{
  "type": "Domain",
  "indicator": "berritechnology.com",
  "general": {
    "sections": [
      "general",
      "geo",
      "url_list",
      "passive_dns",
      "malware",
      "whois",
      "http_scans"
    ],
    "whois": "http://whois.domaintools.com/berritechnology.com",
    "alexa": "http://www.alexa.com/siteinfo/berritechnology.com",
    "indicator": "berritechnology.com",
    "type": "domain",
    "type_title": "Domain",
    "validation": [],
    "base_indicator": {
      "id": 3758586865,
      "indicator": "berritechnology.com",
      "type": "domain",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 4,
      "pulses": [
        {
          "id": "65e0ee3c026bf0e346f62f80",
          "name": "Original State ",
          "description": "",
          "modified": "2024-03-30T20:02:03.506000",
          "created": "2024-02-29T20:51:08.655000",
          "tags": [
            "referrer",
            "contacted urls",
            "contacted",
            "shaw telecom",
            "shaw business",
            "city",
            "solutions",
            "bgpp ref",
            "rtechhandle",
            "net72",
            "net720000",
            "server",
            "google",
            "creation date",
            "dnssec",
            "domain name",
            "status",
            "abuse contact",
            "email",
            "bat",
            "heuristic",
            "trojan",
            "dropper",
            "ssl certificate",
            "execution",
            "siblings",
            "resolutions",
            "code overlap",
            "yara detections",
            "pea exe",
            "scan endpoints",
            "all octoseek",
            "pulse pulses",
            "av detections",
            "ids detections",
            "alerts",
            "analysis date",
            "Pea: pack, encrypt, authenticate",
            "search",
            "entries",
            "hostname",
            "pulse submit",
            "url analysis",
            "passive dns",
            "urls",
            "files",
            "unknown",
            "united",
            "servers",
            "showing",
            "name servers",
            "meta",
            "whois",
            "pe resource",
            "whois domain",
            "doylestown, pa",
            "ransom",
            "body",
            "gmt contenttype",
            "ubuntu",
            "date",
            "all search",
            "otx octoseek",
            "ipv4",
            "location united",
            "urls url",
            "domains domain",
            "whois record",
            "whois whois",
            "historical ssl",
            "group",
            "mirai",
            "exploit",
            "dark power",
            "bitrat",
            "powershell",
            "aurora stealer",
            "matryoshka",
            "service",
            "emotet",
            "date hash",
            "ComSpyAudit",
            "delphi",
            "win64",
            "related pulses",
            "icmp traffic",
            "packing t1045",
            "t1045",
            "show",
            "malware",
            "copy",
            "write",
            "stack_string",
            "evoe",
            "eej er",
            "lex1 esaaege",
            "ap e06eke4",
            "ehpeeepe e",
            "ehrk elm",
            "eme et",
            "exx el",
            "esme evte1exe",
            "evte1exe",
            "false",
            "useragent usage",
            "true",
            "windows nt",
            "close",
            "flashpix",
            "open",
            "dock",
            "next",
            "hello",
            "encrypt",
            "nexus myst",
            "active threat",
            "source id",
            "targeting",
            "defacement"
          ],
          "references": [
            "7034.sydneyplus.com",
            "LIBRARYWEBLINK.EXE",
            "Pea: pack, encrypt, authenticate",
            "EXE:CompanyName: LegalCopyright\t- Giorgio Tani, LGPLv3",
            "Private IP address: 0.64.0.0 -",
            "Emotet: FileHash-MD5  a77357ccec5530d0db3f0d603584191f",
            "Emotet: FileHash-SHA1  218afe0fccd7fd1d7cb08904e12caf2d22a0db47",
            "Emotet: FileHash-SHA256  fcf5500a8b46bf8c7234fb0cc4568e2bd65b12ef8b700dc11ff8ee507ba129da",
            "Pottieq: FileHash-MD5  8b91e351d1e46af68f27bae037fcfff6",
            "Pottieq: FileHash-SHA1  1ba1aa3d08080e27eb91d206cf54672edb051662",
            "Pottieq: FileHash-SHA256 cd2515f7f08ffea35d351b5cd37045f330c420e575f533ef3394a32c2fd52e95",
            "Mirai IP: 0.110.128.0",
            "Worm:Win32/Gamarue: FileHash-MD5 d3a36a65f960436b0b35ce5fb17481c6",
            "Worm:Win32/Gamarue: FileHash-SHA  3f390af687885304f5b610eabe82b3d9dad8f6d8",
            "Worm:Win32/Gamarue: FileHash-SHA256 8bb70aa49c307504f4872431e38ff8136b3e09520f228c5720e5d50c406d8a68",
            "Worm:Win32/Mofksys.RND!MTB: FileHash-MD5  db595ce78a3324f4ae83c1b2cb06f7aa",
            "Worm:Win32/Mofksys.RND!MTB: FileHash-SHA1  1dfd47d2c3c93536d8b924308faf100b338acd6a",
            "Worm:Win32/Mofksys.RND!MTB: FileHash-SHA256  16b0b335d23384388123215741c0f89d71532f36afa7ff7e8f112bfc7bc9de46",
            "Win64:BotX-gen\\ [Trj]:  FileHash-MD5  d2a0a135abcc97aab5d85c0dc95a5857",
            "Win64:BotX-gen\\ [Trj]: FileHash-SHA1  cdb6de8689a1d4d9132d0fbb8647f09fc0348776",
            "Win64:BotX-gen\\ [Trj]: FileHash-SHA256  000588bb01a8ebf9612179a8c3991c998658686589dae48ad220253fde655f1f",
            "The Medical Protection Society Ltd: The Medical Protection Society Limited (\u201cMPS\u201d) is the world's leading protection organisation for doctors, dentists and healthcare professionals.",
            "https://otx.alienvault.com/indicator/hostname/library.medicalprotection.org",
            "https://otx.alienvault.com/indicator/file/cd2515f7f08ffea35d351b5cd37045f330c420e575f533ef3394a32c2fd52e95",
            "https://otx.alienvault.com/indicator/file/000588bb01a8ebf9612179a8c3991c998658686589dae48ad220253fde655f1f"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Antiy-AVL Trojan[Downloader]/Win32.Betload",
              "display_name": "Antiy-AVL Trojan[Downloader]/Win32.Betload",
              "target": null
            },
            {
              "id": "Trojan.BAT.Agent.tnKf",
              "display_name": "Trojan.BAT.Agent.tnKf",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Worm:Win32/Goosky",
              "display_name": "Worm:Win32/Goosky",
              "target": "/malware/Worm:Win32/Goosky"
            },
            {
              "id": "Ransom:Win32/Pottieq",
