
              "display_name": "Qakbot",
              "target": null
            },
            {
              "id": "RansomEXX",
              "display_name": "RansomEXX",
              "target": null
            },
            {
              "id": "Generic.Malware",
              "display_name": "Generic.Malware",
              "target": null
            },
            {
              "id": "Gen:Variant.Zusy",
              "display_name": "Gen:Variant.Zusy",
              "target": null
            },
            {
              "id": "Razy",
              "display_name": "Razy",
              "target": null
            },
            {
              "id": "Tofsee",
              "display_name": "Tofsee",
              "target": null
            },
            {
              "id": "SuppoBox",
              "display_name": "SuppoBox",
              "target": null
            },
            {
              "id": "DangerousObject.Multi",
              "display_name": "DangerousObject.Multi",
              "target": null
            },
            {
              "id": "Trojan.Injector",
              "display_name": "Trojan.Injector",
              "target": null
            },
            {
              "id": "Simda",
              "display_name": "Simda",
              "target": null
            },
            {
              "id": "Defacement",
              "display_name": "Defacement",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1110",
              "name": "Brute Force",
              "display_name": "T1110 - Brute Force"
            },
            {
              "id": "T1111",
              "name": "Two-Factor Authentication Interception",
              "display_name": "T1111 - Two-Factor Authentication Interception"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1110.002",
              "name": "Password Cracking",
              "display_name": "T1110.002 - Password Cracking"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1491",
              "name": "Defacement",
              "display_name": "T1491 - Defacement"
            },
            {
              "id": "T1547.001",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1547.001 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1555.003",
              "name": "Credentials from Web Browsers",
              "display_name": "T1555.003 - Credentials from Web Browsers"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1055.012",
              "name": "Process Hollowing",
              "display_name": "T1055.012 - Process Hollowing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1552.001",
              "name": "Credentials In Files",
              "display_name": "T1552.001 - Credentials In Files"
            },
            {
              "id": "T1497.001",
              "name": "System Checks",
              "display_name": "T1497.001 - System Checks"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1059.006",
              "name": "Python",
              "display_name": "T1059.006 - Python"
            },
            {
              "id": "T1059.005",
              "name": "Visual Basic",
              "display_name": "T1059.005 - Visual Basic"
            }
          ],
          "industries": [
            "Healthcare",
            "Civil Society",
            "Patients"
          ],
          "TLP": "white",
          "cloned_from": "65c09e487b3899f3442aed96",
          "export_count": 88,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Enqrypted",
            "id": "272105",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_272105/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 244,
            "FileHash-SHA1": 237,
            "FileHash-SHA256": 5468,
            "URL": 3747,
            "domain": 2512,
            "hostname": 1593,
            "CVE": 4
          },
          "indicator_count": 13805,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 68,
          "modified_text": "775 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "Trojan.NukeSped./TigerRat | Trojan[APT]/Win32.Lazarus | Cited: Andariel group \u00bb state-sponsored threat actor & Defense media",
        "device-local-7e6b3aa6-e3de-4e8f-9213-9f15c92d1d81.remotewd.com",
        "Alerts: infostealer_cookies persistence_autorun recon_programs recon_fingerprint removes_zoneid_ads anomalous_deletefile",
        "IDS: WGET Command Specifying Output in HTTP Headers",
        "Interesting Strings: https://support.google.com/chrome/?p=plugin_pdf",
        "https://darkforums.me/Thread-Check-Any-Indian-Vehicle-Owner-Details-home-address-phone-number [Whoa Nelly!]",
        "http://45.159.189.105/bot/regex    [phishing | tracking]",
        "https://pin.it/ | https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "compromised_site_redirector_fromcharcode fromCharCode",
        "CS IDS Rules: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz",
        "http://www.w3.org/TR/html4/loose.dtd | www.w3.org  [collection]",
        "remotewd.com",
        "P\u2019s Contacted:  93.184.221.240  3.33.130.190 |  Domains Contacted: counterslocal.com",
        "CS IDS Rules: ET MALWARE Possible Zeus GameOver/FluBot Related DGA NXDOMAIN Responses",
        "https://us-bankofamerica.com/PhoneVerification.php/",
        "Mr. Telephone man. there js something wrong with her line when she tries to dial a number, she gets a freak every time...",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/    [phishing | data collection| browser vulnerability]",
        "IDS: D-Link Devices Home Network Administration Protocol Command Execution",
        "Antivirus Detections: ALF:HeraklezEval:Rogue:Win32/FakeRean",
        "Interesting Strings: http://schema.org/GovernmentOrganization https://support.google.com/chrome/?p=plugin_java https://crbug.com/593166",
        "http://url7639.ascglobal-email.com/wf/open?upn=HDu-2BON2WuckNVJ2U1s3AlMizU2CbfEvFl7S9TXTdQm2nLS-2F0QX6mc4PxuUDVyCyIzMeTvJRSiC633rEV-2B8mukshW0CHiC-2FvQOWOgJR6RGOtzDWutJV4OtjBHGduMDUigvEESSJQD8KXk1UU3bXtRdyd7QpBC-2F7Ti-2Bq6tNr1C4yz-2FXcUbYvtJX4ip5d5t5eXud233BW97tdcojPu0yKWZ0Zm2DyXbj1RIwt-2FO0RcYLC7feNtrpw6OxBd8r4Tc3uHoT7Z9NFErDUBbBuYpsze-2FiBRziGeeMExS5l82Xna4au56co0IdOcfscmwGtC-2BxD3xiJW4v560wXMZQU0G9hqqPVeYTnwZwyfebBz1KLSW-2BIJtHMF6DCNHhatvrb3WM84-2BGpgCxOK1dFKPiKsmPzSc-2BdCAO9BzU3K6G7EaDYNu2cRHdGmat-2BCJs",
        "https://support.google.com/chrome/?p=plugin_quicktime https://chrome.google.com/",
        "*Patient PII & PHI at critical risk",
        "http://watchhers.net/index.php. [ data collection]",
        "Andariel Backdoor Activity (Checkin)",
        "http://happylifehappywife.com/wp-content/themes/theme78222/images/top-right.jpg    [phishing]",
        "www.pornhub.com [password decryption]",
        "Yara Detections: compromised_site_redirector_fromcharcode ,  Cabinet_Archive ,  SFX_CAB",
        "CS IDS Rules: SERVER-OTHER Squid HTTP Vary response header denial of service attempt",
        "http://amaiorpascoadetodas2.com/cgi-sys/suspendedpage.cgi?smart-tv-led-55-samsung-55ru7100-ultra-hd-4k-com-conversor-digital-3-hdmi-2-usb-wi-fi-visual-livre-de-cabos-controle-remoto-%C3%9Anico-e-bluetooth-&skullid=539293743",
        "ddos.dnsnb8.net  [CnC]",
        "https://remote.krogerlaw.com",
        "CS IDS Rules: ET AnubisNetworks Sinkhole Cookie Value btst",
        "Antivirus Detections Cryp_Xed-12 ,  Mal/Generic-S ,  Packed/Upack Yara Detections Upackv039finalDwing ,  UpackV037Dwing",
        "https://www.crccolorado.com/dr-adam-sang",
        "Pdf.Phishing.TtraffRobotInstall-7605656-0 00004feb58be42ba1bd506ea89f90c5e1d83e6e1fb84841931949a454b0bb539",
        "http://www.defi-realty.com/jem9/  [phishing]",
        "www.supernetforme.com [CnC]",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian  [password decryption]",
        "Interesting Strings: http://www.interoperabilitybridges.com/wmp http://crbug.com/40902 http://crbug.com/516527",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "https://www.sentinelone.com/blog/going-deep-a-guide-to-reversing-smoke-loader-malware/",
        "Project Endgame - pegausintel.com -Unsjre if related to NSO Group",
        "CS IDS Rules: MALWARE Possible Compromised Host",
        "http://dl.ariamobile.net/mobile/2008.10.a/applications/My_Phone-v2.01-S60v3-[wWw.Ariamobile.Net].zip",
        "https://attack.mitre.org/software/S0226/",
        "http://iphones.email   [redirection chain]",
        "Interesting Strings: http://service.real.com/realplayer/security/02062012_player/en/"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": []
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Win32:kamso",
            "Cryp_xed-12",
            "Tofsee",
            "Suppobox",
            "Dangerousobject.multi",
            "Elf:ddos-y\\ [trj]",
            "Worm:win32/fesber.a",
            "Smoke loader",
            "Generic.malware",
            "Ransom:win32/eniqma.a",
            "Defacement",
            "Alf:heraklezeval:rogue:win32/fakerean",
            "Mal/generic-s",
            "Apnic",
            "Mirai",
            "Trojan:win32/tonmye!rfn",
            "Arin",
            "Ransomexx",
            "Razy",
            "Gen:variant.zusy",
            "Ransom:win32/ako",
            "Trojan.injector",
            "Trojan:win32/tonmye",
            "Trojan[apt]/win32.lazarus",
            "Ransomware",
            "Qakbot",
            "Virtool:win32/ceeinject.gf",
            "Unix.trojan.mirai-6981169-0",
            "Lumma stealer",
            "Formbook",
            "Hacktool",
            "Alfper:pua:win32/installcore",
            "Trojanspy:win32/nivdort",
            "Worm:win32/macoute.a",
            "Upackv037dwing",
            "Relic",
            "Simda",
            "Trojandownloader:win32/nemucod"
          ],
          "industries": [
            "Civil society",
            "Healthcare",
            "Patients"
          ]
        }
      }
    },
    "false_positive": []
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 8,
  "pulses": [
    {
      "id": "66eeef55e2c1ec3a4fa60ef4",
      "name": "Android",
      "description": "",
      "modified": "2024-10-25T00:05:34.912000",
      "created": "2024-09-21T16:07:49.763000",
      "tags": [
        "read c",
        "write c",
        "create c",
        "delete c",
        "process32nextw",
        "langchinese",
        "search",
        "regsetvalueexa",
        "medium",
        "show",
        "trojan",
        "malware",
        "copy",
        "write",
        "win32",
        "tools",
        "persistence",
        "execution",
        "local",
        "next",
        "count",
        "august",
        "scan endpoints",
        "all scoreblue",
        "url http",
        "pulse pulses",
        "http",
        "domain",
        "passive dns",
        "urls",
        "files related",
        "pulses otx",
        "unknown",
        "cname",
        "files",
        "ip address",
        "as16276",
        "spain unknown",
        "meta name",
        "frame src",
        "ok set",
        "cookie",
        "gmt date",
        "gmt content",
        "encrypt",
        "france",
        "nxdomain",
        "ns nxdomain",
        "aaaa nxdomain",
        "name servers",
