{
  "type": "Domain",
  "indicator": "c.map",
  "general": {
    "sections": [
      "general",
      "geo",
      "url_list",
      "passive_dns",
      "malware",
      "whois",
      "http_scans"
    ],
    "whois": "http://whois.domaintools.com/c.map",
    "alexa": "http://www.alexa.com/siteinfo/c.map",
    "indicator": "c.map",
    "type": "domain",
    "type_title": "Domain",
    "validation": [],
    "base_indicator": {
      "id": 2146342336,
      "indicator": "c.map",
      "type": "domain",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 45,
      "pulses": [
        {
          "id": "69b7ac3b32ac89ecba53f3d9",
          "name": "Malicious",
          "description": "",
          "modified": "2026-04-15T08:44:52.171000",
          "created": "2026-03-16T07:07:39.495000",
          "tags": [
            "march",
            "input http",
            "posix shell",
            "ascii text",
            "threat level",
            "summary av",
            "detection",
            "environment",
            "action"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 291,
            "URL": 272,
            "hostname": 296,
            "domain": 293,
            "FileHash-MD5": 90,
            "FileHash-SHA1": 89,
            "CIDR": 3,
            "email": 3,
            "SSLCertFingerprint": 9
          },
          "indicator_count": 1346,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 49,
          "modified_text": "5 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "697cdce9ec418c422eee2054",
          "name": "Device Isolation: Lumen Technologies | Palantir and \u2018Boots on the Ground Operations\u2019",
          "description": "Device Isolation: Lumen Technologies (formerly CenturyLink) deployed as an admin on iOS devices. Standard factory resets may prove ineffective. Complete hardware \"air-gap\" or clean devices that have never touched your home network may be best option for deeply monitored targets.\n\nSummary of the Campaign:\nThe involvement of Lumen Technologies (as an unwanted admin), Foundry (Palantir) for data mapping, and Mirai Botnet for network disruption represents a \"scorched earth\" approach to digital destruction. Target treated  as a criminal through Cellebrite, implicates specific attackers attempted to legalize what was actually a predatory stalking campaign/s.\n\n\nSurveillance Overlap: The use of  Lumen Technologies and Palantir, tools allows for real-time tracking of a target's physical location\u2014explains how \u2018boots on the ground\u2019 offenders can stalk , surveillance , confront, assault  and engage in various damaging attacks of specific monitored targets.",
          "modified": "2026-03-01T16:05:57.375000",
          "created": "2026-01-30T16:31:37.011000",
          "tags": [
            "url https",
            "url http",
            "tlsv1",
            "whitelisted",
            "united",
            "read c",
            "as15169",
            "stcalifornia",
            "execution",
            "dock",
            "write",
            "persistence",
            "malware",
            "encrypt",
            "active",
            "lumen technologies",
            "number",
            "error",
            "regexp",
            "sxa0",
            "amptoken",
            "optout",
            "retrieving",
            "notfound",
            "unknown",
            "form",
            "flash",
            "backdoor",
            "writeconsolew",
            "yara detections",
            "command line",
            "pdb path",
            "pe resource",
            "internalname",
            "windows command",
            "A",
            "aws",
            "name servers",
            "url analysis",
            "passive dns",
            "urls",
            "data upload",
            "extraction",
            "palantir",
            "c2",
            "aerospace",
            "tracking",
            "spywatchdog",
            "palapa-c2",
            "communications satellite",
            "amazon",
            "hughesnet",
            "icmp traffic",
            "washington c",
            "washington ou",
            "mopr",
            "mon jul",
            "local",
            "dynamic",
            "apple",
            "network",
            "t1057",
            "discovery",
            "t1069",
            "t1071",
            "protocol",
            "t1105",
            "tool transfer",
            "t1480",
            "guardrails",
            "t1566",
            "present jan",
            "unknown ns",
            "ip address",
            "dnssec",
            "domain",
            "dynamic dns",
            "government",
            "pcup",
            "germany unknown",
            "link",
            "dns hosting",
            "cloudns",
            "cloud dns",
            "a domains",
            "ipv4 add",
            "title",
            "meta",
            "class",
            "servers",
            "present aug",
            "aaaa",
            "present sep",
            "present nov",
            "present jul",
            "present may",
            "moved",
            "canada unknown",
            "begin",
            "record value",
            "gmt content",
            "type",
            "hostname add",
            "files",
            "ascii text",
            "pattern match",
            "href",
            "mitre att",
            "ck id",
            "ck matrix",
