{
  "type": "Domain",
  "indicator": "bindview.com",
  "general": {
    "sections": [
      "general",
      "geo",
      "url_list",
      "passive_dns",
      "malware",
      "whois",
      "http_scans"
    ],
    "whois": "http://whois.domaintools.com/bindview.com",
    "alexa": "http://www.alexa.com/siteinfo/bindview.com",
    "indicator": "bindview.com",
    "type": "domain",
    "type_title": "Domain",
    "validation": [],
    "base_indicator": {
      "id": 2891062358,
      "indicator": "bindview.com",
      "type": "domain",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 4,
      "pulses": [
        {
          "id": "6954ae6971517cdd7beb3d77",
          "name": "Security Vendors\\Norton",
          "description": "Security Vendors\\Norton",
          "modified": "2026-01-30T04:03:08.625000",
          "created": "2025-12-31T05:02:33.034000",
          "tags": [
            "data",
            "drive",
            "no problems",
            "upload",
            "mon mar",
            "scanid",
            "sigtype1",
            "sigclass1",
            "rule matched1",
            "subscore1",
            "look",
            "june",
            "dllinject",
            "alphabet",
            "info",
            "winmm",
            "null",
            "malware",
            "powershell",
            "autorun",
            "jack",
            "first",
            "internal",
            "whirlpool",
            "updater",
            "code",
            "spyeye",
            "runescape",
            "warp",
            "upgrade",
            "copy",
            "defender",
            "date",
            "xmrigminer",
            "kevin",
            "eraser",
            "ding",
            "Norton",
            "Telus"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1110",
              "name": "Brute Force",
              "display_name": "T1110 - Brute Force"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Disable_Duck",
            "id": "244325",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 59,
            "URL": 42,
            "CVE": 2,
            "FileHash-MD5": 1355,
            "FileHash-SHA1": 1177,
            "FileHash-SHA256": 948,
            "email": 4,
            "hostname": 37
          },
          "indicator_count": 3624,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 130,
          "modified_text": "79 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69546fab13abfdf3e825b1e4",
          "name": "Norton\\08.30.23",
          "description": "Norton\\08.30.23",
          "modified": "2026-01-30T00:01:11.705000",
          "created": "2025-12-31T00:34:51.728000",
          "tags": [
            "data",
            "drive",
            "no problems",
            "upload",
            "problems1",
            "progressb",
            "wed aug",
            "scanid",
            "mon mar",
            "sigtype1",
            "look",
            "june",
            "dllinject",
            "winmm",
            "alphabet",
            "autorun",
            "powershell",
            "info",
            "malware",
            "first",
            "jack",
            "whirlpool",
            "internal",
            "surtr",
            "ursnif",
            "code",
            "spyeye",
            "runescape",
            "warp",
            "null",
            "defender",
            "copy",
            "strings",
            "burn",
            "dreambot",
            "gozi",
            "isfb",
            "iron",
            "bitcoin",
            "steam",
            "date",
            "xmrigminer",
            "kevin",
            "ding",
            "Norton",
            "Telus"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1110",
              "name": "Brute Force",
              "display_name": "T1110 - Brute Force"
            }
          ],
          "industries": [
            "Technology",
            "Telecommunications"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Disable_Duck",
            "id": "244325",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 52,
            "URL": 37,
            "CVE": 1,
            "FileHash-MD5": 1241,
            "FileHash-SHA1": 879,
            "FileHash-SHA256": 823,
            "email": 4,
            "hostname": 26
          },
          "indicator_count": 3063,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 129,
          "modified_text": "79 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "66f1accda30d94af7e846357",