        "soa nxdomain",
        "moved",
        "creation date",
        "date",
        "body",
        "aaaa",
        "asnone belgium",
        "united kingdom",
        "as16276 ovh",
        "sha256",
        "maltaterfb",
        "showing",
        "total",
        "read",
        "delete",
        "default",
        "systemroot",
        "high",
        "virtool",
        "virustotal",
        "hacktool",
        "drweb",
        "vipre",
        "panda",
        "et trojan",
        "msie",
        "windows nt",
        "entries",
        "ascii text",
        "intel",
        "ms windows",
        "salicode",
        "emails",
        "expiration date",
        "france unknown",
        "taskmail",
        "task3dmail",
        "capspdf1",
        "mboxinbox",
        "actionshow",
        "twitter",
        "canada unknown",
        "error",
        "ipv4",
        "backend",
        "alfper",
        "gmt contenttype",
        "gmt server",
        "apache",
        "exploit",
        "hostname",
        "dynamicloader",
        "yara rule",
        "delivery",
        "alpha criteria",
        "inno setup",
        "format",
        "june",
        "stack",
        "dummy",
        "overview domain",
        "pulses",
        "tags",
        "related tags",
        "google safe",
        "browsing",
        "record type",
        "ttl value",
        "status",
        "united",
        "asnone united",
        "record value",
        "trojanproxy",
        "servers",
        "as15169 google",
        "for privacy",
        "domains ii",
        "ransom",
        "checks",
        "bios",
        "cpu name",
        "dynamic",
        "filehash",
        "related nids",
        "files location",
        "ddos",
        "activity",
        "checkin",
        "win64",
        "mirai",
        "technology",
        "dns replication",
        "system label",
        "cloudflarenet",
        "apnic",
        "south brisbane",
        "asia pacific",
        "apnic whois",
        "po box",
        "cordelia st",
        "comment",
        "apnic research",
        "nethandle",
        "arin",
        "andariel",
        "yara detections",
        "malware traffic",
        "nids",
        "icmp traffic",
        "dns query",
        "tcp syn",
        "resolverror",
        "externalport",
        "internalport",
        "http headers",
        "home network",
        "pulse submit",
        "url analysis",
        "mitre att",
        "ta0002 shared",
        "modules t1129",
        "windows",
        "ta0004 access",
        "t1134",
        "defense evasion",
        "xor encrypt",
        "rc4 prga",
        "catalog tree",
        "analysis ob0001",
        "analysis ob0002",
        "command",
        "control ob0004",
        "ob0005 defense",
        "evasion ob0006",
        "file system",
        "oc0001 process",
        "oc0003 data",
        "hashes c2ae",
        "capa",
        "cape sandbox",
        "lastline",
        "microsoft",
        "memory pattern",
        "dns resolutions",
        "ip traffic",
        "urls tcp",
        "tiger rat",
        "hi",
        "helping sabey"
      ],
      "references": [
        "Andariel Backdoor Activity (Checkin)",
        "IDS: WGET Command Specifying Output in HTTP Headers",
        "IDS: D-Link Devices Home Network Administration Protocol Command Execution",
        "Trojan.NukeSped./TigerRat | Trojan[APT]/Win32.Lazarus | Cited: Andariel group \u00bb state-sponsored threat actor & Defense media",
        "Mr. Telephone man. there js something wrong with her line when she tries to dial a number, she gets a freak every time..."
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Trojan:Win32/Tonmye",
          "display_name": "Trojan:Win32/Tonmye",
          "target": "/malware/Trojan:Win32/Tonmye"
        },
        {
          "id": "Win32:Kamso",
          "display_name": "Win32:Kamso",
          "target": null
        },
        {
          "id": "VirTool:Win32/CeeInject.GF",
          "display_name": "VirTool:Win32/CeeInject.GF",
          "target": "/malware/VirTool:Win32/CeeInject.GF"
        },
        {
          "id": "ALFPER:PUA:Win32/InstallCore",
          "display_name": "ALFPER:PUA:Win32/InstallCore",
          "target": null
        },
        {
          "id": "Trojan:Win32/Tonmye!rfn",
          "display_name": "Trojan:Win32/Tonmye!rfn",
          "target": "/malware/Trojan:Win32/Tonmye!rfn"
        },
        {
          "id": "Ransom:Win32/Ako",
          "display_name": "Ransom:Win32/Ako",
          "target": "/malware/Ransom:Win32/Ako"
        },
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "ARIN",
          "display_name": "ARIN",
          "target": null
        },
        {
          "id": "APNIC",
          "display_name": "APNIC",
          "target": null
        },
        {
          "id": "ELF:DDoS-Y\\ [Trj]",
          "display_name": "ELF:DDoS-Y\\ [Trj]",
          "target": null
        },
        {
          "id": "Unix.Trojan.Mirai-6981169-0",
          "display_name": "Unix.Trojan.Mirai-6981169-0",
          "target": null
        },
        {
          "id": "Trojan[APT]/Win32.Lazarus",
          "display_name": "Trojan[APT]/Win32.Lazarus",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1023",
          "name": "Shortcut Modification",
          "display_name": "T1023 - Shortcut Modification"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1089",
          "name": "Disabling Security Tools",
          "display_name": "T1089 - Disabling Security Tools"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1134",
          "name": "Access Token Manipulation",
          "display_name": "T1134 - Access Token Manipulation"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "66ebda7ebbe759bb12cebd4a",
      "export_count": 43,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "MayDay23",
        "id": "292773",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 889,
        "FileHash-SHA1": 817,
        "FileHash-SHA256": 3623,
        "domain": 755,
        "SSLCertFingerprint": 1,
        "URL": 396,
        "hostname": 732,
        "email": 14,
        "CVE": 3,
        "CIDR": 2
      },
      "indicator_count": 7232,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 10,
      "modified_text": "542 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "67176428e4871c2726288178",
      "name": "Android",
      "description": "",
      "modified": "2024-10-25T00:05:34.912000",
      "created": "2024-10-22T08:36:56.514000",
      "tags": [
        "read c",
        "write c",
        "create c",
        "delete c",
        "process32nextw",
        "langchinese",
        "search",
        "regsetvalueexa",
        "medium",
        "show",
        "trojan",
        "malware",
        "copy",
        "write",
        "win32",
        "tools",
        "persistence",
        "execution",
        "local",
        "next",
        "count",
        "august",
        "scan endpoints",
        "all scoreblue",
        "url http",
        "pulse pulses",
        "http",
        "domain",
        "passive dns",
        "urls",
        "files related",
        "pulses otx",
        "unknown",
        "cname",
        "files",
        "ip address",
        "as16276",
        "spain unknown",
        "meta name",
        "frame src",
        "ok set",
        "cookie",
        "gmt date",
        "gmt content",
        "encrypt",
        "france",
        "nxdomain",
        "ns nxdomain",
        "aaaa nxdomain",
        "name servers",
        "soa nxdomain",
        "moved",
        "creation date",
        "date",
        "body",
        "aaaa",
        "asnone belgium",
        "united kingdom",
        "as16276 ovh",
        "sha256",
        "maltaterfb",
        "showing",
        "total",
        "read",
        "delete",
        "default",
        "systemroot",
        "high",
        "virtool",
        "virustotal",
        "hacktool",
        "drweb",
        "vipre",
        "panda",
        "et trojan",
        "msie",
        "windows nt",
        "entries",
        "ascii text",
        "intel",
        "ms windows",
        "salicode",
        "emails",
        "expiration date",
        "france unknown",
        "taskmail",
        "task3dmail",
        "capspdf1",
        "mboxinbox",
        "actionshow",
        "twitter",
        "canada unknown",
        "error",
        "ipv4",
        "backend",
        "alfper",
        "gmt contenttype",
        "gmt server",
        "apache",
        "exploit",
        "hostname",
        "dynamicloader",
        "yara rule",
        "delivery",
        "alpha criteria",
        "inno setup",
        "format",
        "june",
        "stack",
        "dummy",
        "overview domain",
        "pulses",
        "tags",
        "related tags",
        "google safe",
        "browsing",
        "record type",
        "ttl value",
        "status",
        "united",
        "asnone united",
        "record value",
        "trojanproxy",
        "servers",
        "as15169 google",
        "for privacy",
        "domains ii",
        "ransom",
        "checks",
        "bios",
        "cpu name",
        "dynamic",
        "filehash",
        "related nids",
        "files location",
        "ddos",
        "activity",
        "checkin",
        "win64",
        "mirai",
        "technology",
        "dns replication",
        "system label",
        "cloudflarenet",
        "apnic",
        "south brisbane",
        "asia pacific",
        "apnic whois",
        "po box",
        "cordelia st",
        "comment",
        "apnic research",
        "nethandle",
        "arin",
        "andariel",
        "yara detections",
        "malware traffic",
        "nids",
        "icmp traffic",
        "dns query",
        "tcp syn",
        "resolverror",
        "externalport",
        "internalport",
        "http headers",
        "home network",
        "pulse submit",
        "url analysis",
        "mitre att",
        "ta0002 shared",
        "modules t1129",
        "windows",
        "ta0004 access",
        "t1134",
        "defense evasion",
        "xor encrypt",
        "rc4 prga",
        "catalog tree",
        "analysis ob0001",
        "analysis ob0002",
        "command",
        "control ob0004",
        "ob0005 defense",
        "evasion ob0006",
        "file system",
        "oc0001 process",
        "oc0003 data",
        "hashes c2ae",
        "capa",
        "cape sandbox",
        "lastline",
        "microsoft",
        "memory pattern",
        "dns resolutions",
        "ip traffic",
        "urls tcp",
        "tiger rat",
        "hi",
        "helping sabey"
      ],
      "references": [
        "Andariel Backdoor Activity (Checkin)",
        "IDS: WGET Command Specifying Output in HTTP Headers",
        "IDS: D-Link Devices Home Network Administration Protocol Command Execution",
        "Trojan.NukeSped./TigerRat | Trojan[APT]/Win32.Lazarus | Cited: Andariel group \u00bb state-sponsored threat actor & Defense media",
        "Mr. Telephone man. there js something wrong with her line when she tries to dial a number, she gets a freak every time..."