            "network traffic",
            "et info",
            "general",
            "path",
            "click",
            "learn",
            "command",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "input url",
            "defense evasion",
            "france",
            "ireland",
            "netherlands",
            "denmark",
            "united kingdom",
            "type indicator",
            "role title",
            "added active",
            "savvis",
            "centurylinktechnology",
            "hybrid analysis",
            "monitoring tools",
            "monitored target",
            "triangulation",
            "worm",
            "intel",
            "ms windows",
            "pe32",
            "write c",
            "delete c",
            "show",
            "russia as47764",
            "unix",
            "lsan jose",
            "odigicert inc",
            "markus",
            "url add",
            "http",
            "related nids",
            "files location",
            "russia flag",
            "russia hostname",
            "russia",
            "russia unknown",
            "hosting",
            "federation flag",
            "body",
            "gmt vary",
            "accept encoding",
            "gmt cache",
            "certificate",
            "pulse submit",
            "unknown aaaa",
            "search",
            "entries",
            "script domains",
            "script urls",
            "pdx cf"
          ],
          "references": [
            "\u2018Lumen Technologies\u2019 Acting as administrator of a targeted Apple IOS device",
            "Yare: compromised_site_redirector_fromcharcode",
            "Alerts: network_icmp nolookup_communication js_eval recon_fingerprint",
            "Alerts: console_output has_pdb pe_unknown_resource_name",
            "File Type PEXE - PE32+ executable (console) x86-64, for MS Windows ..",
            "Tipped: A targets AI and other cyber research findings.",
            "A \u2018Target\u2019 became a \u2018Target\u2019 vja close association to main Target of predatory retaliation campaign.",
            "track.spywarewatchdog.org \u2022  https://track.spywarewatchdog.org - monitoring software",
            "https://palapa.c.id\t (c.id)",
            "Containers-Pecorino.PalantirGov.com -pecorino.palantirgov.com",
            "cedevice.io  \u2022 decagonsoftware.com",
            "http://applevless.dns-dynamic.net/\t\u2022 dns-dynamic.net",
            "http://www.pcup.gov.ph/images/2018/pdf/ComEnBancReso/Commission_Resolution_07s2018.PDF",
            "pcup.gov.ph:",
            "http://www.pcup.gov.ph/images/pdf/Contract_of_SecurityServices2013.pdf pcup.gov.ph:",
            "https://pcup.gov.ph/375 pcup.gov.ph: | https://www.pcup.gov.ph/ pcup.gov.ph:",
            "https://elegantcosmedampyeah.pages.dev/",
            "https://www.ptv.vic.gov.au/more/travelling-on-the-network/lets-go/",
            "inst.govelopscold.com",
            "https://feedback.ptv.vic.gov.au/360",
            "nginx-php.7d4jelnf.trdlpbvl.sdp3.sdp.vic.gov.au",
            "nginx-php.standby.content-premier-vic-gov-au.sdp3.sdp.vic.gov.au",
            "https://hybrid-analysis.com/sample/a16d11910953b800369dbb667f178b3cc45cb8e3315217c0e6ceac68eeba206d",
            "https://brand.centurylinktechnology.com",
            "https://prod.centurylinktechnology.com",
            "https://brand2.centurylinktechnology.com",
            "https://mobile-pocket-guide.centurylinktechnology.com",
            "UPX_OEP_place",
            "Russia or Muskware? URL http://store.7box.vip/ad/C467F60A1AD6.Jpeg",
            "ASP. NET",
            "https://connect.facebook.net/en_US/sdk.js#xfbml=1&version=v4.0&appId=705930270206797&autoLogAppEvents=1 Akamai rank:",
            "7box.vip"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Trojan.Tofsee/Botx",
              "display_name": "Trojan.Tofsee/Botx",
              "target": null
            },
            {
              "id": "ALF:JASYP:Trojan:Win32/IRCbot!atmn",
              "display_name": "ALF:JASYP:Trojan:Win32/IRCbot!atmn",
              "target": null
            },
            {
              "id": "PWS:Win32/Axespec.A",
              "display_name": "PWS:Win32/Axespec.A",
              "target": "/malware/PWS:Win32/Axespec.A"
            },
            {
              "id": "Worm:Win32/Lightmoon.H",
              "display_name": "Worm:Win32/Lightmoon.H",
              "target": "/malware/Worm:Win32/Lightmoon.H"
            }
          ],
          "attack_ids": [
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "T1147",
              "name": "Hidden Users",
              "display_name": "T1147 - Hidden Users"
            },
            {
              "id": "T1041",
              "name": "Exfiltration Over C2 Channel",
              "display_name": "T1041 - Exfiltration Over C2 Channel"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1439",
              "name": "Eavesdrop on Insecure Network Communication",
              "display_name": "T1439 - Eavesdrop on Insecure Network Communication"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1557",
              "name": "Man-in-the-Middle",
              "display_name": "T1557 - Man-in-the-Middle"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1078.004",
              "name": "Cloud Accounts",
              "display_name": "T1078.004 - Cloud Accounts"