              "display_name": "Ransom:Win32/Pottieq",
              "target": "/malware/Ransom:Win32/Pottieq"
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Worm:Win32/Gamarue",
              "display_name": "Worm:Win32/Gamarue",
              "target": "/malware/Worm:Win32/Gamarue"
            },
            {
              "id": "Worm:Win32/Mofksys.RND!MTB",
              "display_name": "Worm:Win32/Mofksys.RND!MTB",
              "target": "/malware/Worm:Win32/Mofksys.RND!MTB"
            },
            {
              "id": "Win.Malware.Razy-9866790-0",
              "display_name": "Win.Malware.Razy-9866790-0",
              "target": null
            },
            {
              "id": "Other:Malware-gen\\ [Trj]",
              "display_name": "Other:Malware-gen\\ [Trj]",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1491",
              "name": "Defacement",
              "display_name": "T1491 - Defacement"
            },
            {
              "id": "T1491.001",
              "name": "Internal Defacement",
              "display_name": "T1491.001 - Internal Defacement"
            },
            {
              "id": "T1156",
              "name": "Malicious Shell Modification",
              "display_name": "T1156 - Malicious Shell Modification"
            },
            {
              "id": "T1399",
              "name": "Modify Trusted Execution Environment",
              "display_name": "T1399 - Modify Trusted Execution Environment"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "65de91e67d0d575c27960e12",
          "export_count": 59,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 560,
            "FileHash-SHA256": 1242,
            "URL": 712,
            "domain": 365,
            "CIDR": 1,
            "email": 5,
            "FileHash-MD5": 321,
            "FileHash-SHA1": 319,
            "CVE": 1,
            "SSLCertFingerprint": 1
          },
          "indicator_count": 3527,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "750 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65dbc4eff93b04cbde5fa549",
          "name": "Software Packing | Mirai \u2022 Emotet \u2022 Pottieq | Mercer Museum Library",
          "description": "Attacking Mercer Museum Research Library. Bucks County, Pa. Malicious redirect to 7034.sydneyplus.com. Attacks Nelson- Stratton and Brashears Families historical Doylestown presence.\n\nThor \n4 years ago\nSignature Match - THOR APT Scanner\n\nDetection\n============================\nRule: MAL_Unknown_Malware_May19_1\nRule Set: Malware 1\nRule Type: VALHALLA rule feed only\nDescription: Detects unspecified malware noticed in 2019\nReference: Internal Research\nAuthor: Florian Roth\nScore: 75\n\nDetection Snapshot\n============================\nDetection Timestamp: 2019-10-30 17:30\nAV Detection Ratio: 23 / 68\n\n#unknown #malware1 #mal_unknown_malware_may19_1\n\nMore information: https://www.nextron-systems.com/notes-on-virustotal-matches/\nPlease report interesting findings via Twitter @thor_scanner",
          "modified": "2024-03-26T22:05:46.190000",
          "created": "2024-02-25T22:53:35.853000",
          "tags": [
            "referrer",
            "contacted urls",
            "contacted",
            "shaw telecom",
            "shaw business",
            "city",
            "solutions",
            "bgpp ref",
            "rtechhandle",
            "net72",
            "net720000",
            "server",
            "google",
            "creation date",
            "dnssec",
            "domain name",
            "status",
            "abuse contact",
            "email",
            "bat",
            "heuristic",
            "trojan",
            "dropper",
            "ssl certificate",
            "execution",
            "siblings",
            "resolutions",
            "code overlap",
            "yara detections",
            "pea exe",
            "scan endpoints",
            "all octoseek",
            "pulse pulses",
            "av detections",
            "ids detections",
            "alerts",
            "analysis date",
            "Pea: pack, encrypt, authenticate",
            "search",
            "entries",
            "hostname",
            "pulse submit",
            "url analysis",
            "passive dns",
            "urls",
            "files",
            "unknown",
            "united",
            "servers",
            "showing",
            "name servers",
            "meta",
            "whois",
            "pe resource",
            "whois domain",
            "doylestown, pa",
            "ransom",
            "body",
            "gmt contenttype",
            "ubuntu",
            "date",
            "all search",
            "otx octoseek",
            "ipv4",
            "location united",
            "urls url",
            "domains domain",
            "whois record",
            "whois whois",
            "historical ssl",
            "group",
            "mirai",
            "exploit",
            "dark power",
            "bitrat",
            "powershell",
            "aurora stealer",
            "matryoshka",
            "service",
            "emotet",
            "date hash",
            "ComSpyAudit",
            "delphi",
            "win64",
            "related pulses",
            "icmp traffic",
            "packing t1045",
            "t1045",
            "show",
            "malware",
            "copy",
            "write",
            "stack_string",
            "evoe",
            "eej er",
            "lex1 esaaege",
            "ap e06eke4",
            "ehpeeepe e",
            "ehrk elm",
            "eme et",
            "exx el",
            "esme evte1exe",
            "evte1exe",
            "false",
            "useragent usage",
            "true",
            "windows nt",
            "close",
            "flashpix",
            "open",
            "dock",
            "next",
            "hello",
            "encrypt",
            "nexus myst",
            "active threat",
            "source id",
            "targeting",
            "defacement"
          ],
          "references": [
            "7034.sydneyplus.com",
            "LIBRARYWEBLINK.EXE",
            "Pea: pack, encrypt, authenticate",
            "EXE:CompanyName: LegalCopyright\t- Giorgio Tani, LGPLv3",
            "Private IP address: 0.64.0.0 -",
            "Emotet: FileHash-MD5  a77357ccec5530d0db3f0d603584191f",
            "Emotet: FileHash-SHA1  218afe0fccd7fd1d7cb08904e12caf2d22a0db47",
            "Emotet: FileHash-SHA256  fcf5500a8b46bf8c7234fb0cc4568e2bd65b12ef8b700dc11ff8ee507ba129da",
            "Pottieq: FileHash-MD5  8b91e351d1e46af68f27bae037fcfff6",