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Trojan:Win32/Tonmye",
          "display_name": "Trojan:Win32/Tonmye",
          "target": "/malware/Trojan:Win32/Tonmye"
        },
        {
          "id": "Win32:Kamso",
          "display_name": "Win32:Kamso",
          "target": null
        },
        {
          "id": "VirTool:Win32/CeeInject.GF",
          "display_name": "VirTool:Win32/CeeInject.GF",
          "target": "/malware/VirTool:Win32/CeeInject.GF"
        },
        {
          "id": "ALFPER:PUA:Win32/InstallCore",
          "display_name": "ALFPER:PUA:Win32/InstallCore",
          "target": null
        },
        {
          "id": "Trojan:Win32/Tonmye!rfn",
          "display_name": "Trojan:Win32/Tonmye!rfn",
          "target": "/malware/Trojan:Win32/Tonmye!rfn"
        },
        {
          "id": "Ransom:Win32/Ako",
          "display_name": "Ransom:Win32/Ako",
          "target": "/malware/Ransom:Win32/Ako"
        },
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "ARIN",
          "display_name": "ARIN",
          "target": null
        },
        {
          "id": "APNIC",
          "display_name": "APNIC",
          "target": null
        },
        {
          "id": "ELF:DDoS-Y\\ [Trj]",
          "display_name": "ELF:DDoS-Y\\ [Trj]",
          "target": null
        },
        {
          "id": "Unix.Trojan.Mirai-6981169-0",
          "display_name": "Unix.Trojan.Mirai-6981169-0",
          "target": null
        },
        {
          "id": "Trojan[APT]/Win32.Lazarus",
          "display_name": "Trojan[APT]/Win32.Lazarus",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1023",
          "name": "Shortcut Modification",
          "display_name": "T1023 - Shortcut Modification"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1089",
          "name": "Disabling Security Tools",
          "display_name": "T1089 - Disabling Security Tools"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1134",
          "name": "Access Token Manipulation",
          "display_name": "T1134 - Access Token Manipulation"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "66eeef55e2c1ec3a4fa60ef4",
      "export_count": 33,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": true,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "jefivnguyen",
        "id": "293031",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 889,
        "FileHash-SHA1": 817,
        "FileHash-SHA256": 3623,
        "domain": 755,
        "SSLCertFingerprint": 1,
        "URL": 396,
        "hostname": 732,
        "email": 14,
        "CVE": 3,
        "CIDR": 2
      },
      "indicator_count": 7232,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 37,
      "modified_text": "542 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "66ebda7ebbe759bb12cebd4a",
      "name": "Andariel Backdoor Activity - Mirai found  in Android",
      "description": "Andariel Backdoor Activity: Cited as a state sponsored threat group, this ET malware Check in) can be accessed by decent hackers. Found in a targets android device. \n\nDevice being used to attack , manipulate accounts , files and every CnC  Botmaster task desired.\n\nNote:. Hack responsibly.. Stop attacking innocent civilians.",
      "modified": "2024-10-19T07:01:20.116000",
      "created": "2024-09-19T08:02:06.265000",
      "tags": [
        "read c",
        "write c",
        "create c",
        "delete c",
        "process32nextw",
        "langchinese",
        "search",
        "regsetvalueexa",
        "medium",
        "show",
        "trojan",
        "malware",
        "copy",
        "write",
        "win32",
        "tools",
        "persistence",
        "execution",
        "local",
        "next",
        "count",
        "august",
        "scan endpoints",
        "all scoreblue",
        "url http",
        "pulse pulses",
        "http",
        "domain",
        "passive dns",
        "urls",
        "files related",
        "pulses otx",
        "unknown",
        "cname",
        "files",
        "ip address",
        "as16276",
        "spain unknown",
        "meta name",
        "frame src",
        "ok set",
        "cookie",
        "gmt date",
        "gmt content",
        "encrypt",
        "france",
        "nxdomain",
        "ns nxdomain",
        "aaaa nxdomain",
        "name servers",
        "soa nxdomain",
        "moved",
        "creation date",
        "date",
        "body",
        "aaaa",
        "asnone belgium",
        "united kingdom",
        "as16276 ovh",
        "sha256",
        "maltaterfb",
        "showing",
        "total",
        "read",
        "delete",
        "default",
        "systemroot",
        "high",
        "virtool",
        "virustotal",
        "hacktool",
        "drweb",
        "vipre",
        "panda",
        "et trojan",
        "msie",
        "windows nt",
        "entries",
        "ascii text",
        "intel",
        "ms windows",
        "salicode",
        "emails",
        "expiration date",
        "france unknown",
        "taskmail",
        "task3dmail",
        "capspdf1",
        "mboxinbox",
        "actionshow",
        "twitter",
        "canada unknown",
        "error",
        "ipv4",
        "backend",
        "alfper",
        "gmt contenttype",
        "gmt server",
        "apache",
        "exploit",
        "hostname",
        "dynamicloader",
        "yara rule",
        "delivery",
        "alpha criteria",
        "inno setup",
        "format",
        "june",
        "stack",
        "dummy",
        "overview domain",
        "pulses",
        "tags",
        "related tags",
        "google safe",
        "browsing",
        "record type",
        "ttl value",
        "status",
        "united",
        "asnone united",
        "record value",
        "trojanproxy",
        "servers",
        "as15169 google",
        "for privacy",
        "domains ii",
        "ransom",
        "checks",
        "bios",
        "cpu name",
        "dynamic",
        "filehash",
        "related nids",
        "files location",
        "ddos",
        "activity",
        "checkin",
        "win64",
        "mirai",
        "technology",
        "dns replication",
        "system label",
        "cloudflarenet",
        "apnic",
        "south brisbane",
        "asia pacific",
        "apnic whois",
        "po box",
        "cordelia st",
        "comment",
        "apnic research",
        "nethandle",
        "arin",
        "andariel",
        "yara detections",
        "malware traffic",
        "nids",
        "icmp traffic",
        "dns query",
        "tcp syn",
        "resolverror",
        "externalport",
        "internalport",
        "http headers",
        "home network",
        "pulse submit",
        "url analysis",
        "mitre att",
        "ta0002 shared",
        "modules t1129",
        "windows",
        "ta0004 access",
        "t1134",
        "defense evasion",
        "xor encrypt",
        "rc4 prga",
        "catalog tree",
        "analysis ob0001",
        "analysis ob0002",
        "command",
        "control ob0004",
        "ob0005 defense",
        "evasion ob0006",
        "file system",
        "oc0001 process",
        "oc0003 data",
        "hashes c2ae",
        "capa",
        "cape sandbox",
        "lastline",
        "microsoft",
        "memory pattern",
        "dns resolutions",
        "ip traffic",
        "urls tcp",
        "tiger rat",
        "hi",
        "helping sabey"
      ],
      "references": [
        "Andariel Backdoor Activity (Checkin)",
        "IDS: WGET Command Specifying Output in HTTP Headers",
        "IDS: D-Link Devices Home Network Administration Protocol Command Execution",
        "Trojan.NukeSped./TigerRat | Trojan[APT]/Win32.Lazarus | Cited: Andariel group \u00bb state-sponsored threat actor & Defense media",
        "Mr. Telephone man. there js something wrong with her line when she tries to dial a number, she gets a freak every time..."