            },
            {
              "id": "T1069.003",
              "name": "Cloud Groups",
              "display_name": "T1069.003 - Cloud Groups"
            },
            {
              "id": "T1562.001",
              "name": "Disable or Modify Tools",
              "display_name": "T1562.001 - Disable or Modify Tools"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 102,
            "FileHash-SHA1": 59,
            "FileHash-SHA256": 1929,
            "domain": 854,
            "hostname": 2156,
            "URL": 4475,
            "SSLCertFingerprint": 9,
            "email": 7,
            "CVE": 1
          },
          "indicator_count": 9592,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "49 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "693b7dc3cf1996347652ef92",
          "name": "Google Site Redirector - Tesla Hackers",
          "description": "Silencing. By Tesla hackers. Awful example of how any victim of a crime; can become a target of the government..\nThis is especially true when the actual perpetrators work for the government are government affiliated, very wealthy, a celebrity or someone who is deemed important. In this instance the Quasi government sought to keep target seeking and obtaining life saving medical treatment, financial settlement that she was entitled to from assault, injuries from assault, false imprisonment, punitive damgages, pain and suffering, humiliation, premise liability, permanent (whole body disability @MMI ), many other crimes. The victims suffered from a great sadness and betrayal. \n\nObviously racist Elon Musk and crew have access to all government tools. Musk, All things cyber are at his disposal as \ncontinues to abuse privilege.\n They keep  playing a God  they  don\u2019t believe in. God is the Ultimate Avenger.",
          "modified": "2026-01-11T00:03:08.581000",
          "created": "2025-12-12T02:28:19.107000",
          "tags": [
            "compromised_site_redirector_fromcharcode",
            "site_redirector",
            "string",
            "regexp",
            "error",
            "number",
            "sxa0",
            "amptoken",
            "optout",
            "retrieving",
            "notfound",
            "write",
            "form",
            "flash",
            "vd",
            "tesla hackers",
            "nxdomain",
            "passive dns",
            "ip address",
            "domain",
            "a nxdomain",
            "urls",
            "files",
            "ip related",
            "pulses otx",
            "google",
            "unknown",
            "oracle",
            "dynamicloader",
            "medium",
            "high",
            "windows",
            "rndhex",
            "write c",
            "rndchar",
            "displayname",
            "tofsee",
            "yara rule",
            "stream",
            "strings",
            "push",
            "lte all",
            "search otx",
            "ource url",
            "or text",
            "paste",
            "data upload",
            "extraction",
            "elon musk",
            "indicator role",
            "active related",
            "ipv4",
            "exploitsource",
            "url https",
            "url http",
            "desktopinternet",
            "title added",
            "pulses ipv4",
            "less see",
            "ids detections",
            "vuze bt",
            "udp connection",
            "contacted",
            "filehash",
            "av detections",
            "yara detections",
            "alerts",
            "0x8aa42",
            "0xe3107",
            "upnp",
            "http request",
            "bittorrent",
            "file",
            "module load",
            "t1129",
            "post http",
            "install",
            "execution",
            "malware",
            "hostile",
            "crawl",
            "windows nt",
            "wow64",
            "get zona",
            "get httpget",
            "hash",
            "entries",
            "read c",
            "suspicious",
            "next",
            "united"
          ],
          "references": [
            "Tesla Hackers  | https://www.teslarati.com/spacex",
            "Yara Detections :compromised_site_redirector_fromcharcode Alerts network_icmp js_eval recon_fingerprint",
            "142.250.74.142.250.74.138 _exploit_source | 142.250.74.138 _exploit_source | 142.250.74.142_exploit_source",
            "IDS Detections Win32/ZonaInstaller Install Beacon",
            "https://www.google \u2022  https://ampcid.google.com/v1/publisher \u2022\u2019https://ampcid.google.com/v1/publisher:getClientId\\",
            "https://tagassistant.google.com/ \u2022  https://www.google-analytics.com/debug/bootstrap?id=",
            "https://www.google-analytics.com/debug/bootstrap?id=\\",
            "https://stats.g.doubleclick.net/j/collect\\ \u2022 https://tagassistant.google.com/ \u2022 https://www.google.com/ads/ga",
            "https://www.google-analytics.com/gtm/js?id=\\  \u2022 https://www.googletagmanager.com/gtag/js?id= \u2022",
            "https://www.googletagmanager.com/gtag/js?id=\\ \u2022 https://www.google-analytics.com/gtm/js?id=",
            "This is why our team tells a back story. It can and does happen to anyone.",
            "We apologize for so may typos and errors. We strive to do better at that."