            "Pottieq: FileHash-SHA1  1ba1aa3d08080e27eb91d206cf54672edb051662",
            "Pottieq: FileHash-SHA256 cd2515f7f08ffea35d351b5cd37045f330c420e575f533ef3394a32c2fd52e95",
            "Mirai IP: 0.110.128.0",
            "Worm:Win32/Gamarue: FileHash-MD5 d3a36a65f960436b0b35ce5fb17481c6",
            "Worm:Win32/Gamarue: FileHash-SHA  3f390af687885304f5b610eabe82b3d9dad8f6d8",
            "Worm:Win32/Gamarue: FileHash-SHA256 8bb70aa49c307504f4872431e38ff8136b3e09520f228c5720e5d50c406d8a68",
            "Worm:Win32/Mofksys.RND!MTB: FileHash-MD5  db595ce78a3324f4ae83c1b2cb06f7aa",
            "Worm:Win32/Mofksys.RND!MTB: FileHash-SHA1  1dfd47d2c3c93536d8b924308faf100b338acd6a",
            "Worm:Win32/Mofksys.RND!MTB: FileHash-SHA256  16b0b335d23384388123215741c0f89d71532f36afa7ff7e8f112bfc7bc9de46",
            "Win64:BotX-gen\\ [Trj]:  FileHash-MD5  d2a0a135abcc97aab5d85c0dc95a5857",
            "Win64:BotX-gen\\ [Trj]: FileHash-SHA1  cdb6de8689a1d4d9132d0fbb8647f09fc0348776",
            "Win64:BotX-gen\\ [Trj]: FileHash-SHA256  000588bb01a8ebf9612179a8c3991c998658686589dae48ad220253fde655f1f",
            "The Medical Protection Society Ltd: The Medical Protection Society Limited (\u201cMPS\u201d) is the world's leading protection organisation for doctors, dentists and healthcare professionals.",
            "https://otx.alienvault.com/indicator/hostname/library.medicalprotection.org",
            "https://otx.alienvault.com/indicator/file/cd2515f7f08ffea35d351b5cd37045f330c420e575f533ef3394a32c2fd52e95",
            "https://otx.alienvault.com/indicator/file/000588bb01a8ebf9612179a8c3991c998658686589dae48ad220253fde655f1f"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Antiy-AVL Trojan[Downloader]/Win32.Betload",
              "display_name": "Antiy-AVL Trojan[Downloader]/Win32.Betload",
              "target": null
            },
            {
              "id": "Trojan.BAT.Agent.tnKf",
              "display_name": "Trojan.BAT.Agent.tnKf",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Worm:Win32/Goosky",
              "display_name": "Worm:Win32/Goosky",
              "target": "/malware/Worm:Win32/Goosky"
            },
            {
              "id": "Ransom:Win32/Pottieq",
              "display_name": "Ransom:Win32/Pottieq",
              "target": "/malware/Ransom:Win32/Pottieq"
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Worm:Win32/Gamarue",
              "display_name": "Worm:Win32/Gamarue",
              "target": "/malware/Worm:Win32/Gamarue"
            },
            {
              "id": "Worm:Win32/Mofksys.RND!MTB",
              "display_name": "Worm:Win32/Mofksys.RND!MTB",
              "target": "/malware/Worm:Win32/Mofksys.RND!MTB"
            },
            {
              "id": "Win.Malware.Razy-9866790-0",
              "display_name": "Win.Malware.Razy-9866790-0",
              "target": null
            },
            {
              "id": "Other:Malware-gen\\ [Trj]",
              "display_name": "Other:Malware-gen\\ [Trj]",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1491",
              "name": "Defacement",
              "display_name": "T1491 - Defacement"
            },
            {
              "id": "T1491.001",
              "name": "Internal Defacement",
              "display_name": "T1491.001 - Internal Defacement"
            },
            {
              "id": "T1156",
              "name": "Malicious Shell Modification",
              "display_name": "T1156 - Malicious Shell Modification"
            },
            {
              "id": "T1399",
              "name": "Modify Trusted Execution Environment",
              "display_name": "T1399 - Modify Trusted Execution Environment"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 57,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 429,
            "FileHash-SHA256": 1044,
            "URL": 230,
            "domain": 260,
            "CIDR": 1,
            "email": 4,
            "FileHash-MD5": 311,
            "FileHash-SHA1": 309,
            "CVE": 1,
            "SSLCertFingerprint": 1
          },
          "indicator_count": 2590,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 223,
          "modified_text": "754 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65de91e67d0d575c27960e12",
          "name": "Software Packing | Mirai \u2022 Emotet \u2022 Pottieq | Mercer Museum ",
          "description": "",
          "modified": "2024-03-26T22:05:46.190000",
          "created": "2024-02-28T01:52:38.822000",
          "tags": [
            "referrer",
            "contacted urls",
            "contacted",
            "shaw telecom",
            "shaw business",
            "city",
            "solutions",
            "bgpp ref",
            "rtechhandle",
            "net72",
            "net720000",
            "server",
            "google",
            "creation date",
            "dnssec",
            "domain name",
            "status",
            "abuse contact",
            "email",
            "bat",
            "heuristic",
            "trojan",
            "dropper",
            "ssl certificate",
            "execution",
            "siblings",
            "resolutions",
            "code overlap",
            "yara detections",
            "pea exe",
            "scan endpoints",
            "all octoseek",
            "pulse pulses",
            "av detections",
            "ids detections",
            "alerts",
            "analysis date",
            "Pea: pack, encrypt, authenticate",
            "search",
            "entries",
            "hostname",
            "pulse submit",
            "url analysis",
            "passive dns",
            "urls",
            "files",
            "unknown",
            "united",
            "servers",
            "showing",
            "name servers",
            "meta",
            "whois",
            "pe resource",
            "whois domain",
            "doylestown, pa",
            "ransom",
            "body",
            "gmt contenttype",
            "ubuntu",
            "date",
            "all search",
            "otx octoseek",
            "ipv4",
            "location united",
            "urls url",
            "domains domain",
            "whois record",
            "whois whois",
            "historical ssl",
            "group",
            "mirai",
            "exploit",
            "dark power",
            "bitrat",
            "powershell",
            "aurora stealer",
            "matryoshka",
            "service",
            "emotet",
            "date hash",
            "ComSpyAudit",
            "delphi",
            "win64",
            "related pulses",
            "icmp traffic",