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Trojan:Win32/Tonmye",
          "display_name": "Trojan:Win32/Tonmye",
          "target": "/malware/Trojan:Win32/Tonmye"
        },
        {
          "id": "Win32:Kamso",
          "display_name": "Win32:Kamso",
          "target": null
        },
        {
          "id": "VirTool:Win32/CeeInject.GF",
          "display_name": "VirTool:Win32/CeeInject.GF",
          "target": "/malware/VirTool:Win32/CeeInject.GF"
        },
        {
          "id": "ALFPER:PUA:Win32/InstallCore",
          "display_name": "ALFPER:PUA:Win32/InstallCore",
          "target": null
        },
        {
          "id": "Trojan:Win32/Tonmye!rfn",
          "display_name": "Trojan:Win32/Tonmye!rfn",
          "target": "/malware/Trojan:Win32/Tonmye!rfn"
        },
        {
          "id": "Ransom:Win32/Ako",
          "display_name": "Ransom:Win32/Ako",
          "target": "/malware/Ransom:Win32/Ako"
        },
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "ARIN",
          "display_name": "ARIN",
          "target": null
        },
        {
          "id": "APNIC",
          "display_name": "APNIC",
          "target": null
        },
        {
          "id": "ELF:DDoS-Y\\ [Trj]",
          "display_name": "ELF:DDoS-Y\\ [Trj]",
          "target": null
        },
        {
          "id": "Unix.Trojan.Mirai-6981169-0",
          "display_name": "Unix.Trojan.Mirai-6981169-0",
          "target": null
        },
        {
          "id": "Trojan[APT]/Win32.Lazarus",
          "display_name": "Trojan[APT]/Win32.Lazarus",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1023",
          "name": "Shortcut Modification",
          "display_name": "T1023 - Shortcut Modification"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1089",
          "name": "Disabling Security Tools",
          "display_name": "T1089 - Disabling Security Tools"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1134",
          "name": "Access Token Manipulation",
          "display_name": "T1134 - Access Token Manipulation"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 25,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 889,
        "FileHash-SHA1": 817,
        "FileHash-SHA256": 3623,
        "domain": 755,
        "SSLCertFingerprint": 1,
        "URL": 396,
        "hostname": 732,
        "email": 14,
        "CVE": 3,
        "CIDR": 2
      },
      "indicator_count": 7232,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 234,
      "modified_text": "548 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "66eb3ef6d765187a437767e4",
      "name": "Hijacked 'Operation Endgame' Tofsee  Ransomware",
      "description": "This a project. A target has been put into  different Operations: Project Hilo, Project Helix, Operation Endgame, The NSO Cellebrite Pegasus hit list. These are real and very serious serious threat. Severe Cyber issues made their way to her infected devices as well as the devices of family members. Death threats continue to come in. Several DoD IP addresses found in a PDF. It's unresearched at this time,, DoD via BGP HE has been questionable considering use gateway abuse by SWIPPER. \n\nStill no authority can confirm victim is a suspect. Must be a crazy high to help Jeffrey Scott Reiner PT. DPT  get away with assault in such a ridiculous manner. Court report posted online by Trellis (BS) is of course a falsified , vulnerability filled 'made you click'  document.. Faldif0, empty docmpty doc, citing  it was refreshed in 2023. \nThere is no doubt these  masqueraders mean to intimidate, humiliate, isolate & harm target. These people are not in China. False attribution is likely.  Attack is disseminates from USA.",
      "modified": "2024-10-18T20:04:41.836000",
      "created": "2024-09-18T20:58:30.691000",
      "tags": [
        "as8075",
        "united",
        "pid425870621",
        "tid700443057",
        "tpid425870621",
        "slot1",
        "mascore2",
        "bcnt1",
        "unid88000705",
        "nct1",
        "date",
        "china",
        "china unknown",
        "passive dns",
        "body xml",
        "error code",
        "requestid",
        "hostid ec",
        "server",
        "gmt content",
        "type",
        "registry",
        "intel",
        "ms windows",
        "show",
        "entries",
        "search",
        "high",
        "pe32",
        "high process",
        "injection t1055",
        "salicode",
        "worm",
        "copy",
        "tools",
        "service",
        "write",
        "win32",
        "persistence",
        "execution",
        "april",
        "urls",
        "http",
        "unique",
        "scan endpoints",
        "all scoreblue",
        "url http",
        "pulse pulses",
        "ip address",
        "related nids",
        "code",
        "as54113",
        "unknown",
        "body",
        "fastly error",
        "please",
        "sea p",
        "msil",
        "accept",
        "aaaa",
        "nxdomain",
        "whitelisted",
        "as15169 google",
        "status",
        "as44273 host",
        "as46691",
        "domain",
        "url https",
        "files location",
        "info",
        "script urls",
        "path max",
        "age86400 set",
        "cookie",
        "script domains",
        "javascript",
        "script script",
        "trojanspy",
        "cname",
        "emails",
        "servers",
        "all search",
        "related pulses",
        "file samples",
        "files matching",
        "creation date",
        "germany unknown",
        "yara detections",
        "filehash",
        "av detections",
        "ids detections",
        "alerts",
        "analysis date",
        "file score",
        "meta",
        "home welcome",
        "write c",
        "delete c",
        "query",
        "local",
        "hostname",
        "a domains",
        "lowfi",
        "content type",
        "record value",
        "suite",
        "showing",
        "asnone united",
        "as29873",
        "ipv4",
        "pulse submit",
        "url analysis",
        "files",
        "pe32 executable",
        "potential scan",
        "0pgtwhu",
        "t1045",
        "port",
        "infection",
        "recon",
        "malware",
        "june",
        "delphi",
        "taobao network",
        "as45102 alibaba",
        "as4812 china",
        "next",
        "expiration date",
        "name servers",
        "dynamicloader",
        "dynamic",
        "sha256",
        "dynamic link",
        "library exe",
        "adobe",
        "incorporated",
        "read",
        "yara rule",
        "delete",
        "binary file",
        "push",
        "malicious",
        "july",
        "iocs",
        "levelbluelabs",
        "jeff4son",
        "adversaries",
        "registry run",
        "flow t1574",
        "dll sideloading",
        "boot",
        "logon autostart",
        "execution t1547",
        "keys",
        "startup folder",
        "t1497 may",
        "encryption",
        "catalog tree",
        "analysis ob0001",
        "virtual machine",
        "detection b0009",
        "check registry",
        "analysis ob0002",
        "executable code",
        "stack strings",
        "control ob0004",
        "get http",
        "http requests",
        "dns resolutions",
        "ip traffic",
        "pattern domains",
        "memory pattern",
        "urls http",
        "request",
        "response",
        "connection",
        "trojan",
        "otx scoreblue",
        "windows",
        "embeddedwb",
        "medium",
        "shellexecuteexw",
        "msie",
        "windows nt",
        "displayname",
        "tofsee",
        "hashes",
        "vhash",
        "authentihash",
        "ssdeep",
        "win32 exe",
        "magic pe32",
        "trid win32",
        "library",
        "read c",
        "file guard",
        "rtversion",
        "langchinese",
        "legalcopyright",
        "reserved",
        "ransom",
        "moved",
        "media",
        "ascii text",
        "default",
        "upack",
        "mike",
        "contacted",
        "x87xe1x1d",
        "regsetvalueexa",
        "x95xd3xa4",
        "regbinary",
        "x84xa8xe8i",
        "x8dxb7xb7",
        "hx88x9ax1e",
        "mx81xd1r",
        "x92xac",
        "xc2x84",
        "stream",
        "swipper",
        "pdfcreator.sf.net",
        "botnet",
        "black mercedes",
        "please forgive me",
        "therahand thouroughhand"
      ],
      "references": [
        "Project Endgame - pegausintel.com -Unsjre if related to NSO Group",
        "Antivirus Detections: ALF:HeraklezEval:Rogue:Win32/FakeRean",
        "Yara Detections: compromised_site_redirector_fromcharcode ,  Cabinet_Archive ,  SFX_CAB",
        "Alerts: infostealer_cookies persistence_autorun recon_programs recon_fingerprint removes_zoneid_ads anomalous_deletefile",
        "P\u2019s Contacted:  93.184.221.240  3.33.130.190 |  Domains Contacted: counterslocal.com",
        "compromised_site_redirector_fromcharcode fromCharCode",
        "Interesting Strings: http://www.interoperabilitybridges.com/wmp http://crbug.com/40902 http://crbug.com/516527",
        "Interesting Strings: http://service.real.com/realplayer/security/02062012_player/en/",
        "Interesting Strings: https://support.google.com/chrome/?p=plugin_pdf",
        "https://support.google.com/chrome/?p=plugin_quicktime https://chrome.google.com/",
        "Interesting Strings: http://schema.org/GovernmentOrganization https://support.google.com/chrome/?p=plugin_java https://crbug.com/593166",
        "Pdf.Phishing.TtraffRobotInstall-7605656-0 00004feb58be42ba1bd506ea89f90c5e1d83e6e1fb84841931949a454b0bb539",
        "Antivirus Detections Cryp_Xed-12 ,  Mal/Generic-S ,  Packed/Upack Yara Detections Upackv039finalDwing ,  UpackV037Dwing",
        "https://pin.it/ | https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Worm:Win32/Macoute.A",
          "display_name": "Worm:Win32/Macoute.A",