          ],
          "public": 1,
          "adversary": "Tesla Hackers",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Vd",
              "display_name": "Vd",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Tofsee.T",
              "display_name": "Backdoor:Win32/Tofsee.T",
              "target": "/malware/Backdoor:Win32/Tofsee.T"
            },
            {
              "id": "Win.Trojan.12382640-1",
              "display_name": "Win.Trojan.12382640-1",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1023",
              "name": "Shortcut Modification",
              "display_name": "T1023 - Shortcut Modification"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1047",
              "name": "Windows Management Instrumentation",
              "display_name": "T1047 - Windows Management Instrumentation"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 65,
            "FileHash-SHA1": 34,
            "FileHash-SHA256": 2032,
            "URL": 4921,
            "domain": 567,
            "hostname": 1586,
            "SSLCertFingerprint": 4
          },
          "indicator_count": 9209,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "99 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "663d2869e0f3a42bbddc42ff",
          "name": "UPX executable packer.",
          "description": "A new rule has been introduced  a \"suspicious\" ELF binary that is packed with the UPX executable packer.\nSuggested ATT&CK IDs: rule SUSP_ELF_LNX_UPX_Compressed_File { meta: description = \"Detects a suspicious ELF binary with UPX compression\" author = \"Florian Roth (Nextron Systems)\" reference = \"Internal Research\" date = \"2018-12-12\" score = 40 hash1 = \"038ff8b2fef16f8ee9d70e6c219c5f380afe1a21761791e8cbda21fa4d09fdb4\" id = \"078937de-59b3-538e-a5c3-57f4e6050212\" strings: $s1 = \"PROT_EXEC|PROT_WRITE failed.\" fullword ascii $s2 = \"$Id: UPX\" fullword ascii $s3 = \"$Info: This file is packed with the UPX executable packer\" ascii $fp1 = \"check your UCL installation !\"",
          "modified": "2024-10-14T00:01:17.069000",
          "created": "2024-05-09T19:47:53.786000",
          "tags": [
            "cioch adrian",
            "centrum usug",
            "sieciowych",
            "elf binary",
            "upx compression",
            "roth",
            "nextron",
            "info",
            "javascript",
            "html",
            "office open",
            "xml document",
            "network capture",
            "win32 exe",
            "xml pakietu",
            "pdf zestawy",
            "przechwytywanie",
            "office",
            "filehashsha1",
            "url https",
            "cve cve20201070",
            "cve cve20203153",
            "cve cve20201048",
            "cve cve20211732",
            "cve20201048 apr",
            "filehashmd5",
            "cve cve20010901",
            "cve cve20021841",
            "cve20153202 apr",
            "cve cve20160728",
            "cve cve20161807",
            "cve cve20175123",
            "cve20185407 apr",
            "cve cve20054605",
            "cve cve20060745",
            "cve cve20070452",
            "cve cve20070453",
            "cve cve20070454",
            "cve cve20071355",
            "cve cve20071358",
            "cve cve20071871",
            "cve20149614 apr",
            "cve cve20151503",
            "cve cve20152080",
            "cve cve20157377",
            "cve cve20170131",
            "cve20200796 may",
            "cve cve20113403"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 6861,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Arek-BTC",
            "id": "212764",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 5771,
            "domain": 3139,
            "URL": 14525,
            "FileHash-SHA1": 2610,
            "IPv4": 108,
            "CIDR": 40,
            "FileHash-SHA256": 10705,
            "FileHash-MD5": 3373,
            "YARA": 2,
            "CVE": 148,
            "Mutex": 7,
            "FilePath": 3,
            "SSLCertFingerprint": 3,
            "email": 23,
            "JA3": 1,
            "IPv6": 2
          },
          "indicator_count": 40460,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "553 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6590412931fa8523e305795e",
          "name": "System Owner/User Discovery | Automobile CnC | HyunDAITX.COM",
          "description": "",
          "modified": "2024-01-29T15:00:34.177000",
          "created": "2023-12-30T16:11:21.071000",
          "tags": [
            "remote cnc",
            "no expiration",
            "filehashsha256",
            "domain",
            "filehashsha1",
            "filehashmd5",
            "expiration",
            "iocs",
            "hostname",
            "ipv4",