          "name": "Zendesk as VirusTotal \u00bb Ransom:Win32/CVE",
          "description": "*https://virustotal.zendesk.com/frontendevents/dl?client=1B752747-5778-429A-A0E0-83861AF69088 |||\n\n*In this situation a target received a VirusTotal / Zendesk drive by pop up message that site was unauthorized , fraud risk. The link has it all! Downloaders, install core, browser bar malware, ransomware, python script. Heavy attack. Desires deletion of device , accounts and contents.\n |||\nALF:HeraklezEval:Ransom:Win32/CVE , \nALF:Trojan:Win32/Cassini_6d4ebdc9 ,\nBackdoor:Win32/Zegost ,\nCVE-2023-22518 ,\nCVE-2023-4966 ,\nFakeAV.FOR ,\nMalware:AddsCopyToStartup ,\nNinite ,\nNoobyProtect ,\nTEL:Trojan:Win64/GoCLR ,\nTELPER:HSTR:CLEAN:Ninite ,\nTrojan:Win32/Cobaltstrike ,\nTrojan:Win32/Dridex ,\nTrojan:Win32/Fanop ,\nTrojan:Win32/Neconyd ,\nTrojan:Win32/Startpage ,\nTrojan:Win32/Zombie ,\nVirTool:Win32/Injector.gen!BQ ,\nVirTool:Win32/Obfuscator ,\nWin.Trojan.Generic-9935365-0 ,\nWorm:Win32/Autorun",
          "modified": "2024-10-23T17:03:27.463000",
          "created": "2024-09-23T18:00:45.146000",
          "tags": [
            "as396982 google",
            "setup",
            "passive dns",
            "unknown",
            "ninite sep",
            "a td",
            "443 ma2592000",
            "accept",
            "gmt cache",
            "trojan",
            "status",
            "name servers",
            "urls",
            "creation date",
            "search",
            "emails",
            "servers",
            "as15169 google",
            "aaaa",
            "cname",
            "virtool",
            "cryp",
            "as19527 google",
            "win32",
            "related pulses",
            "file samples",
            "files matching",
            "date hash",
            "trojan features",
            "entries",
            "search otx",
            "telper",
            "worm",
            "copyright",
            "levelblue",
            "files domain",
            "files related",
            "pulses none",
            "accept accept",
            "as16625 akamai",
            "as20940",
            "asnone united",
            "nxdomain",
            "expiration date",
            "as21342",
            "as132147",
            "china",
            "as9808 china",
            "body",
            "all scoreblue",
            "backdoor",
            "alf features",
            "all search",
            "domain",
            "as15133 verizon",
            "as16552 tiggee",
            "url https",
            "http",
            "hostname",
            "ninite",
            "united states",
            "scan endpoints",
            "show",
            "showing",
            "next",
            "united",
            "as54113",
            "github pages",
            "formbook cnc",
            "checkin",
            "mtb aug",
            "a domains",
            "class",
            "twitter",
            "certificate",
            "record value",
            "pulse pulses",
            "overview ip",
            "address",
            "related nids",
            "files location",
            "div div",
            "github",
            "meta",
            "homepage",
            "form",
            "as36459",
            "g2 tls",
            "rsa sha256",
            "as29791",
            "dynamicloader",
            "medium",
            "yara detections",
            "dynamic",
            "filehash",
            "sha256",
            "february",
            "copy",
            "otx telemetry",
            "related tags",
            "a li",
            "span p",
            "dj ai",
            "dongjun jeong",
            "a h2",
            "writeups",
            "infosec journey",
            "script urls",
            "netherlands",
            "a nxdomain",
            "aaaa nxdomain",
            "cloudfront",
            "trojandropper",
            "china unknown",
            "msie",
            "chrome",
            "ipv4",
            "noobyprotect",
            "files",
            "peeringdb",
            "sign",
            "github copilot",
            "view",
            "notifications",
            "branches tags",
            "code issues",
            "pull",
            "write",
            "star",
            "code",
            "stars",
            "python",
            "shell",
            "footer",
            "meta name",
            "robots content",