            "packing t1045",
            "t1045",
            "show",
            "malware",
            "copy",
            "write",
            "stack_string",
            "evoe",
            "eej er",
            "lex1 esaaege",
            "ap e06eke4",
            "ehpeeepe e",
            "ehrk elm",
            "eme et",
            "exx el",
            "esme evte1exe",
            "evte1exe",
            "false",
            "useragent usage",
            "true",
            "windows nt",
            "close",
            "flashpix",
            "open",
            "dock",
            "next",
            "hello",
            "encrypt",
            "nexus myst",
            "active threat",
            "source id",
            "targeting",
            "defacement"
          ],
          "references": [
            "7034.sydneyplus.com",
            "LIBRARYWEBLINK.EXE",
            "Pea: pack, encrypt, authenticate",
            "EXE:CompanyName: LegalCopyright\t- Giorgio Tani, LGPLv3",
            "Private IP address: 0.64.0.0 -",
            "Emotet: FileHash-MD5  a77357ccec5530d0db3f0d603584191f",
            "Emotet: FileHash-SHA1  218afe0fccd7fd1d7cb08904e12caf2d22a0db47",
            "Emotet: FileHash-SHA256  fcf5500a8b46bf8c7234fb0cc4568e2bd65b12ef8b700dc11ff8ee507ba129da",
            "Pottieq: FileHash-MD5  8b91e351d1e46af68f27bae037fcfff6",
            "Pottieq: FileHash-SHA1  1ba1aa3d08080e27eb91d206cf54672edb051662",
            "Pottieq: FileHash-SHA256 cd2515f7f08ffea35d351b5cd37045f330c420e575f533ef3394a32c2fd52e95",
            "Mirai IP: 0.110.128.0",
            "Worm:Win32/Gamarue: FileHash-MD5 d3a36a65f960436b0b35ce5fb17481c6",
            "Worm:Win32/Gamarue: FileHash-SHA  3f390af687885304f5b610eabe82b3d9dad8f6d8",
            "Worm:Win32/Gamarue: FileHash-SHA256 8bb70aa49c307504f4872431e38ff8136b3e09520f228c5720e5d50c406d8a68",
            "Worm:Win32/Mofksys.RND!MTB: FileHash-MD5  db595ce78a3324f4ae83c1b2cb06f7aa",
            "Worm:Win32/Mofksys.RND!MTB: FileHash-SHA1  1dfd47d2c3c93536d8b924308faf100b338acd6a",
            "Worm:Win32/Mofksys.RND!MTB: FileHash-SHA256  16b0b335d23384388123215741c0f89d71532f36afa7ff7e8f112bfc7bc9de46",
            "Win64:BotX-gen\\ [Trj]:  FileHash-MD5  d2a0a135abcc97aab5d85c0dc95a5857",
            "Win64:BotX-gen\\ [Trj]: FileHash-SHA1  cdb6de8689a1d4d9132d0fbb8647f09fc0348776",
            "Win64:BotX-gen\\ [Trj]: FileHash-SHA256  000588bb01a8ebf9612179a8c3991c998658686589dae48ad220253fde655f1f",
            "The Medical Protection Society Ltd: The Medical Protection Society Limited (\u201cMPS\u201d) is the world's leading protection organisation for doctors, dentists and healthcare professionals.",
            "https://otx.alienvault.com/indicator/hostname/library.medicalprotection.org",
            "https://otx.alienvault.com/indicator/file/cd2515f7f08ffea35d351b5cd37045f330c420e575f533ef3394a32c2fd52e95",
            "https://otx.alienvault.com/indicator/file/000588bb01a8ebf9612179a8c3991c998658686589dae48ad220253fde655f1f"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Antiy-AVL Trojan[Downloader]/Win32.Betload",
              "display_name": "Antiy-AVL Trojan[Downloader]/Win32.Betload",
              "target": null
            },
            {
              "id": "Trojan.BAT.Agent.tnKf",
              "display_name": "Trojan.BAT.Agent.tnKf",
              "target": null
            },
            {
              "id": "Emotet",
              "display_name": "Emotet",
              "target": null
            },
            {
              "id": "Worm:Win32/Goosky",
              "display_name": "Worm:Win32/Goosky",
              "target": "/malware/Worm:Win32/Goosky"
            },
            {
              "id": "Ransom:Win32/Pottieq",
              "display_name": "Ransom:Win32/Pottieq",
              "target": "/malware/Ransom:Win32/Pottieq"
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Worm:Win32/Gamarue",
              "display_name": "Worm:Win32/Gamarue",
              "target": "/malware/Worm:Win32/Gamarue"
            },
            {
              "id": "Worm:Win32/Mofksys.RND!MTB",
              "display_name": "Worm:Win32/Mofksys.RND!MTB",
              "target": "/malware/Worm:Win32/Mofksys.RND!MTB"
            },
            {
              "id": "Win.Malware.Razy-9866790-0",
              "display_name": "Win.Malware.Razy-9866790-0",
              "target": null
            },
            {
              "id": "Other:Malware-gen\\ [Trj]",
              "display_name": "Other:Malware-gen\\ [Trj]",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1491",
              "name": "Defacement",
              "display_name": "T1491 - Defacement"
            },
            {
              "id": "T1491.001",
              "name": "Internal Defacement",
              "display_name": "T1491.001 - Internal Defacement"
            },
            {
              "id": "T1156",
              "name": "Malicious Shell Modification",
              "display_name": "T1156 - Malicious Shell Modification"
            },
            {
              "id": "T1399",
              "name": "Modify Trusted Execution Environment",
              "display_name": "T1399 - Modify Trusted Execution Environment"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "65dbc4eff93b04cbde5fa549",
          "export_count": 56,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 429,
            "FileHash-SHA256": 1044,
            "URL": 230,
            "domain": 260,
            "CIDR": 1,
            "email": 4,
            "FileHash-MD5": 311,
            "FileHash-SHA1": 309,
            "CVE": 1,
            "SSLCertFingerprint": 1
          },
          "indicator_count": 2590,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 228,
          "modified_text": "754 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6510a2dd9c7acab85a26f978",
          "name": "Phishing sites 2023-09-24",
          "description": "https://github.com/olbat/ut1-blacklists/blob/master/blacklists/phishing/domains",
          "modified": "2023-10-24T20:02:37.137000",
          "created": "2023-09-24T20:58:05.025000",
          "tags": [
            "phishing"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "France"
          ],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 24,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "skocherhan",
            "id": "249290",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_249290/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 10,
            "URL": 5,
            "domain": 37579,
            "hostname": 3238
          },
          "indicator_count": 40832,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 190,