            "scan endpoints",
            "next",
            "url http",
            "url https",
            "apple",
            "appleid",
            "icloud",
            "tsara brashears",
            "all octoseek",
            "create new",
            "pulse use",
            "pdf report",
            "debugger evasion",
            "evasive",
            "who's driving",
            "yaaa",
            "xobo",
            "writes data to a remote process",
            "widget",
            "win64",
            "waaa",
            "vt report",
            "ttl value",
            "uaaa",
            "united",
            "unknown",
            "urls url",
            "stealthyness",
            "critical",
            "accept",
            "address",
            "admin country",
            "baaa",
            "anti-detection",
            "as11042",
            "network ascii text",
            "network",
            "back",
            "black",
            "body length",
            "attack",
            "boolean",
            "silly",
            "bundled",
            "caaa",
            "caca",
            "caca4baaa",
            "cacf",
            "caea",
            "click",
            "close",
            "cobalt strike",
            "checkbox",
            "ck id",
            "ck matrix",
            "contacted",
            "copy",
            "creation date",
            "code",
            "comcast tmobile",
            "communicating",
            "contact",
            "historical ssl",
            "csc corporate",
            "date",
            "desktop",
            "dns replication",
            "domain related",
            "domains dropped",
            "elf wgetboat",
            "error",
            "execution",
            "factory",
            "false",
            "files",
            "final",
            "url",
            "first",
            "general",
            "getprocaddress",
            "green",
            "group",
            "headers",
            "hr rtd",
            "http response",
            "hybrid",
            "iana id",
            "id",
            "apple id",
            "import",
            "infor",
            "installation",
            "january",
            "kb body",
            "loader",
            "localappdata",
            "love",
            "major",
            "malicious",
            "metro",
            "mitre att",
            "model",
            "netlify",
            "netlify edge",
            "next",
            "trim",
            "null",
            "threat roundup",
            "tech email",
            "subdomains",
            "status code",
            "ssl certificate",
            "show technique span",
            "sha256",
            "serving ip",
            "open",
            "server",
            "override",
            "path",
            "pattern match",
            "payment",
            "pe resource",
            "persistence",
            "phonenumber",
            "record type",
            "referrer",
            "registrar abuse",
            "rust",
            "search"
          ],
          "references": [
            "HyunDAITX.COM | Remote CnC of vehicle systems, connected devices. Critical",
            "https://www.virustotal.com/gui/domain/hyundaitx.com/summary",
            "https://hybrid-analysis.com/sample/235ae35db42acacf6bb9dbab1ca6392f67a60680275ec03f86866b7867db651f/65901471e396520cb3032621",
            "command_and_control 195.208.1.128 | 206.46.232.39",
            "drvtrd-widget.netlify.app/drivably-widget.js | drvtrd-widget.netlify.app/drivably.js | http://drvtrd-widget.netlify.app/drivably-widget.js",
            "https://www.virustotal.com/gui/url/87327571bc18df63df91ba61da25389eb32563074ccd640e2b15b2d38cf5b968/summary",
            "https://hybrid-analysis.com/sample/235ae35db42acacf6bb9dbab1ca6392f67a60680275ec03f86866b7867db651f/65901471e396520cb3032621",
            "appleid.com, apple.com, icloud.com",
            "https://blackbook.drivably.com | blackboxpedals.com",
            "car hacking | phone hacking | remote access & system control of entire system",
            "http://watchhers.net/index.php - remote attacks",
            "https://www.virustotal.com/gui/url/105e81bb8b366deb8e6b8849a7c61ebcff181fbc2e48347f5476d9e42b361b37/community",
            "pornhub.com - contextualizing, malvertizing, tagging, apple password crack",
            "https://www.virustotal.com/gui/url/105e81bb8b366deb8e6b8849a7c61ebcff181fbc2e48347f5476d9e42b361b37/community",
            "simple investigation shows Brashears historical family vehicles listed.",
            "elonmuskisafailure.com - tracker (yt3.ggpht.com tracker)",
            "www.youtube.com/watch?v=GyuMozsVyYs -tracking Tsara Brashears' SongCulture Youtube",