            "x ua",
            "ieedge chrome1",
            "incapsula",
            "as62597 nsone",
            "dnssec",
            "win32mydoom sep",
            "windows nt",
            "wow64",
            "khtml",
            "gecko",
            "query",
            "jpn write",
            "e0e8e",
            "observed dns",
            "expiro",
            "defender",
            "malware",
            "possible",
            "suspicious",
            "activity dns",
            "mtb may",
            "sameorigin",
            "domain name",
            "error",
            "moved",
            "server",
            "mtb sep",
            "win32cve sep",
            "cloud provider",
            "reverse dns",
            "america asn",
            "dns resolutions",
            "domains top",
            "level",
            "unique tlds",
            "pulses",
            "default",
            "yara rule",
            "high",
            "cnc checkin",
            "cape",
            "powershell",
            "vmprotect",
            "local",
            "agent",
            "domainabuse",
            "su liao",
            "zhi pin",
            "application",
            "expiro malware",
            "anomalous file",
            "june",
            "fakedout threat",
            "analyzer paste",
            "iocs",
            "samples",
            "exploit",
            "germany unknown",
            "as14636",
            "russia unknown",
            "as9123 timeweb",
            "as45102 alibaba",
            "as43830",
            "read c",
            "write c",
            "process32nextw",
            "regsetvalueexa",
            "regdword",
            "installcore",
            "format",
            "delphi",
            "stack",
            "downloader",
            "urls http",
            "delete c",
            "tls handshake",
            "number",
            "failure",
            "delete",
            "ids detections",
            "fadok",
            "template",
            "slcc2",
            "media center",
            "contacted",
            "ollydbg",
            "internal",
            "simda",
            "brian sabey",
            "going dark",
            "stop",
            "as14061",
            "hostnames",
            "as48287 jsc",
            "as50340",
            "czechia unknown",
            "date"
          ],
          "references": [
            "https://virustotal.zendesk.com/frontendevents/dl?client=1B752747-5778-429A-A0E0-83861AF69088",
            "GitHub - peeringdb/peeringdb-py: PeeringDB python client",
            "00-skillsetparadesarrollo.zendesk.com",
            "https://github.com/peeringdb/peeringdb-py",
            "From the lovely Cyber Folks .PL Cover"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Poland",
            "Australia",
            "Austria",
            "Canada",
            "Netherlands",
            "China"
          ],
          "malware_families": [
            {
              "id": "CVE-2023-22518",
              "display_name": "CVE-2023-22518",
              "target": null
            },
            {
              "id": "CVE-2023-4966",
              "display_name": "CVE-2023-4966",
              "target": null
            },
            {
              "id": "FakeAV.FOR",
              "display_name": "FakeAV.FOR",
              "target": null
            },
            {
              "id": "TELPER:HSTR:CLEAN:Ninite",
              "display_name": "TELPER:HSTR:CLEAN:Ninite",
              "target": null
            },
            {
              "id": "VirTool:Win32/Obfuscator",
              "display_name": "VirTool:Win32/Obfuscator",
              "target": "/malware/VirTool:Win32/Obfuscator"
            },
            {
              "id": "Trojan:Win32/Dridex",
              "display_name": "Trojan:Win32/Dridex",
              "target": "/malware/Trojan:Win32/Dridex"
            },
            {
              "id": "Worm:Win32/Autorun",
              "display_name": "Worm:Win32/Autorun",
              "target": "/malware/Worm:Win32/Autorun"
            },
            {
              "id": "Malware:AddsCopyToStartup",
              "display_name": "Malware:AddsCopyToStartup",
              "target": null
            },
            {
              "id": "Trojan:Win32/Cobaltstrike",
              "display_name": "Trojan:Win32/Cobaltstrike",
              "target": "/malware/Trojan:Win32/Cobaltstrike"
            },
            {