          "target": "/malware/Worm:Win32/Macoute.A"
        },
        {
          "id": "TrojanDownloader:Win32/Nemucod",
          "display_name": "TrojanDownloader:Win32/Nemucod",
          "target": "/malware/TrojanDownloader:Win32/Nemucod"
        },
        {
          "id": "TrojanSpy:Win32/Nivdort",
          "display_name": "TrojanSpy:Win32/Nivdort",
          "target": "/malware/TrojanSpy:Win32/Nivdort"
        },
        {
          "id": "ALF:HeraklezEval:Rogue:Win32/FakeRean",
          "display_name": "ALF:HeraklezEval:Rogue:Win32/FakeRean",
          "target": null
        },
        {
          "id": "Worm:Win32/Fesber.A",
          "display_name": "Worm:Win32/Fesber.A",
          "target": "/malware/Worm:Win32/Fesber.A"
        },
        {
          "id": "Ransom:Win32/Eniqma.A",
          "display_name": "Ransom:Win32/Eniqma.A",
          "target": "/malware/Ransom:Win32/Eniqma.A"
        },
        {
          "id": "Tofsee",
          "display_name": "Tofsee",
          "target": null
        },
        {
          "id": "UpackV037Dwing",
          "display_name": "UpackV037Dwing",
          "target": null
        },
        {
          "id": "Cryp_Xed-12",
          "display_name": "Cryp_Xed-12",
          "target": null
        },
        {
          "id": "Mal/Generic-S",
          "display_name": "Mal/Generic-S",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1089",
          "name": "Disabling Security Tools",
          "display_name": "T1089 - Disabling Security Tools"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1018",
          "name": "Remote System Discovery",
          "display_name": "T1018 - Remote System Discovery"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1095",
          "name": "Non-Application Layer Protocol",
          "display_name": "T1095 - Non-Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1547",
          "name": "Boot or Logon Autostart Execution",
          "display_name": "T1547 - Boot or Logon Autostart Execution"
        },
        {
          "id": "T1574",
          "name": "Hijack Execution Flow",
          "display_name": "T1574 - Hijack Execution Flow"
        },
        {
          "id": "T1096",
          "name": "NTFS File Attributes",
          "display_name": "T1096 - NTFS File Attributes"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 29,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 1493,
        "FileHash-SHA1": 1393,
        "FileHash-SHA256": 5881,
        "URL": 1495,
        "domain": 1947,
        "hostname": 1360,
        "email": 18,
        "CVE": 1
      },
      "indicator_count": 13588,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 229,
      "modified_text": "548 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65c012b5e56cc9474ebb701f",
      "name": "Cyber espionage & Ransomware attacks spread via Phone calls",
      "description": "Very strange and critical occurrences of businesses, healthcare facilities and individuals becoming part of a botnet and hacking attack when call connects with certain individuals. Healthcare facilities may be spreading this very critical vulnerability.  Attacker has access to every device & camera of affected.\n*Smoke Loader\nSmoke Loader is a malicious bot application that can be used to load other malware.Smoke Loader has been seen in the wild since at least 2011 and has included a number of different payloads. It is notorious for its use of deception and self-protection. It also comes with several plug-ins.",
      "modified": "2024-03-05T22:00:26.685000",
      "created": "2024-02-04T22:41:55.432000",
      "tags": [
        "ssl certificate",
        "whois record",
        "contacted",
        "execution",
        "historical ssl",
        "contacted urls",
        "whois whois",
        "zfglddkl58a url",
        "q0gpyr1balpdgpo",
        "relacionada",
        "formbook",
        "smoke loader",
        "iframe",
        "january",
        "resolutions",
        "referrer",
        "threat roundup",
        "snatch",
        "ransomware",
        "hacktool",
        "record type",
        "ttl value",
        "tsara brashears",
        "apple",
        "apple ios",
        "password bypass",
        "malware",
        "password",
        "apple phone",
        "download",
        "crypto",
        "relic",
        "monitoring",
        "installer",
        "tofsee",
        "core",
        "qakbot",
        "lumma stealer",
        "ransomexx",
        "communicating",
        "el0kpmhlfz",
        "qdkxgr24yz",
        "kgs0",
        "kls0",
        "malicious",
        "phi",
        "pii",
        "dofoil",
        "worn",
        "rat",
        "network",
        "dns",
        "trojan",
        "remote",
        "phone hacking",
        "hacked by phone call",
        "http response",
        "final url",
        "ip address",
        "status code",
        "body length",
        "kb body",
        "sha256",
        "headers",
        "nginx",
        "html info",
        "information",
        "meta tags",
        "network",
        "march",
        "july",
        "september",
        "february",
        "redline stealer",
        "probe",
        "raccoonstealer",
        "no data",
        "tag count",
        "thu apr",
        "threat report",
        "ip summary",
        "url summary",
        "summary",
        "sample",
        "samples",
        "asyncrat",
        "redlinestealer",
        "diamondfox",
        "first",
        "botnet command and control",
        "python connection",
        "tulach"
      ],
      "references": [
        "https://www.crccolorado.com/dr-adam-sang",
        "CS IDS Rules: MALWARE Possible Compromised Host",
        "CS IDS Rules: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz",
        "CS IDS Rules: SERVER-OTHER Squid HTTP Vary response header denial of service attempt",
        "CS IDS Rules: ET MALWARE Possible Zeus GameOver/FluBot Related DGA NXDOMAIN Responses",
        "CS IDS Rules: ET AnubisNetworks Sinkhole Cookie Value btst",
        "http://www.defi-realty.com/jem9/  [phishing]",
        "http://45.159.189.105/bot/regex    [phishing | tracking]",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/    [phishing | data collection| browser vulnerability]",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian  [password decryption]",
        "https://www.sentinelone.com/blog/going-deep-a-guide-to-reversing-smoke-loader-malware/",
        "https://attack.mitre.org/software/S0226/",
        "http://watchhers.net/index.php. [ data collection]",
        "remotewd.com",
        "https://remote.krogerlaw.com",
        "device-local-7e6b3aa6-e3de-4e8f-9213-9f15c92d1d81.remotewd.com",
        "www.pornhub.com [password decryption]",
        "www.supernetforme.com [CnC]",
        "ddos.dnsnb8.net  [CnC]",
        "http://happylifehappywife.com/wp-content/themes/theme78222/images/top-right.jpg    [phishing]",
        "http://amaiorpascoadetodas2.com/cgi-sys/suspendedpage.cgi?smart-tv-led-55-samsung-55ru7100-ultra-hd-4k-com-conversor-digital-3-hdmi-2-usb-wi-fi-visual-livre-de-cabos-controle-remoto-%C3%9Anico-e-bluetooth-&skullid=539293743",
        "http://amaiorpascoadetodas2.com/cgi-sys/suspendedpage.cgi?smart-tv-led-55-samsung-55ru7100-ultra-hd-4k-com-conversor-digital-3-hdmi-2-usb-wi-fi-visual-livre-de-cabos-controle-remoto-%C3%9Anico-e-bluetooth-&skullid=539293743",
        "http://url7639.ascglobal-email.com/wf/open?upn=HDu-2BON2WuckNVJ2U1s3AlMizU2CbfEvFl7S9TXTdQm2nLS-2F0QX6mc4PxuUDVyCyIzMeTvJRSiC633rEV-2B8mukshW0CHiC-2FvQOWOgJR6RGOtzDWutJV4OtjBHGduMDUigvEESSJQD8KXk1UU3bXtRdyd7QpBC-2F7Ti-2Bq6tNr1C4yz-2FXcUbYvtJX4ip5d5t5eXud233BW97tdcojPu0yKWZ0Zm2DyXbj1RIwt-2FO0RcYLC7feNtrpw6OxBd8r4Tc3uHoT7Z9NFErDUBbBuYpsze-2FiBRziGeeMExS5l82Xna4au56co0IdOcfscmwGtC-2BxD3xiJW4v560wXMZQU0G9hqqPVeYTnwZwyfebBz1KLSW-2BIJtHMF6DCNHhatvrb3WM84-2BGpgCxOK1dFKPiKsmPzSc-2BdCAO9BzU3K6G7EaDYNu2cRHdGmat-2BCJs",
        "https://darkforums.me/Thread-Check-Any-Indian-Vehicle-Owner-Details-home-address-phone-number [Whoa Nelly!]",
        "https://us-bankofamerica.com/PhoneVerification.php/",
        "http://www.w3.org/TR/html4/loose.dtd | www.w3.org  [collection]",
        "http://dl.ariamobile.net/mobile/2008.10.a/applications/My_Phone-v2.01-S60v3-[wWw.Ariamobile.Net].zip",
        "http://iphones.email   [redirection chain]",
        "*Patient PII & PHI at critical risk"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Lumma Stealer",
          "display_name": "Lumma Stealer",
          "target": null
        },
        {
          "id": "FormBook",
          "display_name": "FormBook",
          "target": null
        },
        {
          "id": "Smoke Loader",
          "display_name": "Smoke Loader",
          "target": null
        },
        {
          "id": "Relic",
          "display_name": "Relic",
          "target": null
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        },
        {
          "id": "Ransomware",
          "display_name": "Ransomware",
          "target": null
        },
        {
          "id": "Qakbot",
          "display_name": "Qakbot",
          "target": null
        },
        {
          "id": "RansomEXX",
          "display_name": "RansomEXX",
          "target": null
        },
        {
          "id": "Generic.Malware",
          "display_name": "Generic.Malware",
          "target": null
        },
        {
          "id": "Gen:Variant.Zusy",
          "display_name": "Gen:Variant.Zusy",
          "target": null
        },
        {
          "id": "Razy",
          "display_name": "Razy",
          "target": null
        },
        {
          "id": "Tofsee",
          "display_name": "Tofsee",
          "target": null
        },
        {
          "id": "SuppoBox",
          "display_name": "SuppoBox",
          "target": null
        },
        {
          "id": "DangerousObject.Multi",
          "display_name": "DangerousObject.Multi",
          "target": null
        },
        {
          "id": "Trojan.Injector",
          "display_name": "Trojan.Injector",
          "target": null
        },