          "modified_text": "908 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "The Medical Protection Society Ltd: The Medical Protection Society Limited (\u201cMPS\u201d) is the world's leading protection organisation for doctors, dentists and healthcare professionals.",
        "Private IP address: 0.64.0.0 -",
        "Emotet: FileHash-SHA1  218afe0fccd7fd1d7cb08904e12caf2d22a0db47",
        "Win64:BotX-gen\\ [Trj]:  FileHash-MD5  d2a0a135abcc97aab5d85c0dc95a5857",
        "https://otx.alienvault.com/indicator/file/cd2515f7f08ffea35d351b5cd37045f330c420e575f533ef3394a32c2fd52e95",
        "Win64:BotX-gen\\ [Trj]: FileHash-SHA1  cdb6de8689a1d4d9132d0fbb8647f09fc0348776",
        "Pottieq: FileHash-MD5  8b91e351d1e46af68f27bae037fcfff6",
        "Pottieq: FileHash-SHA256 cd2515f7f08ffea35d351b5cd37045f330c420e575f533ef3394a32c2fd52e95",
        "Mirai IP: 0.110.128.0",
        "Emotet: FileHash-SHA256  fcf5500a8b46bf8c7234fb0cc4568e2bd65b12ef8b700dc11ff8ee507ba129da",
        "https://otx.alienvault.com/indicator/hostname/library.medicalprotection.org",
        "Worm:Win32/Gamarue: FileHash-SHA  3f390af687885304f5b610eabe82b3d9dad8f6d8",
        "LIBRARYWEBLINK.EXE",
        "7034.sydneyplus.com",
        "Win64:BotX-gen\\ [Trj]: FileHash-SHA256  000588bb01a8ebf9612179a8c3991c998658686589dae48ad220253fde655f1f",
        "https://otx.alienvault.com/indicator/file/000588bb01a8ebf9612179a8c3991c998658686589dae48ad220253fde655f1f",
        "Worm:Win32/Gamarue: FileHash-MD5 d3a36a65f960436b0b35ce5fb17481c6",
        "Emotet: FileHash-MD5  a77357ccec5530d0db3f0d603584191f",
        "Pottieq: FileHash-SHA1  1ba1aa3d08080e27eb91d206cf54672edb051662",
        "Worm:Win32/Mofksys.RND!MTB: FileHash-MD5  db595ce78a3324f4ae83c1b2cb06f7aa",
        "Pea: pack, encrypt, authenticate",
        "Worm:Win32/Mofksys.RND!MTB: FileHash-SHA1  1dfd47d2c3c93536d8b924308faf100b338acd6a",
        "EXE:CompanyName: LegalCopyright\t- Giorgio Tani, LGPLv3",
        "Worm:Win32/Gamarue: FileHash-SHA256 8bb70aa49c307504f4872431e38ff8136b3e09520f228c5720e5d50c406d8a68",
        "Worm:Win32/Mofksys.RND!MTB: FileHash-SHA256  16b0b335d23384388123215741c0f89d71532f36afa7ff7e8f112bfc7bc9de46"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": []
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Other:malware-gen\\ [trj]",
            "Antiy-avl trojan[downloader]/win32.betload",
            "Worm:win32/gamarue",
            "Mirai",
            "Win.malware.razy-9866790-0",
            "Ransom:win32/pottieq",
            "Emotet",
            "Trojan.bat.agent.tnkf",
            "Worm:win32/goosky",
            "Worm:win32/mofksys.rnd!mtb"
          ],
          "industries": []
        }
      }
    },
    "false_positive": []
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 4,
  "pulses": [
    {
      "id": "65e0ee3c026bf0e346f62f80",
      "name": "Original State ",
      "description": "",
      "modified": "2024-03-30T20:02:03.506000",
      "created": "2024-02-29T20:51:08.655000",
      "tags": [
        "referrer",
        "contacted urls",
        "contacted",
        "shaw telecom",
        "shaw business",
        "city",
        "solutions",
        "bgpp ref",
        "rtechhandle",
        "net72",
        "net720000",
        "server",
        "google",
        "creation date",
        "dnssec",
        "domain name",
        "status",
        "abuse contact",
        "email",
        "bat",
        "heuristic",
        "trojan",
        "dropper",
        "ssl certificate",
        "execution",
        "siblings",
        "resolutions",
        "code overlap",
        "yara detections",
        "pea exe",
        "scan endpoints",
        "all octoseek",
        "pulse pulses",
        "av detections",
        "ids detections",
        "alerts",
        "analysis date",
        "Pea: pack, encrypt, authenticate",
        "search",
        "entries",
        "hostname",
        "pulse submit",
        "url analysis",
        "passive dns",
        "urls",
        "files",
        "unknown",
        "united",
        "servers",
        "showing",
        "name servers",
        "meta",
        "whois",
        "pe resource",
        "whois domain",
        "doylestown, pa",
        "ransom",
        "body",
        "gmt contenttype",
        "ubuntu",
        "date",
        "all search",
        "otx octoseek",
        "ipv4",
        "location united",
        "urls url",
        "domains domain",
        "whois record",
        "whois whois",
        "historical ssl",
        "group",
        "mirai",
        "exploit",
        "dark power",
        "bitrat",
        "powershell",
        "aurora stealer",
        "matryoshka",
        "service",
        "emotet",
        "date hash",
        "ComSpyAudit",
        "delphi",
        "win64",
        "related pulses",
        "icmp traffic",
        "packing t1045",
        "t1045",
        "show",
        "malware",
        "copy",
        "write",
        "stack_string",
        "evoe",
        "eej er",
        "lex1 esaaege",
        "ap e06eke4",
        "ehpeeepe e",
        "ehrk elm",
        "eme et",
        "exx el",
        "esme evte1exe",
        "evte1exe",
        "false",
        "useragent usage",
        "true",
        "windows nt",
        "close",
        "flashpix",
        "open",
        "dock",
        "next",
        "hello",
        "encrypt",
        "nexus myst",
        "active threat",
        "source id",
        "targeting",
        "defacement"
      ],
      "references": [
        "7034.sydneyplus.com",
        "LIBRARYWEBLINK.EXE",
        "Pea: pack, encrypt, authenticate",
        "EXE:CompanyName: LegalCopyright\t- Giorgio Tani, LGPLv3",
        "Private IP address: 0.64.0.0 -",
        "Emotet: FileHash-MD5  a77357ccec5530d0db3f0d603584191f",
        "Emotet: FileHash-SHA1  218afe0fccd7fd1d7cb08904e12caf2d22a0db47",
        "Emotet: FileHash-SHA256  fcf5500a8b46bf8c7234fb0cc4568e2bd65b12ef8b700dc11ff8ee507ba129da",
        "Pottieq: FileHash-MD5  8b91e351d1e46af68f27bae037fcfff6",
        "Pottieq: FileHash-SHA1  1ba1aa3d08080e27eb91d206cf54672edb051662",
        "Pottieq: FileHash-SHA256 cd2515f7f08ffea35d351b5cd37045f330c420e575f533ef3394a32c2fd52e95",
        "Mirai IP: 0.110.128.0",
        "Worm:Win32/Gamarue: FileHash-MD5 d3a36a65f960436b0b35ce5fb17481c6",
        "Worm:Win32/Gamarue: FileHash-SHA  3f390af687885304f5b610eabe82b3d9dad8f6d8",
        "Worm:Win32/Gamarue: FileHash-SHA256 8bb70aa49c307504f4872431e38ff8136b3e09520f228c5720e5d50c406d8a68",
        "Worm:Win32/Mofksys.RND!MTB: FileHash-MD5  db595ce78a3324f4ae83c1b2cb06f7aa",
        "Worm:Win32/Mofksys.RND!MTB: FileHash-SHA1  1dfd47d2c3c93536d8b924308faf100b338acd6a",