              "id": "ALF:Trojan:Win32/Cassini_6d4ebdc9",
              "display_name": "ALF:Trojan:Win32/Cassini_6d4ebdc9",
              "target": null
            },
            {
              "id": "Trojan:Win32/Startpage",
              "display_name": "Trojan:Win32/Startpage",
              "target": "/malware/Trojan:Win32/Startpage"
            },
            {
              "id": "Backdoor:Win32/Zegost",
              "display_name": "Backdoor:Win32/Zegost",
              "target": "/malware/Backdoor:Win32/Zegost"
            },
            {
              "id": "Trojan:Win32/Fanop",
              "display_name": "Trojan:Win32/Fanop",
              "target": "/malware/Trojan:Win32/Fanop"
            },
            {
              "id": "Trojan:Win32/Neconyd",
              "display_name": "Trojan:Win32/Neconyd",
              "target": "/malware/Trojan:Win32/Neconyd"
            },
            {
              "id": "Trojan:Win32/Zombie",
              "display_name": "Trojan:Win32/Zombie",
              "target": "/malware/Trojan:Win32/Zombie"
            },
            {
              "id": "Win.Trojan.Generic-9935365-0",
              "display_name": "Win.Trojan.Generic-9935365-0",
              "target": null
            },
            {
              "id": "Ninite",
              "display_name": "Ninite",
              "target": null
            },
            {
              "id": "NoobyProtect",
              "display_name": "NoobyProtect",
              "target": null
            },
            {
              "id": "TEL:Trojan:Win64/GoCLR",
              "display_name": "TEL:Trojan:Win64/GoCLR",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:Ransom:Win32/CVE",
              "display_name": "ALF:HeraklezEval:Ransom:Win32/CVE",
              "target": null
            },
            {
              "id": "VirTool:Win32/Injector.gen!BQ",
              "display_name": "VirTool:Win32/Injector.gen!BQ",
              "target": "/malware/VirTool:Win32/Injector.gen!BQ"
            }
          ],
          "attack_ids": [
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1023",
              "name": "Shortcut Modification",
              "display_name": "T1023 - Shortcut Modification"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1063",
              "name": "Security Software Discovery",
              "display_name": "T1063 - Security Software Discovery"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 4891,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 2436,
            "CVE": 3,
            "FileHash-MD5": 2510,
            "FileHash-SHA1": 2063,
            "FileHash-SHA256": 4054,
            "hostname": 1788,
            "URL": 1228,
            "email": 16
          },
          "indicator_count": 14098,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 239,
          "modified_text": "543 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "667af3df55de77efb0309afe",
          "name": "Norton's Elevated Cybersecurity Team at it's best - W11 PC - 01.18.24",
          "description": "Norton's Elevated Cybersecurity Team at it's best - W11 PC - 01.18.24\nRead: https://www.virustotal.com/gui/collection/82dc29932b9184d02b037289fd4605c158e96a57f376b08a8b2b94e43d0ae18b/summary for Summary of their 'elite team' & their efforts",
          "modified": "2024-08-30T17:04:50.688000",
          "created": "2024-06-25T16:44:15.585000",
          "tags": [
            "please",
            "javascript"
          ],
          "references": [
            "https://www.virustotal.com/gui/collection/82dc29932b9184d02b037289fd4605c158e96a57f376b08a8b2b94e43d0ae18b/summary",
            "https://www.virustotal.com/gui/collection/82dc29932b9184d02b037289fd4605c158e96a57f376b08a8b2b94e43d0ae18b/iocs",
            "https://www.virustotal.com/gui/collection/82dc29932b9184d02b037289fd4605c158e96a57f376b08a8b2b94e43d0ae18b/graph"
          ],
          "public": 1,
          "adversary": "Norton Telus",
          "targeted_countries": [
            "Canada",
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [],
          "industries": [
            "Technology",
            "Telecommunications"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Disable_Duck",
            "id": "244325",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 857,
            "FileHash-MD5": 44,
            "FileHash-SHA1": 38,
            "FileHash-SHA256": 1942,
            "domain": 593,
            "hostname": 762
          },