        {
          "id": "Simda",
          "display_name": "Simda",
          "target": null
        },
        {
          "id": "Defacement",
          "display_name": "Defacement",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1110",
          "name": "Brute Force",
          "display_name": "T1110 - Brute Force"
        },
        {
          "id": "T1111",
          "name": "Two-Factor Authentication Interception",
          "display_name": "T1111 - Two-Factor Authentication Interception"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1110.002",
          "name": "Password Cracking",
          "display_name": "T1110.002 - Password Cracking"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1491",
          "name": "Defacement",
          "display_name": "T1491 - Defacement"
        },
        {
          "id": "T1547.001",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1547.001 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1555.003",
          "name": "Credentials from Web Browsers",
          "display_name": "T1555.003 - Credentials from Web Browsers"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1055.012",
          "name": "Process Hollowing",
          "display_name": "T1055.012 - Process Hollowing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1552.001",
          "name": "Credentials In Files",
          "display_name": "T1552.001 - Credentials In Files"
        },
        {
          "id": "T1497.001",
          "name": "System Checks",
          "display_name": "T1497.001 - System Checks"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1059.006",
          "name": "Python",
          "display_name": "T1059.006 - Python"
        },
        {
          "id": "T1059.005",
          "name": "Visual Basic",
          "display_name": "T1059.005 - Visual Basic"
        }
      ],
      "industries": [
        "Healthcare",
        "Civil Society",
        "Patients"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 62,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 244,
        "FileHash-SHA1": 237,
        "FileHash-SHA256": 5468,
        "URL": 3747,
        "domain": 2512,
        "hostname": 1593,
        "CVE": 4
      },
      "indicator_count": 13805,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 222,
      "modified_text": "775 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65c09e487b3899f3442aed96",
      "name": "Cyber espionage & Ransomware attacks spread via Phone call?",
      "description": "",
      "modified": "2024-03-05T22:00:26.685000",
      "created": "2024-02-05T08:37:28.774000",
      "tags": [
        "ssl certificate",
        "whois record",
        "contacted",
        "execution",
        "historical ssl",
        "contacted urls",
        "whois whois",
        "zfglddkl58a url",
        "q0gpyr1balpdgpo",
        "relacionada",
        "formbook",
        "smoke loader",
        "iframe",
        "january",
        "resolutions",
        "referrer",
        "threat roundup",
        "snatch",
        "ransomware",
        "hacktool",
        "record type",
        "ttl value",
        "tsara brashears",
        "apple",
        "apple ios",
        "password bypass",
        "malware",
        "password",
        "apple phone",
        "download",
        "crypto",
        "relic",
        "monitoring",
        "installer",
        "tofsee",
        "core",
        "qakbot",
        "lumma stealer",
        "ransomexx",
        "communicating",
        "el0kpmhlfz",
        "qdkxgr24yz",
        "kgs0",
        "kls0",
        "malicious",
        "phi",
        "pii",
        "dofoil",
        "worn",
        "rat",
        "network",
        "dns",
        "trojan",
        "remote",
        "phone hacking",
        "hacked by phone call",
        "http response",
        "final url",
        "ip address",
        "status code",
        "body length",
        "kb body",
        "sha256",
        "headers",
        "nginx",
        "html info",
        "information",
        "meta tags",
        "network",
        "march",
        "july",
        "september",
        "february",
        "redline stealer",
        "probe",
        "raccoonstealer",
        "no data",
        "tag count",
        "thu apr",
        "threat report",
        "ip summary",
        "url summary",
        "summary",
        "sample",
        "samples",
        "asyncrat",
        "redlinestealer",
        "diamondfox",
        "first",
        "botnet command and control",
        "python connection",
        "tulach"
      ],
      "references": [
        "https://www.crccolorado.com/dr-adam-sang",
        "CS IDS Rules: MALWARE Possible Compromised Host",
        "CS IDS Rules: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz",
        "CS IDS Rules: SERVER-OTHER Squid HTTP Vary response header denial of service attempt",
        "CS IDS Rules: ET MALWARE Possible Zeus GameOver/FluBot Related DGA NXDOMAIN Responses",
        "CS IDS Rules: ET AnubisNetworks Sinkhole Cookie Value btst",
        "http://www.defi-realty.com/jem9/  [phishing]",
        "http://45.159.189.105/bot/regex    [phishing | tracking]",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/    [phishing | data collection| browser vulnerability]",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian  [password decryption]",
        "https://www.sentinelone.com/blog/going-deep-a-guide-to-reversing-smoke-loader-malware/",
        "https://attack.mitre.org/software/S0226/",
        "http://watchhers.net/index.php. [ data collection]",
        "remotewd.com",
        "https://remote.krogerlaw.com",
        "device-local-7e6b3aa6-e3de-4e8f-9213-9f15c92d1d81.remotewd.com",
        "www.pornhub.com [password decryption]",
        "www.supernetforme.com [CnC]",
        "ddos.dnsnb8.net  [CnC]",
        "http://happylifehappywife.com/wp-content/themes/theme78222/images/top-right.jpg    [phishing]",
        "http://amaiorpascoadetodas2.com/cgi-sys/suspendedpage.cgi?smart-tv-led-55-samsung-55ru7100-ultra-hd-4k-com-conversor-digital-3-hdmi-2-usb-wi-fi-visual-livre-de-cabos-controle-remoto-%C3%9Anico-e-bluetooth-&skullid=539293743",
        "http://amaiorpascoadetodas2.com/cgi-sys/suspendedpage.cgi?smart-tv-led-55-samsung-55ru7100-ultra-hd-4k-com-conversor-digital-3-hdmi-2-usb-wi-fi-visual-livre-de-cabos-controle-remoto-%C3%9Anico-e-bluetooth-&skullid=539293743",
        "http://url7639.ascglobal-email.com/wf/open?upn=HDu-2BON2WuckNVJ2U1s3AlMizU2CbfEvFl7S9TXTdQm2nLS-2F0QX6mc4PxuUDVyCyIzMeTvJRSiC633rEV-2B8mukshW0CHiC-2FvQOWOgJR6RGOtzDWutJV4OtjBHGduMDUigvEESSJQD8KXk1UU3bXtRdyd7QpBC-2F7Ti-2Bq6tNr1C4yz-2FXcUbYvtJX4ip5d5t5eXud233BW97tdcojPu0yKWZ0Zm2DyXbj1RIwt-2FO0RcYLC7feNtrpw6OxBd8r4Tc3uHoT7Z9NFErDUBbBuYpsze-2FiBRziGeeMExS5l82Xna4au56co0IdOcfscmwGtC-2BxD3xiJW4v560wXMZQU0G9hqqPVeYTnwZwyfebBz1KLSW-2BIJtHMF6DCNHhatvrb3WM84-2BGpgCxOK1dFKPiKsmPzSc-2BdCAO9BzU3K6G7EaDYNu2cRHdGmat-2BCJs",
        "https://darkforums.me/Thread-Check-Any-Indian-Vehicle-Owner-Details-home-address-phone-number [Whoa Nelly!]",
        "https://us-bankofamerica.com/PhoneVerification.php/",
        "http://www.w3.org/TR/html4/loose.dtd | www.w3.org  [collection]",
        "http://dl.ariamobile.net/mobile/2008.10.a/applications/My_Phone-v2.01-S60v3-[wWw.Ariamobile.Net].zip",
        "http://iphones.email   [redirection chain]",
        "*Patient PII & PHI at critical risk"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Lumma Stealer",
          "display_name": "Lumma Stealer",
          "target": null
        },
        {
          "id": "FormBook",
          "display_name": "FormBook",
          "target": null
        },
        {
          "id": "Smoke Loader",
          "display_name": "Smoke Loader",
          "target": null
        },
        {
          "id": "Relic",
          "display_name": "Relic",
          "target": null
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        },
        {
          "id": "Ransomware",
          "display_name": "Ransomware",
          "target": null
        },
        {
          "id": "Qakbot",
          "display_name": "Qakbot",
          "target": null
        },
        {
          "id": "RansomEXX",
          "display_name": "RansomEXX",
          "target": null
        },
        {
          "id": "Generic.Malware",
          "display_name": "Generic.Malware",
          "target": null
        },
        {
          "id": "Gen:Variant.Zusy",
          "display_name": "Gen:Variant.Zusy",
          "target": null
        },
        {
          "id": "Razy",
          "display_name": "Razy",
          "target": null
        },
        {
          "id": "Tofsee",
          "display_name": "Tofsee",
          "target": null
        },
        {
          "id": "SuppoBox",
          "display_name": "SuppoBox",
          "target": null
        },
        {
          "id": "DangerousObject.Multi",
          "display_name": "DangerousObject.Multi",
          "target": null
        },
        {
          "id": "Trojan.Injector",
          "display_name": "Trojan.Injector",
          "target": null
        },
        {
          "id": "Simda",
          "display_name": "Simda",
          "target": null
        },
        {
          "id": "Defacement",
          "display_name": "Defacement",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1110",
          "name": "Brute Force",
          "display_name": "T1110 - Brute Force"
        },
        {
          "id": "T1111",
          "name": "Two-Factor Authentication Interception",
          "display_name": "T1111 - Two-Factor Authentication Interception"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1110.002",
          "name": "Password Cracking",
          "display_name": "T1110.002 - Password Cracking"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1491",
          "name": "Defacement",
          "display_name": "T1491 - Defacement"
        },
        {
          "id": "T1547.001",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1547.001 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1555.003",