        "Worm:Win32/Mofksys.RND!MTB: FileHash-SHA256  16b0b335d23384388123215741c0f89d71532f36afa7ff7e8f112bfc7bc9de46",
        "Win64:BotX-gen\\ [Trj]:  FileHash-MD5  d2a0a135abcc97aab5d85c0dc95a5857",
        "Win64:BotX-gen\\ [Trj]: FileHash-SHA1  cdb6de8689a1d4d9132d0fbb8647f09fc0348776",
        "Win64:BotX-gen\\ [Trj]: FileHash-SHA256  000588bb01a8ebf9612179a8c3991c998658686589dae48ad220253fde655f1f",
        "The Medical Protection Society Ltd: The Medical Protection Society Limited (\u201cMPS\u201d) is the world's leading protection organisation for doctors, dentists and healthcare professionals.",
        "https://otx.alienvault.com/indicator/hostname/library.medicalprotection.org",
        "https://otx.alienvault.com/indicator/file/cd2515f7f08ffea35d351b5cd37045f330c420e575f533ef3394a32c2fd52e95",
        "https://otx.alienvault.com/indicator/file/000588bb01a8ebf9612179a8c3991c998658686589dae48ad220253fde655f1f"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Antiy-AVL Trojan[Downloader]/Win32.Betload",
          "display_name": "Antiy-AVL Trojan[Downloader]/Win32.Betload",
          "target": null
        },
        {
          "id": "Trojan.BAT.Agent.tnKf",
          "display_name": "Trojan.BAT.Agent.tnKf",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "Worm:Win32/Goosky",
          "display_name": "Worm:Win32/Goosky",
          "target": "/malware/Worm:Win32/Goosky"
        },
        {
          "id": "Ransom:Win32/Pottieq",
          "display_name": "Ransom:Win32/Pottieq",
          "target": "/malware/Ransom:Win32/Pottieq"
        },
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "Worm:Win32/Gamarue",
          "display_name": "Worm:Win32/Gamarue",
          "target": "/malware/Worm:Win32/Gamarue"
        },
        {
          "id": "Worm:Win32/Mofksys.RND!MTB",
          "display_name": "Worm:Win32/Mofksys.RND!MTB",
          "target": "/malware/Worm:Win32/Mofksys.RND!MTB"
        },
        {
          "id": "Win.Malware.Razy-9866790-0",
          "display_name": "Win.Malware.Razy-9866790-0",
          "target": null
        },
        {
          "id": "Other:Malware-gen\\ [Trj]",
          "display_name": "Other:Malware-gen\\ [Trj]",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1491",
          "name": "Defacement",
          "display_name": "T1491 - Defacement"
        },
        {
          "id": "T1491.001",
          "name": "Internal Defacement",
          "display_name": "T1491.001 - Internal Defacement"
        },
        {
          "id": "T1156",
          "name": "Malicious Shell Modification",
          "display_name": "T1156 - Malicious Shell Modification"
        },
        {
          "id": "T1399",
          "name": "Modify Trusted Execution Environment",
          "display_name": "T1399 - Modify Trusted Execution Environment"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "65de91e67d0d575c27960e12",
      "export_count": 59,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 560,
        "FileHash-SHA256": 1242,
        "URL": 712,
        "domain": 365,
        "CIDR": 1,
        "email": 5,
        "FileHash-MD5": 321,
        "FileHash-SHA1": 319,
        "CVE": 1,
        "SSLCertFingerprint": 1
      },
      "indicator_count": 3527,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 222,
      "modified_text": "750 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65dbc4eff93b04cbde5fa549",
      "name": "Software Packing | Mirai \u2022 Emotet \u2022 Pottieq | Mercer Museum Library",
      "description": "Attacking Mercer Museum Research Library. Bucks County, Pa. Malicious redirect to 7034.sydneyplus.com. Attacks Nelson- Stratton and Brashears Families historical Doylestown presence.\n\nThor \n4 years ago\nSignature Match - THOR APT Scanner\n\nDetection\n============================\nRule: MAL_Unknown_Malware_May19_1\nRule Set: Malware 1\nRule Type: VALHALLA rule feed only\nDescription: Detects unspecified malware noticed in 2019\nReference: Internal Research\nAuthor: Florian Roth\nScore: 75\n\nDetection Snapshot\n============================\nDetection Timestamp: 2019-10-30 17:30\nAV Detection Ratio: 23 / 68\n\n#unknown #malware1 #mal_unknown_malware_may19_1\n\nMore information: https://www.nextron-systems.com/notes-on-virustotal-matches/\nPlease report interesting findings via Twitter @thor_scanner",
      "modified": "2024-03-26T22:05:46.190000",
      "created": "2024-02-25T22:53:35.853000",
      "tags": [
        "referrer",
        "contacted urls",
        "contacted",
        "shaw telecom",
        "shaw business",
        "city",
        "solutions",
        "bgpp ref",
        "rtechhandle",
        "net72",
        "net720000",
        "server",
        "google",
        "creation date",
        "dnssec",
        "domain name",
        "status",
        "abuse contact",
        "email",
        "bat",
        "heuristic",
        "trojan",
        "dropper",
        "ssl certificate",
        "execution",
        "siblings",
        "resolutions",
        "code overlap",
        "yara detections",
        "pea exe",
        "scan endpoints",
        "all octoseek",
        "pulse pulses",
        "av detections",
        "ids detections",
        "alerts",
        "analysis date",
        "Pea: pack, encrypt, authenticate",
        "search",
        "entries",
        "hostname",
        "pulse submit",
        "url analysis",
        "passive dns",
        "urls",
        "files",
        "unknown",
        "united",
        "servers",
        "showing",
        "name servers",
        "meta",
        "whois",
        "pe resource",
        "whois domain",
        "doylestown, pa",
        "ransom",
        "body",
        "gmt contenttype",
        "ubuntu",
        "date",
        "all search",
        "otx octoseek",
        "ipv4",
        "location united",
        "urls url",
        "domains domain",
        "whois record",
        "whois whois",
        "historical ssl",
        "group",
        "mirai",
        "exploit",
        "dark power",
        "bitrat",
        "powershell",
        "aurora stealer",
        "matryoshka",
        "service",
        "emotet",
        "date hash",
        "ComSpyAudit",
        "delphi",
        "win64",
        "related pulses",
        "icmp traffic",
        "packing t1045",
        "t1045",
        "show",
        "malware",
        "copy",
        "write",
        "stack_string",
        "evoe",
        "eej er",
        "lex1 esaaege",
        "ap e06eke4",
        "ehpeeepe e",
        "ehrk elm",
        "eme et",
        "exx el",
        "esme evte1exe",
        "evte1exe",
        "false",
        "useragent usage",