          "indicator_count": 4236,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 130,
          "modified_text": "597 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "https://github.com/peeringdb/peeringdb-py",
        "00-skillsetparadesarrollo.zendesk.com",
        "GitHub - peeringdb/peeringdb-py: PeeringDB python client",
        "From the lovely Cyber Folks .PL Cover",
        "https://www.virustotal.com/gui/collection/82dc29932b9184d02b037289fd4605c158e96a57f376b08a8b2b94e43d0ae18b/iocs",
        "https://www.virustotal.com/gui/collection/82dc29932b9184d02b037289fd4605c158e96a57f376b08a8b2b94e43d0ae18b/summary",
        "https://virustotal.zendesk.com/frontendevents/dl?client=1B752747-5778-429A-A0E0-83861AF69088",
        "https://www.virustotal.com/gui/collection/82dc29932b9184d02b037289fd4605c158e96a57f376b08a8b2b94e43d0ae18b/graph"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": []
        },
        "other": {
          "adversary": [
            "Norton Telus"
          ],
          "malware_families": [
            "Backdoor:win32/zegost",
            "Telper:hstr:clean:ninite",
            "Virtool:win32/obfuscator",
            "Trojan:win32/startpage",
            "Cve-2023-4966",
            "Trojan:win32/fanop",
            "Noobyprotect",
            "Alf:trojan:win32/cassini_6d4ebdc9",
            "Malware:addscopytostartup",
            "Fakeav.for",
            "Trojan:win32/neconyd",
            "Trojan:win32/cobaltstrike",
            "Virtool:win32/injector.gen!bq",
            "Win.trojan.generic-9935365-0",
            "Tel:trojan:win64/goclr",
            "Cve-2023-22518",
            "Alf:heraklezeval:ransom:win32/cve",
            "Trojan:win32/dridex",
            "Trojan:win32/zombie",
            "Worm:win32/autorun",
            "Ninite"
          ],
          "industries": [
            "Telecommunications",
            "Technology"
          ]
        }
      }
    },
    "false_positive": []
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 4,
  "pulses": [
    {
      "id": "6954ae6971517cdd7beb3d77",
      "name": "Security Vendors\\Norton",
      "description": "Security Vendors\\Norton",
      "modified": "2026-01-30T04:03:08.625000",
      "created": "2025-12-31T05:02:33.034000",
      "tags": [
        "data",
        "drive",
        "no problems",
        "upload",
        "mon mar",
        "scanid",
        "sigtype1",
        "sigclass1",
        "rule matched1",
        "subscore1",
        "look",
        "june",
        "dllinject",
        "alphabet",
        "info",
        "winmm",
        "null",
        "malware",
        "powershell",
        "autorun",
        "jack",
        "first",
        "internal",
        "whirlpool",
        "updater",
        "code",
        "spyeye",
        "runescape",
        "warp",
        "upgrade",
        "copy",
        "defender",
        "date",
        "xmrigminer",
        "kevin",
        "eraser",
        "ding",
        "Norton",
        "Telus"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1110",
          "name": "Brute Force",
          "display_name": "T1110 - Brute Force"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Disable_Duck",
        "id": "244325",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 59,
        "URL": 42,
        "CVE": 2,
        "FileHash-MD5": 1355,
        "FileHash-SHA1": 1177,
        "FileHash-SHA256": 948,
        "email": 4,
        "hostname": 37
      },
      "indicator_count": 3624,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 130,
      "modified_text": "79 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "69546fab13abfdf3e825b1e4",
      "name": "Norton\\08.30.23",
      "description": "Norton\\08.30.23",
      "modified": "2026-01-30T00:01:11.705000",
      "created": "2025-12-31T00:34:51.728000",
      "tags": [
        "data",
        "drive",
        "no problems",
        "upload",
        "problems1",
        "progressb",
        "wed aug",
        "scanid",
        "mon mar",
        "sigtype1",
        "look",
        "june",
        "dllinject",
        "winmm",
        "alphabet",
        "autorun",
        "powershell",
        "info",
        "malware",
        "first",
        "jack",
        "whirlpool",
        "internal",
        "surtr",
        "ursnif",
        "code",
        "spyeye",
        "runescape",
        "warp",
        "null",
        "defender",
        "copy",
        "strings",
        "burn",
        "dreambot",