          "name": "Credentials from Web Browsers",
          "display_name": "T1555.003 - Credentials from Web Browsers"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1055.012",
          "name": "Process Hollowing",
          "display_name": "T1055.012 - Process Hollowing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1552.001",
          "name": "Credentials In Files",
          "display_name": "T1552.001 - Credentials In Files"
        },
        {
          "id": "T1497.001",
          "name": "System Checks",
          "display_name": "T1497.001 - System Checks"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1059.006",
          "name": "Python",
          "display_name": "T1059.006 - Python"
        },
        {
          "id": "T1059.005",
          "name": "Visual Basic",
          "display_name": "T1059.005 - Visual Basic"
        }
      ],
      "industries": [
        "Healthcare",
        "Civil Society",
        "Patients"
      ],
      "TLP": "white",
      "cloned_from": "65c012b5e56cc9474ebb701f",
      "export_count": 58,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 244,
        "FileHash-SHA1": 237,
        "FileHash-SHA256": 5468,
        "URL": 3747,
        "domain": 2512,
        "hostname": 1593,
        "CVE": 4
      },
      "indicator_count": 13805,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 228,
      "modified_text": "775 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65c970ef974adf44ef24c9a2",
      "name": "Cyber espionage & Ransomware attacks spread via Phone call?",
      "description": "",
      "modified": "2024-03-05T22:00:26.685000",
      "created": "2024-02-12T01:14:23.337000",
      "tags": [
        "ssl certificate",
        "whois record",
        "contacted",
        "execution",
        "historical ssl",
        "contacted urls",
        "whois whois",
        "zfglddkl58a url",
        "q0gpyr1balpdgpo",
        "relacionada",
        "formbook",
        "smoke loader",
        "iframe",
        "january",
        "resolutions",
        "referrer",
        "threat roundup",
        "snatch",
        "ransomware",
        "hacktool",
        "record type",
        "ttl value",
        "tsara brashears",
        "apple",
        "apple ios",
        "password bypass",
        "malware",
        "password",
        "apple phone",
        "download",
        "crypto",
        "relic",
        "monitoring",
        "installer",
        "tofsee",
        "core",
        "qakbot",
        "lumma stealer",
        "ransomexx",
        "communicating",
        "el0kpmhlfz",
        "qdkxgr24yz",
        "kgs0",
        "kls0",
        "malicious",
        "phi",
        "pii",
        "dofoil",
        "worn",
        "rat",
        "network",
        "dns",
        "trojan",
        "remote",
        "phone hacking",
        "hacked by phone call",
        "http response",
        "final url",
        "ip address",
        "status code",
        "body length",
        "kb body",
        "sha256",
        "headers",
        "nginx",
        "html info",
        "information",
        "meta tags",
        "network",
        "march",
        "july",
        "september",
        "february",
        "redline stealer",
        "probe",
        "raccoonstealer",
        "no data",
        "tag count",
        "thu apr",
        "threat report",
        "ip summary",
        "url summary",
        "summary",
        "sample",
        "samples",
        "asyncrat",
        "redlinestealer",
        "diamondfox",
        "first",
        "botnet command and control",
        "python connection",
        "tulach"
      ],
      "references": [
        "https://www.crccolorado.com/dr-adam-sang",
        "CS IDS Rules: MALWARE Possible Compromised Host",
        "CS IDS Rules: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz",
        "CS IDS Rules: SERVER-OTHER Squid HTTP Vary response header denial of service attempt",
        "CS IDS Rules: ET MALWARE Possible Zeus GameOver/FluBot Related DGA NXDOMAIN Responses",
        "CS IDS Rules: ET AnubisNetworks Sinkhole Cookie Value btst",
        "http://www.defi-realty.com/jem9/  [phishing]",
        "http://45.159.189.105/bot/regex    [phishing | tracking]",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/    [phishing | data collection| browser vulnerability]",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian  [password decryption]",
        "https://www.sentinelone.com/blog/going-deep-a-guide-to-reversing-smoke-loader-malware/",
        "https://attack.mitre.org/software/S0226/",
        "http://watchhers.net/index.php. [ data collection]",
        "remotewd.com",
        "https://remote.krogerlaw.com",
        "device-local-7e6b3aa6-e3de-4e8f-9213-9f15c92d1d81.remotewd.com",
        "www.pornhub.com [password decryption]",
        "www.supernetforme.com [CnC]",
        "ddos.dnsnb8.net  [CnC]",
        "http://happylifehappywife.com/wp-content/themes/theme78222/images/top-right.jpg    [phishing]",
        "http://amaiorpascoadetodas2.com/cgi-sys/suspendedpage.cgi?smart-tv-led-55-samsung-55ru7100-ultra-hd-4k-com-conversor-digital-3-hdmi-2-usb-wi-fi-visual-livre-de-cabos-controle-remoto-%C3%9Anico-e-bluetooth-&skullid=539293743",
        "http://amaiorpascoadetodas2.com/cgi-sys/suspendedpage.cgi?smart-tv-led-55-samsung-55ru7100-ultra-hd-4k-com-conversor-digital-3-hdmi-2-usb-wi-fi-visual-livre-de-cabos-controle-remoto-%C3%9Anico-e-bluetooth-&skullid=539293743",
        "http://url7639.ascglobal-email.com/wf/open?upn=HDu-2BON2WuckNVJ2U1s3AlMizU2CbfEvFl7S9TXTdQm2nLS-2F0QX6mc4PxuUDVyCyIzMeTvJRSiC633rEV-2B8mukshW0CHiC-2FvQOWOgJR6RGOtzDWutJV4OtjBHGduMDUigvEESSJQD8KXk1UU3bXtRdyd7QpBC-2F7Ti-2Bq6tNr1C4yz-2FXcUbYvtJX4ip5d5t5eXud233BW97tdcojPu0yKWZ0Zm2DyXbj1RIwt-2FO0RcYLC7feNtrpw6OxBd8r4Tc3uHoT7Z9NFErDUBbBuYpsze-2FiBRziGeeMExS5l82Xna4au56co0IdOcfscmwGtC-2BxD3xiJW4v560wXMZQU0G9hqqPVeYTnwZwyfebBz1KLSW-2BIJtHMF6DCNHhatvrb3WM84-2BGpgCxOK1dFKPiKsmPzSc-2BdCAO9BzU3K6G7EaDYNu2cRHdGmat-2BCJs",
        "https://darkforums.me/Thread-Check-Any-Indian-Vehicle-Owner-Details-home-address-phone-number [Whoa Nelly!]",
        "https://us-bankofamerica.com/PhoneVerification.php/",
        "http://www.w3.org/TR/html4/loose.dtd | www.w3.org  [collection]",
        "http://dl.ariamobile.net/mobile/2008.10.a/applications/My_Phone-v2.01-S60v3-[wWw.Ariamobile.Net].zip",
        "http://iphones.email   [redirection chain]",
        "*Patient PII & PHI at critical risk"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Lumma Stealer",
          "display_name": "Lumma Stealer",
          "target": null
        },
        {
          "id": "FormBook",
          "display_name": "FormBook",
          "target": null
        },
        {
          "id": "Smoke Loader",
          "display_name": "Smoke Loader",
          "target": null
        },
        {
          "id": "Relic",
          "display_name": "Relic",
          "target": null
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        },
        {
          "id": "Ransomware",
          "display_name": "Ransomware",
          "target": null
        },
        {
          "id": "Qakbot",
          "display_name": "Qakbot",
          "target": null
        },
        {
          "id": "RansomEXX",
          "display_name": "RansomEXX",
          "target": null
        },
        {
          "id": "Generic.Malware",
          "display_name": "Generic.Malware",
          "target": null
        },
        {
          "id": "Gen:Variant.Zusy",
          "display_name": "Gen:Variant.Zusy",
          "target": null
        },
        {
          "id": "Razy",
          "display_name": "Razy",
          "target": null
        },
        {
          "id": "Tofsee",
          "display_name": "Tofsee",
          "target": null
        },
        {
          "id": "SuppoBox",
          "display_name": "SuppoBox",
          "target": null
        },
        {
          "id": "DangerousObject.Multi",
          "display_name": "DangerousObject.Multi",
          "target": null
        },
        {
          "id": "Trojan.Injector",
          "display_name": "Trojan.Injector",
          "target": null
        },
        {
          "id": "Simda",
          "display_name": "Simda",
          "target": null
        },
        {
          "id": "Defacement",
          "display_name": "Defacement",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1110",
          "name": "Brute Force",
          "display_name": "T1110 - Brute Force"
        },
        {
          "id": "T1111",
          "name": "Two-Factor Authentication Interception",
          "display_name": "T1111 - Two-Factor Authentication Interception"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1110.002",
          "name": "Password Cracking",
          "display_name": "T1110.002 - Password Cracking"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1491",
          "name": "Defacement",
          "display_name": "T1491 - Defacement"
        },
        {
          "id": "T1547.001",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1547.001 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1555.003",
          "name": "Credentials from Web Browsers",
          "display_name": "T1555.003 - Credentials from Web Browsers"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1055.012",
          "name": "Process Hollowing",
          "display_name": "T1055.012 - Process Hollowing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1552.001",
          "name": "Credentials In Files",
          "display_name": "T1552.001 - Credentials In Files"
        },
        {
          "id": "T1497.001",
          "name": "System Checks",
          "display_name": "T1497.001 - System Checks"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1059.006",
          "name": "Python",
          "display_name": "T1059.006 - Python"
        },
        {
          "id": "T1059.005",
          "name": "Visual Basic",
          "display_name": "T1059.005 - Visual Basic"
        }
      ],
      "industries": [
        "Healthcare",
        "Civil Society",
        "Patients"