            "T1622 - Debugger Evasion",
            "T1218 - System Binary Proxy Execution",
            "Creates a process in suspended mode (likely for process injection"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1518",
              "name": "Software Discovery",
              "display_name": "T1518 - Software Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1218",
              "name": "Signed Binary Proxy Execution",
              "display_name": "T1218 - Signed Binary Proxy Execution"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1114.002",
              "name": "Remote Email Collection",
              "display_name": "T1114.002 - Remote Email Collection"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1408",
              "name": "Disguise Root/Jailbreak Indicators",
              "display_name": "T1408 - Disguise Root/Jailbreak Indicators"
            },
            {
              "id": "T1428",
              "name": "Exploit Enterprise Resources",
              "display_name": "T1428 - Exploit Enterprise Resources"
            },
            {
              "id": "T1422",
              "name": "System Network Configuration Discovery",
              "display_name": "T1422 - System Network Configuration Discovery"
            },
            {
              "id": "T1421",
              "name": "System Network Connections Discovery",
              "display_name": "T1421 - System Network Connections Discovery"
            },
            {
              "id": "T1427",
              "name": "Attack PC via USB Connection",
              "display_name": "T1427 - Attack PC via USB Connection"
            },
            {
              "id": "T1429",
              "name": "Capture Audio",
              "display_name": "T1429 - Capture Audio"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1213",
              "name": "Data from Information Repositories",
              "display_name": "T1213 - Data from Information Repositories"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1033",
              "name": "System Owner/User Discovery",
              "display_name": "T1033 - System Owner/User Discovery"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1010",
              "name": "Application Window Discovery",
              "display_name": "T1010 - Application Window Discovery"
            },
            {
              "id": "T1005",
              "name": "Data from Local System",
              "display_name": "T1005 - Data from Local System"
            },
            {
              "id": "TA0030",
              "name": "Defense Evasion",
              "display_name": "TA0030 - Defense Evasion"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 22,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 184,
            "FileHash-SHA1": 177,
            "FileHash-SHA256": 1078,
            "URL": 318,
            "domain": 511,
            "email": 4,
            "hostname": 520
          },
          "indicator_count": 2792,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "811 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708ef0cdb40fa0e7d239ca",
          "name": "either emotet or a part of it",
          "description": "",
          "modified": "2023-12-06T15:10:40.867000",
          "created": "2023-12-06T15:10:40.867000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 342,
            "hostname": 456,
            "domain": 349,
            "URL": 1730,
            "FileHash-MD5": 1,
            "FileHash-SHA1": 1
          },
          "indicator_count": 2879,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708e456bdbf8ea8d0d504a",
          "name": "whitehouse.gov",
          "description": "",
          "modified": "2023-12-06T15:07:49.577000",
          "created": "2023-12-06T15:07:49.577000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 449,
            "hostname": 639,
            "domain": 245,
            "URL": 1609,
            "FileHash-MD5": 4
          },
          "indicator_count": 2946,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708e254b734f1efd8bd0ad",
          "name": "1688.com .. 404-\u963f\u91cc\u5df4\u5df4",
          "description": "",
          "modified": "2023-12-06T15:07:17.380000",
          "created": "2023-12-06T15:07:17.380000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1645,
            "URL": 8598,
            "domain": 1004,
            "hostname": 2066,
            "FileHash-MD5": 3
          },
          "indicator_count": 13316,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708d657f0895a860febf8f",
          "name": "SafeFrame Container",
          "description": "",
          "modified": "2023-12-06T15:04:05.932000",
          "created": "2023-12-06T15:04:05.932000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1416,