        "gozi",
        "isfb",
        "iron",
        "bitcoin",
        "steam",
        "date",
        "xmrigminer",
        "kevin",
        "ding",
        "Norton",
        "Telus"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1110",
          "name": "Brute Force",
          "display_name": "T1110 - Brute Force"
        }
      ],
      "industries": [
        "Technology",
        "Telecommunications"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 9,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Disable_Duck",
        "id": "244325",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 52,
        "URL": 37,
        "CVE": 1,
        "FileHash-MD5": 1241,
        "FileHash-SHA1": 879,
        "FileHash-SHA256": 823,
        "email": 4,
        "hostname": 26
      },
      "indicator_count": 3063,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 129,
      "modified_text": "79 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "66f1accda30d94af7e846357",
      "name": "Zendesk as VirusTotal \u00bb Ransom:Win32/CVE",
      "description": "*https://virustotal.zendesk.com/frontendevents/dl?client=1B752747-5778-429A-A0E0-83861AF69088 |||\n\n*In this situation a target received a VirusTotal / Zendesk drive by pop up message that site was unauthorized , fraud risk. The link has it all! Downloaders, install core, browser bar malware, ransomware, python script. Heavy attack. Desires deletion of device , accounts and contents.\n |||\nALF:HeraklezEval:Ransom:Win32/CVE , \nALF:Trojan:Win32/Cassini_6d4ebdc9 ,\nBackdoor:Win32/Zegost ,\nCVE-2023-22518 ,\nCVE-2023-4966 ,\nFakeAV.FOR ,\nMalware:AddsCopyToStartup ,\nNinite ,\nNoobyProtect ,\nTEL:Trojan:Win64/GoCLR ,\nTELPER:HSTR:CLEAN:Ninite ,\nTrojan:Win32/Cobaltstrike ,\nTrojan:Win32/Dridex ,\nTrojan:Win32/Fanop ,\nTrojan:Win32/Neconyd ,\nTrojan:Win32/Startpage ,\nTrojan:Win32/Zombie ,\nVirTool:Win32/Injector.gen!BQ ,\nVirTool:Win32/Obfuscator ,\nWin.Trojan.Generic-9935365-0 ,\nWorm:Win32/Autorun",
      "modified": "2024-10-23T17:03:27.463000",
      "created": "2024-09-23T18:00:45.146000",
      "tags": [
        "as396982 google",
        "setup",
        "passive dns",
        "unknown",
        "ninite sep",
        "a td",
        "443 ma2592000",
        "accept",
        "gmt cache",
        "trojan",
        "status",
        "name servers",
        "urls",
        "creation date",
        "search",
        "emails",
        "servers",
        "as15169 google",
        "aaaa",
        "cname",
        "virtool",
        "cryp",
        "as19527 google",
        "win32",
        "related pulses",
        "file samples",
        "files matching",
        "date hash",
        "trojan features",
        "entries",
        "search otx",
        "telper",
        "worm",
        "copyright",
        "levelblue",
        "files domain",
        "files related",
        "pulses none",
        "accept accept",
        "as16625 akamai",
        "as20940",
        "asnone united",
        "nxdomain",
        "expiration date",
        "as21342",
        "as132147",
        "china",
        "as9808 china",
        "body",
        "all scoreblue",
        "backdoor",
        "alf features",
        "all search",
        "domain",
        "as15133 verizon",
        "as16552 tiggee",
        "url https",
        "http",
        "hostname",
        "ninite",
        "united states",
        "scan endpoints",
        "show",
        "showing",
        "next",
        "united",
        "as54113",
        "github pages",
        "formbook cnc",
        "checkin",
        "mtb aug",
        "a domains",
        "class",
        "twitter",
        "certificate",
        "record value",
        "pulse pulses",
        "overview ip",
        "address",
        "related nids",
        "files location",
        "div div",
        "github",
        "meta",
        "homepage",
        "form",
        "as36459",
        "g2 tls",
        "rsa sha256",
        "as29791",
        "dynamicloader",
        "medium",
        "yara detections",
        "dynamic",
        "filehash",
        "sha256",
        "february",
        "copy",
        "otx telemetry",
        "related tags",
        "a li",
        "span p",
        "dj ai",
        "dongjun jeong",
        "a h2",
        "writeups",
        "infosec journey",
        "script urls",
        "netherlands",
        "a nxdomain",
        "aaaa nxdomain",
        "cloudfront",
        "trojandropper",
        "china unknown",
        "msie",