        "true",
        "windows nt",
        "close",
        "flashpix",
        "open",
        "dock",
        "next",
        "hello",
        "encrypt",
        "nexus myst",
        "active threat",
        "source id",
        "targeting",
        "defacement"
      ],
      "references": [
        "7034.sydneyplus.com",
        "LIBRARYWEBLINK.EXE",
        "Pea: pack, encrypt, authenticate",
        "EXE:CompanyName: LegalCopyright\t- Giorgio Tani, LGPLv3",
        "Private IP address: 0.64.0.0 -",
        "Emotet: FileHash-MD5  a77357ccec5530d0db3f0d603584191f",
        "Emotet: FileHash-SHA1  218afe0fccd7fd1d7cb08904e12caf2d22a0db47",
        "Emotet: FileHash-SHA256  fcf5500a8b46bf8c7234fb0cc4568e2bd65b12ef8b700dc11ff8ee507ba129da",
        "Pottieq: FileHash-MD5  8b91e351d1e46af68f27bae037fcfff6",
        "Pottieq: FileHash-SHA1  1ba1aa3d08080e27eb91d206cf54672edb051662",
        "Pottieq: FileHash-SHA256 cd2515f7f08ffea35d351b5cd37045f330c420e575f533ef3394a32c2fd52e95",
        "Mirai IP: 0.110.128.0",
        "Worm:Win32/Gamarue: FileHash-MD5 d3a36a65f960436b0b35ce5fb17481c6",
        "Worm:Win32/Gamarue: FileHash-SHA  3f390af687885304f5b610eabe82b3d9dad8f6d8",
        "Worm:Win32/Gamarue: FileHash-SHA256 8bb70aa49c307504f4872431e38ff8136b3e09520f228c5720e5d50c406d8a68",
        "Worm:Win32/Mofksys.RND!MTB: FileHash-MD5  db595ce78a3324f4ae83c1b2cb06f7aa",
        "Worm:Win32/Mofksys.RND!MTB: FileHash-SHA1  1dfd47d2c3c93536d8b924308faf100b338acd6a",
        "Worm:Win32/Mofksys.RND!MTB: FileHash-SHA256  16b0b335d23384388123215741c0f89d71532f36afa7ff7e8f112bfc7bc9de46",
        "Win64:BotX-gen\\ [Trj]:  FileHash-MD5  d2a0a135abcc97aab5d85c0dc95a5857",
        "Win64:BotX-gen\\ [Trj]: FileHash-SHA1  cdb6de8689a1d4d9132d0fbb8647f09fc0348776",
        "Win64:BotX-gen\\ [Trj]: FileHash-SHA256  000588bb01a8ebf9612179a8c3991c998658686589dae48ad220253fde655f1f",
        "The Medical Protection Society Ltd: The Medical Protection Society Limited (\u201cMPS\u201d) is the world's leading protection organisation for doctors, dentists and healthcare professionals.",
        "https://otx.alienvault.com/indicator/hostname/library.medicalprotection.org",
        "https://otx.alienvault.com/indicator/file/cd2515f7f08ffea35d351b5cd37045f330c420e575f533ef3394a32c2fd52e95",
        "https://otx.alienvault.com/indicator/file/000588bb01a8ebf9612179a8c3991c998658686589dae48ad220253fde655f1f"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Antiy-AVL Trojan[Downloader]/Win32.Betload",
          "display_name": "Antiy-AVL Trojan[Downloader]/Win32.Betload",
          "target": null
        },
        {
          "id": "Trojan.BAT.Agent.tnKf",
          "display_name": "Trojan.BAT.Agent.tnKf",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "Worm:Win32/Goosky",
          "display_name": "Worm:Win32/Goosky",
          "target": "/malware/Worm:Win32/Goosky"
        },
        {
          "id": "Ransom:Win32/Pottieq",
          "display_name": "Ransom:Win32/Pottieq",
          "target": "/malware/Ransom:Win32/Pottieq"
        },
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "Worm:Win32/Gamarue",
          "display_name": "Worm:Win32/Gamarue",
          "target": "/malware/Worm:Win32/Gamarue"
        },
        {
          "id": "Worm:Win32/Mofksys.RND!MTB",
          "display_name": "Worm:Win32/Mofksys.RND!MTB",
          "target": "/malware/Worm:Win32/Mofksys.RND!MTB"
        },
        {
          "id": "Win.Malware.Razy-9866790-0",
          "display_name": "Win.Malware.Razy-9866790-0",
          "target": null
        },
        {
          "id": "Other:Malware-gen\\ [Trj]",
          "display_name": "Other:Malware-gen\\ [Trj]",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1491",
          "name": "Defacement",
          "display_name": "T1491 - Defacement"
        },
        {
          "id": "T1491.001",
          "name": "Internal Defacement",
          "display_name": "T1491.001 - Internal Defacement"
        },
        {
          "id": "T1156",
          "name": "Malicious Shell Modification",
          "display_name": "T1156 - Malicious Shell Modification"
        },
        {
          "id": "T1399",
          "name": "Modify Trusted Execution Environment",
          "display_name": "T1399 - Modify Trusted Execution Environment"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 57,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 429,
        "FileHash-SHA256": 1044,
        "URL": 230,
        "domain": 260,
        "CIDR": 1,
        "email": 4,
        "FileHash-MD5": 311,
        "FileHash-SHA1": 309,
        "CVE": 1,
        "SSLCertFingerprint": 1
      },
      "indicator_count": 2590,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 223,
      "modified_text": "754 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65de91e67d0d575c27960e12",
      "name": "Software Packing | Mirai \u2022 Emotet \u2022 Pottieq | Mercer Museum ",
      "description": "",
      "modified": "2024-03-26T22:05:46.190000",
      "created": "2024-02-28T01:52:38.822000",
      "tags": [
        "referrer",
        "contacted urls",
        "contacted",
        "shaw telecom",
        "shaw business",
        "city",
        "solutions",
        "bgpp ref",
        "rtechhandle",
        "net72",
        "net720000",
        "server",
        "google",
        "creation date",
        "dnssec",
        "domain name",
        "status",
        "abuse contact",
        "email",
        "bat",
        "heuristic",
        "trojan",
        "dropper",
        "ssl certificate",
        "execution",
        "siblings",
        "resolutions",
        "code overlap",
        "yara detections",
        "pea exe",
        "scan endpoints",
        "all octoseek",
        "pulse pulses",
        "av detections",
        "ids detections",
        "alerts",
        "analysis date",
        "Pea: pack, encrypt, authenticate",
        "search",
        "entries",
        "hostname",
        "pulse submit",
        "url analysis",
        "passive dns",
        "urls",
        "files",
        "unknown",
        "united",
        "servers",
        "showing",
        "name servers",
        "meta",
        "whois",
        "pe resource",
        "whois domain",
        "doylestown, pa",
        "ransom",
        "body",
        "gmt contenttype",
        "ubuntu",
        "date",
        "all search",
        "otx octoseek",
        "ipv4",
        "location united",
        "urls url",
        "domains domain",
        "whois record",
        "whois whois",
        "historical ssl",
        "group",
        "mirai",
        "exploit",
        "dark power",
        "bitrat",
        "powershell",