      ],
      "TLP": "white",
      "cloned_from": "65c09e487b3899f3442aed96",
      "export_count": 65,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 244,
        "FileHash-SHA1": 237,
        "FileHash-SHA256": 5468,
        "URL": 3747,
        "domain": 2512,
        "hostname": 1593,
        "CVE": 4
      },
      "indicator_count": 13805,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 224,
      "modified_text": "775 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65e1ece3b935bda6b9d3e10b",
      "name": "Cyber espionage & Ransomware attacks spread via Phone call? II.",
      "description": "",
      "modified": "2024-03-05T22:00:26.685000",
      "created": "2024-03-01T14:57:39.828000",
      "tags": [
        "ssl certificate",
        "whois record",
        "contacted",
        "execution",
        "historical ssl",
        "contacted urls",
        "whois whois",
        "zfglddkl58a url",
        "q0gpyr1balpdgpo",
        "relacionada",
        "formbook",
        "smoke loader",
        "iframe",
        "january",
        "resolutions",
        "referrer",
        "threat roundup",
        "snatch",
        "ransomware",
        "hacktool",
        "record type",
        "ttl value",
        "tsara brashears",
        "apple",
        "apple ios",
        "password bypass",
        "malware",
        "password",
        "apple phone",
        "download",
        "crypto",
        "relic",
        "monitoring",
        "installer",
        "tofsee",
        "core",
        "qakbot",
        "lumma stealer",
        "ransomexx",
        "communicating",
        "el0kpmhlfz",
        "qdkxgr24yz",
        "kgs0",
        "kls0",
        "malicious",
        "phi",
        "pii",
        "dofoil",
        "worn",
        "rat",
        "network",
        "dns",
        "trojan",
        "remote",
        "phone hacking",
        "hacked by phone call",
        "http response",
        "final url",
        "ip address",
        "status code",
        "body length",
        "kb body",
        "sha256",
        "headers",
        "nginx",
        "html info",
        "information",
        "meta tags",
        "network",
        "march",
        "july",
        "september",
        "february",
        "redline stealer",
        "probe",
        "raccoonstealer",
        "no data",
        "tag count",
        "thu apr",
        "threat report",
        "ip summary",
        "url summary",
        "summary",
        "sample",
        "samples",
        "asyncrat",
        "redlinestealer",
        "diamondfox",
        "first",
        "botnet command and control",
        "python connection",
        "tulach"
      ],
      "references": [
        "https://www.crccolorado.com/dr-adam-sang",
        "CS IDS Rules: MALWARE Possible Compromised Host",
        "CS IDS Rules: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz",
        "CS IDS Rules: SERVER-OTHER Squid HTTP Vary response header denial of service attempt",
        "CS IDS Rules: ET MALWARE Possible Zeus GameOver/FluBot Related DGA NXDOMAIN Responses",
        "CS IDS Rules: ET AnubisNetworks Sinkhole Cookie Value btst",
        "http://www.defi-realty.com/jem9/  [phishing]",
        "http://45.159.189.105/bot/regex    [phishing | tracking]",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/    [phishing | data collection| browser vulnerability]",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian  [password decryption]",
        "https://www.sentinelone.com/blog/going-deep-a-guide-to-reversing-smoke-loader-malware/",
        "https://attack.mitre.org/software/S0226/",
        "http://watchhers.net/index.php. [ data collection]",
        "remotewd.com",
        "https://remote.krogerlaw.com",
        "device-local-7e6b3aa6-e3de-4e8f-9213-9f15c92d1d81.remotewd.com",
        "www.pornhub.com [password decryption]",
        "www.supernetforme.com [CnC]",
        "ddos.dnsnb8.net  [CnC]",
        "http://happylifehappywife.com/wp-content/themes/theme78222/images/top-right.jpg    [phishing]",
        "http://amaiorpascoadetodas2.com/cgi-sys/suspendedpage.cgi?smart-tv-led-55-samsung-55ru7100-ultra-hd-4k-com-conversor-digital-3-hdmi-2-usb-wi-fi-visual-livre-de-cabos-controle-remoto-%C3%9Anico-e-bluetooth-&skullid=539293743",
        "http://amaiorpascoadetodas2.com/cgi-sys/suspendedpage.cgi?smart-tv-led-55-samsung-55ru7100-ultra-hd-4k-com-conversor-digital-3-hdmi-2-usb-wi-fi-visual-livre-de-cabos-controle-remoto-%C3%9Anico-e-bluetooth-&skullid=539293743",
        "http://url7639.ascglobal-email.com/wf/open?upn=HDu-2BON2WuckNVJ2U1s3AlMizU2CbfEvFl7S9TXTdQm2nLS-2F0QX6mc4PxuUDVyCyIzMeTvJRSiC633rEV-2B8mukshW0CHiC-2FvQOWOgJR6RGOtzDWutJV4OtjBHGduMDUigvEESSJQD8KXk1UU3bXtRdyd7QpBC-2F7Ti-2Bq6tNr1C4yz-2FXcUbYvtJX4ip5d5t5eXud233BW97tdcojPu0yKWZ0Zm2DyXbj1RIwt-2FO0RcYLC7feNtrpw6OxBd8r4Tc3uHoT7Z9NFErDUBbBuYpsze-2FiBRziGeeMExS5l82Xna4au56co0IdOcfscmwGtC-2BxD3xiJW4v560wXMZQU0G9hqqPVeYTnwZwyfebBz1KLSW-2BIJtHMF6DCNHhatvrb3WM84-2BGpgCxOK1dFKPiKsmPzSc-2BdCAO9BzU3K6G7EaDYNu2cRHdGmat-2BCJs",
        "https://darkforums.me/Thread-Check-Any-Indian-Vehicle-Owner-Details-home-address-phone-number [Whoa Nelly!]",
        "https://us-bankofamerica.com/PhoneVerification.php/",
        "http://www.w3.org/TR/html4/loose.dtd | www.w3.org  [collection]",
        "http://dl.ariamobile.net/mobile/2008.10.a/applications/My_Phone-v2.01-S60v3-[wWw.Ariamobile.Net].zip",
        "http://iphones.email   [redirection chain]",
        "*Patient PII & PHI at critical risk"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Lumma Stealer",
          "display_name": "Lumma Stealer",
          "target": null
        },
        {
          "id": "FormBook",
          "display_name": "FormBook",
          "target": null
        },
        {
          "id": "Smoke Loader",
          "display_name": "Smoke Loader",
          "target": null
        },
        {
          "id": "Relic",
          "display_name": "Relic",
          "target": null
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        },
        {
          "id": "Ransomware",
          "display_name": "Ransomware",
          "target": null
        },
        {
          "id": "Qakbot",
          "display_name": "Qakbot",
          "target": null
        },
        {
          "id": "RansomEXX",
          "display_name": "RansomEXX",
          "target": null
        },
        {
          "id": "Generic.Malware",
          "display_name": "Generic.Malware",
          "target": null
        },
        {
          "id": "Gen:Variant.Zusy",
          "display_name": "Gen:Variant.Zusy",
          "target": null
        },
        {
          "id": "Razy",
          "display_name": "Razy",
          "target": null
        },
        {
          "id": "Tofsee",
          "display_name": "Tofsee",
          "target": null
        },
        {
          "id": "SuppoBox",
          "display_name": "SuppoBox",
          "target": null
        },
        {
          "id": "DangerousObject.Multi",
          "display_name": "DangerousObject.Multi",
          "target": null
        },
        {
          "id": "Trojan.Injector",
          "display_name": "Trojan.Injector",
          "target": null
        },
        {
          "id": "Simda",
          "display_name": "Simda",
          "target": null
        },
        {
          "id": "Defacement",
          "display_name": "Defacement",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1110",
          "name": "Brute Force",
          "display_name": "T1110 - Brute Force"
        },
        {
          "id": "T1111",
          "name": "Two-Factor Authentication Interception",
          "display_name": "T1111 - Two-Factor Authentication Interception"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1110.002",
          "name": "Password Cracking",
          "display_name": "T1110.002 - Password Cracking"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1491",
          "name": "Defacement",
          "display_name": "T1491 - Defacement"
        },
        {
          "id": "T1547.001",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1547.001 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1555.003",
          "name": "Credentials from Web Browsers",
          "display_name": "T1555.003 - Credentials from Web Browsers"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1055.012",
          "name": "Process Hollowing",
          "display_name": "T1055.012 - Process Hollowing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        },
        {
          "id": "T1552.001",
          "name": "Credentials In Files",
          "display_name": "T1552.001 - Credentials In Files"
        },
        {
          "id": "T1497.001",
          "name": "System Checks",
          "display_name": "T1497.001 - System Checks"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1059.006",
          "name": "Python",
          "display_name": "T1059.006 - Python"
        },
        {
          "id": "T1059.005",
          "name": "Visual Basic",
          "display_name": "T1059.005 - Visual Basic"
        }
      ],
      "industries": [
        "Healthcare",
        "Civil Society",
        "Patients"
      ],
      "TLP": "white",
      "cloned_from": "65c09e487b3899f3442aed96",
      "export_count": 88,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Enqrypted",
        "id": "272105",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_272105/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 244,
        "FileHash-SHA1": 237,
        "FileHash-SHA256": 5468,
        "URL": 3747,
        "domain": 2512,
        "hostname": 1593,
        "CVE": 4
      },
      "indicator_count": 13805,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 68,
      "modified_text": "775 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "becauseproblem.net",
    "type": "Domain"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "becauseproblem.net",
    "found": false,
    "verdict": "clean",
    "urls": [],
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776670967.6354866
}