        "chrome",
        "ipv4",
        "noobyprotect",
        "files",
        "peeringdb",
        "sign",
        "github copilot",
        "view",
        "notifications",
        "branches tags",
        "code issues",
        "pull",
        "write",
        "star",
        "code",
        "stars",
        "python",
        "shell",
        "footer",
        "meta name",
        "robots content",
        "x ua",
        "ieedge chrome1",
        "incapsula",
        "as62597 nsone",
        "dnssec",
        "win32mydoom sep",
        "windows nt",
        "wow64",
        "khtml",
        "gecko",
        "query",
        "jpn write",
        "e0e8e",
        "observed dns",
        "expiro",
        "defender",
        "malware",
        "possible",
        "suspicious",
        "activity dns",
        "mtb may",
        "sameorigin",
        "domain name",
        "error",
        "moved",
        "server",
        "mtb sep",
        "win32cve sep",
        "cloud provider",
        "reverse dns",
        "america asn",
        "dns resolutions",
        "domains top",
        "level",
        "unique tlds",
        "pulses",
        "default",
        "yara rule",
        "high",
        "cnc checkin",
        "cape",
        "powershell",
        "vmprotect",
        "local",
        "agent",
        "domainabuse",
        "su liao",
        "zhi pin",
        "application",
        "expiro malware",
        "anomalous file",
        "june",
        "fakedout threat",
        "analyzer paste",
        "iocs",
        "samples",
        "exploit",
        "germany unknown",
        "as14636",
        "russia unknown",
        "as9123 timeweb",
        "as45102 alibaba",
        "as43830",
        "read c",
        "write c",
        "process32nextw",
        "regsetvalueexa",
        "regdword",
        "installcore",
        "format",
        "delphi",
        "stack",
        "downloader",
        "urls http",
        "delete c",
        "tls handshake",
        "number",
        "failure",
        "delete",
        "ids detections",
        "fadok",
        "template",
        "slcc2",
        "media center",
        "contacted",
        "ollydbg",
        "internal",
        "simda",
        "brian sabey",
        "going dark",
        "stop",
        "as14061",
        "hostnames",
        "as48287 jsc",
        "as50340",
        "czechia unknown",
        "date"
      ],
      "references": [
        "https://virustotal.zendesk.com/frontendevents/dl?client=1B752747-5778-429A-A0E0-83861AF69088",
        "GitHub - peeringdb/peeringdb-py: PeeringDB python client",
        "00-skillsetparadesarrollo.zendesk.com",
        "https://github.com/peeringdb/peeringdb-py",
        "From the lovely Cyber Folks .PL Cover"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Poland",
        "Australia",
        "Austria",
        "Canada",
        "Netherlands",
        "China"
      ],
      "malware_families": [
        {
          "id": "CVE-2023-22518",
          "display_name": "CVE-2023-22518",
          "target": null
        },
        {
          "id": "CVE-2023-4966",
          "display_name": "CVE-2023-4966",
          "target": null
        },
        {
          "id": "FakeAV.FOR",
          "display_name": "FakeAV.FOR",
          "target": null
        },
        {
          "id": "TELPER:HSTR:CLEAN:Ninite",
          "display_name": "TELPER:HSTR:CLEAN:Ninite",
          "target": null
        },
        {
          "id": "VirTool:Win32/Obfuscator",
          "display_name": "VirTool:Win32/Obfuscator",
          "target": "/malware/VirTool:Win32/Obfuscator"
        },
        {
          "id": "Trojan:Win32/Dridex",
          "display_name": "Trojan:Win32/Dridex",
          "target": "/malware/Trojan:Win32/Dridex"
        },
        {
          "id": "Worm:Win32/Autorun",
          "display_name": "Worm:Win32/Autorun",
          "target": "/malware/Worm:Win32/Autorun"
        },
        {
          "id": "Malware:AddsCopyToStartup",
          "display_name": "Malware:AddsCopyToStartup",
          "target": null
        },
        {
          "id": "Trojan:Win32/Cobaltstrike",
          "display_name": "Trojan:Win32/Cobaltstrike",
          "target": "/malware/Trojan:Win32/Cobaltstrike"
        },
        {
          "id": "ALF:Trojan:Win32/Cassini_6d4ebdc9",
          "display_name": "ALF:Trojan:Win32/Cassini_6d4ebdc9",
          "target": null
        },
        {
          "id": "Trojan:Win32/Startpage",