        "aurora stealer",
        "matryoshka",
        "service",
        "emotet",
        "date hash",
        "ComSpyAudit",
        "delphi",
        "win64",
        "related pulses",
        "icmp traffic",
        "packing t1045",
        "t1045",
        "show",
        "malware",
        "copy",
        "write",
        "stack_string",
        "evoe",
        "eej er",
        "lex1 esaaege",
        "ap e06eke4",
        "ehpeeepe e",
        "ehrk elm",
        "eme et",
        "exx el",
        "esme evte1exe",
        "evte1exe",
        "false",
        "useragent usage",
        "true",
        "windows nt",
        "close",
        "flashpix",
        "open",
        "dock",
        "next",
        "hello",
        "encrypt",
        "nexus myst",
        "active threat",
        "source id",
        "targeting",
        "defacement"
      ],
      "references": [
        "7034.sydneyplus.com",
        "LIBRARYWEBLINK.EXE",
        "Pea: pack, encrypt, authenticate",
        "EXE:CompanyName: LegalCopyright\t- Giorgio Tani, LGPLv3",
        "Private IP address: 0.64.0.0 -",
        "Emotet: FileHash-MD5  a77357ccec5530d0db3f0d603584191f",
        "Emotet: FileHash-SHA1  218afe0fccd7fd1d7cb08904e12caf2d22a0db47",
        "Emotet: FileHash-SHA256  fcf5500a8b46bf8c7234fb0cc4568e2bd65b12ef8b700dc11ff8ee507ba129da",
        "Pottieq: FileHash-MD5  8b91e351d1e46af68f27bae037fcfff6",
        "Pottieq: FileHash-SHA1  1ba1aa3d08080e27eb91d206cf54672edb051662",
        "Pottieq: FileHash-SHA256 cd2515f7f08ffea35d351b5cd37045f330c420e575f533ef3394a32c2fd52e95",
        "Mirai IP: 0.110.128.0",
        "Worm:Win32/Gamarue: FileHash-MD5 d3a36a65f960436b0b35ce5fb17481c6",
        "Worm:Win32/Gamarue: FileHash-SHA  3f390af687885304f5b610eabe82b3d9dad8f6d8",
        "Worm:Win32/Gamarue: FileHash-SHA256 8bb70aa49c307504f4872431e38ff8136b3e09520f228c5720e5d50c406d8a68",
        "Worm:Win32/Mofksys.RND!MTB: FileHash-MD5  db595ce78a3324f4ae83c1b2cb06f7aa",
        "Worm:Win32/Mofksys.RND!MTB: FileHash-SHA1  1dfd47d2c3c93536d8b924308faf100b338acd6a",
        "Worm:Win32/Mofksys.RND!MTB: FileHash-SHA256  16b0b335d23384388123215741c0f89d71532f36afa7ff7e8f112bfc7bc9de46",
        "Win64:BotX-gen\\ [Trj]:  FileHash-MD5  d2a0a135abcc97aab5d85c0dc95a5857",
        "Win64:BotX-gen\\ [Trj]: FileHash-SHA1  cdb6de8689a1d4d9132d0fbb8647f09fc0348776",
        "Win64:BotX-gen\\ [Trj]: FileHash-SHA256  000588bb01a8ebf9612179a8c3991c998658686589dae48ad220253fde655f1f",
        "The Medical Protection Society Ltd: The Medical Protection Society Limited (\u201cMPS\u201d) is the world's leading protection organisation for doctors, dentists and healthcare professionals.",
        "https://otx.alienvault.com/indicator/hostname/library.medicalprotection.org",
        "https://otx.alienvault.com/indicator/file/cd2515f7f08ffea35d351b5cd37045f330c420e575f533ef3394a32c2fd52e95",
        "https://otx.alienvault.com/indicator/file/000588bb01a8ebf9612179a8c3991c998658686589dae48ad220253fde655f1f"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Antiy-AVL Trojan[Downloader]/Win32.Betload",
          "display_name": "Antiy-AVL Trojan[Downloader]/Win32.Betload",
          "target": null
        },
        {
          "id": "Trojan.BAT.Agent.tnKf",
          "display_name": "Trojan.BAT.Agent.tnKf",
          "target": null
        },
        {
          "id": "Emotet",
          "display_name": "Emotet",
          "target": null
        },
        {
          "id": "Worm:Win32/Goosky",
          "display_name": "Worm:Win32/Goosky",
          "target": "/malware/Worm:Win32/Goosky"
        },
        {
          "id": "Ransom:Win32/Pottieq",
          "display_name": "Ransom:Win32/Pottieq",
          "target": "/malware/Ransom:Win32/Pottieq"
        },
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "Worm:Win32/Gamarue",
          "display_name": "Worm:Win32/Gamarue",
          "target": "/malware/Worm:Win32/Gamarue"
        },
        {
          "id": "Worm:Win32/Mofksys.RND!MTB",
          "display_name": "Worm:Win32/Mofksys.RND!MTB",
          "target": "/malware/Worm:Win32/Mofksys.RND!MTB"
        },
        {
          "id": "Win.Malware.Razy-9866790-0",
          "display_name": "Win.Malware.Razy-9866790-0",
          "target": null
        },
        {
          "id": "Other:Malware-gen\\ [Trj]",
          "display_name": "Other:Malware-gen\\ [Trj]",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1491",
          "name": "Defacement",
          "display_name": "T1491 - Defacement"
        },
        {
          "id": "T1491.001",
          "name": "Internal Defacement",
          "display_name": "T1491.001 - Internal Defacement"
        },
        {
          "id": "T1156",
          "name": "Malicious Shell Modification",
          "display_name": "T1156 - Malicious Shell Modification"
        },
        {
          "id": "T1399",
          "name": "Modify Trusted Execution Environment",
          "display_name": "T1399 - Modify Trusted Execution Environment"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "65dbc4eff93b04cbde5fa549",
      "export_count": 56,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 429,
        "FileHash-SHA256": 1044,
        "URL": 230,
        "domain": 260,
        "CIDR": 1,
        "email": 4,
        "FileHash-MD5": 311,
        "FileHash-SHA1": 309,
        "CVE": 1,
        "SSLCertFingerprint": 1
      },
      "indicator_count": 2590,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 228,
      "modified_text": "754 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "6510a2dd9c7acab85a26f978",
      "name": "Phishing sites 2023-09-24",
      "description": "https://github.com/olbat/ut1-blacklists/blob/master/blacklists/phishing/domains",
      "modified": "2023-10-24T20:02:37.137000",
      "created": "2023-09-24T20:58:05.025000",
      "tags": [
        "phishing"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "France"
      ],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 24,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "skocherhan",
        "id": "249290",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_249290/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 10,
        "URL": 5,
        "domain": 37579,
        "hostname": 3238
      },
      "indicator_count": 40832,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 190,
      "modified_text": "908 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "berritechnology.com",
    "type": "Domain"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "berritechnology.com",
    "found": false,
    "verdict": "clean",
    "urls": [],
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776700918.837003
}