          "display_name": "Trojan:Win32/Startpage",
          "target": "/malware/Trojan:Win32/Startpage"
        },
        {
          "id": "Backdoor:Win32/Zegost",
          "display_name": "Backdoor:Win32/Zegost",
          "target": "/malware/Backdoor:Win32/Zegost"
        },
        {
          "id": "Trojan:Win32/Fanop",
          "display_name": "Trojan:Win32/Fanop",
          "target": "/malware/Trojan:Win32/Fanop"
        },
        {
          "id": "Trojan:Win32/Neconyd",
          "display_name": "Trojan:Win32/Neconyd",
          "target": "/malware/Trojan:Win32/Neconyd"
        },
        {
          "id": "Trojan:Win32/Zombie",
          "display_name": "Trojan:Win32/Zombie",
          "target": "/malware/Trojan:Win32/Zombie"
        },
        {
          "id": "Win.Trojan.Generic-9935365-0",
          "display_name": "Win.Trojan.Generic-9935365-0",
          "target": null
        },
        {
          "id": "Ninite",
          "display_name": "Ninite",
          "target": null
        },
        {
          "id": "NoobyProtect",
          "display_name": "NoobyProtect",
          "target": null
        },
        {
          "id": "TEL:Trojan:Win64/GoCLR",
          "display_name": "TEL:Trojan:Win64/GoCLR",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:Ransom:Win32/CVE",
          "display_name": "ALF:HeraklezEval:Ransom:Win32/CVE",
          "target": null
        },
        {
          "id": "VirTool:Win32/Injector.gen!BQ",
          "display_name": "VirTool:Win32/Injector.gen!BQ",
          "target": "/malware/VirTool:Win32/Injector.gen!BQ"
        }
      ],
      "attack_ids": [
        {
          "id": "T1547",
          "name": "Boot or Logon Autostart Execution",
          "display_name": "T1547 - Boot or Logon Autostart Execution"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1023",
          "name": "Shortcut Modification",
          "display_name": "T1023 - Shortcut Modification"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1063",
          "name": "Security Software Discovery",
          "display_name": "T1063 - Security Software Discovery"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 4891,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 2436,
        "CVE": 3,
        "FileHash-MD5": 2510,
        "FileHash-SHA1": 2063,
        "FileHash-SHA256": 4054,
        "hostname": 1788,
        "URL": 1228,
        "email": 16
      },
      "indicator_count": 14098,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 239,
      "modified_text": "543 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "667af3df55de77efb0309afe",
      "name": "Norton's Elevated Cybersecurity Team at it's best - W11 PC - 01.18.24",
      "description": "Norton's Elevated Cybersecurity Team at it's best - W11 PC - 01.18.24\nRead: https://www.virustotal.com/gui/collection/82dc29932b9184d02b037289fd4605c158e96a57f376b08a8b2b94e43d0ae18b/summary for Summary of their 'elite team' & their efforts",
      "modified": "2024-08-30T17:04:50.688000",
      "created": "2024-06-25T16:44:15.585000",
      "tags": [
        "please",
        "javascript"
      ],
      "references": [
        "https://www.virustotal.com/gui/collection/82dc29932b9184d02b037289fd4605c158e96a57f376b08a8b2b94e43d0ae18b/summary",
        "https://www.virustotal.com/gui/collection/82dc29932b9184d02b037289fd4605c158e96a57f376b08a8b2b94e43d0ae18b/iocs",
        "https://www.virustotal.com/gui/collection/82dc29932b9184d02b037289fd4605c158e96a57f376b08a8b2b94e43d0ae18b/graph"
      ],
      "public": 1,
      "adversary": "Norton Telus",
      "targeted_countries": [
        "Canada",
        "United States of America"
      ],
      "malware_families": [],
      "attack_ids": [],
      "industries": [
        "Technology",
        "Telecommunications"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Disable_Duck",
        "id": "244325",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 857,
        "FileHash-MD5": 44,
        "FileHash-SHA1": 38,
        "FileHash-SHA256": 1942,
        "domain": 593,
        "hostname": 762
      },
      "indicator_count": 4236,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 130,
      "modified_text": "597 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "bindview.com",
    "type": "Domain"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "bindview.com",
    "found": false,
    "verdict": "clean",
    "urls": [],
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776630118.4339614
}