            "domain": 2979,
            "URL": 8250,
            "hostname": 2262
          },
          "indicator_count": 14907,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708cca842536f1582636be",
          "name": "apeiron.global",
          "description": "",
          "modified": "2023-12-06T15:01:30.558000",
          "created": "2023-12-06T15:01:30.558000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 498,
            "hostname": 388,
            "domain": 242,
            "CVE": 1,
            "URL": 1203,
            "FileHash-MD5": 1
          },
          "indicator_count": 2333,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708c8a9635f156e79238f1",
          "name": "intel gained from a spam text",
          "description": "",
          "modified": "2023-12-06T15:00:26.727000",
          "created": "2023-12-06T15:00:26.727000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "FileHash-SHA256": 823,
            "domain": 717,
            "URL": 2245,
            "hostname": 615,
            "email": 4,
            "FileHash-MD5": 5,
            "FileHash-SHA1": 1
          },
          "indicator_count": 4411,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708c13ee010f81d3f9b3af",
          "name": "Malware hosting - hostrocket.com",
          "description": "",
          "modified": "2023-12-06T14:58:27.115000",
          "created": "2023-12-06T14:58:27.115000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 232,
            "hostname": 963,
            "domain": 412,
            "URL": 2337,
            "email": 3,
            "FileHash-MD5": 1,
            "FileHash-SHA1": 1
          },
          "indicator_count": 3949,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "657080d20f7e10c1e37fcf89",
          "name": "TarrantCounty.com ~ 03.01.2022",
          "description": "",
          "modified": "2023-12-06T14:10:26.301000",
          "created": "2023-12-06T14:10:26.301000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1078,
            "domain": 838,
            "hostname": 1607,
            "URL": 4134,
            "email": 3,
            "FileHash-SHA1": 2,
            "CIDR": 4,
            "FileHash-MD5": 15
          },
          "indicator_count": 7681,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "657080735501c11ddbb7a988",
          "name": "Dominionvoting.com 03.03.22",
          "description": "",
          "modified": "2023-12-06T14:08:51.329000",
          "created": "2023-12-06T14:08:51.329000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 663,
            "hostname": 588,
            "domain": 413,
            "URL": 2183,
            "FileHash-MD5": 7
          },
          "indicator_count": 3854,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65707fe17dfdfe16066d16de",
          "name": "Bexar.org",
          "description": "",
          "modified": "2023-12-06T14:06:25.800000",
          "created": "2023-12-06T14:06:25.800000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1735,
            "hostname": 1833,
            "domain": 1025,
            "URL": 4668,
            "email": 4,
            "FileHash-MD5": 133,
            "FileHash-SHA1": 6,
            "CIDR": 5
          },
          "indicator_count": 9409,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65707f7f79257c3b4f276f35",
          "name": "whitehouse.govapi_2.27.22",
          "description": "",
          "modified": "2023-12-06T14:04:47.874000",
          "created": "2023-12-06T14:04:47.874000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 489,
            "hostname": 405,
            "domain": 306,
            "URL": 1451,
            "email": 1,
            "FileHash-MD5": 4
          },
          "indicator_count": 2656,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65707e5b7df6f60133e8fb50",
          "name": "Jeeng / Powerbox",
          "description": "",
          "modified": "2023-12-06T13:59:55.129000",
          "created": "2023-12-06T13:59:55.129000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 3,
            "FileHash-SHA256": 9072,
            "domain": 2500,
            "hostname": 3584,
            "URL": 13548,
            "FileHash-MD5": 197,
            "FileHash-SHA1": 162,
            "email": 19,
            "CIDR": 20,
            "SSLCertFingerprint": 2,
            "BitcoinAddress": 1
          },
          "indicator_count": 29108,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "64766c71a5f740aaa9c915aa",
          "name": "miniwallet.bundle.js",
          "description": "confused cause hybrid scsn is clean",
          "modified": "2023-06-29T21:05:11.335000",
          "created": "2023-05-30T21:36:49.562000",
          "tags": [
            "sandbox",
            "malware",
            "analysis",
            "online",
            "submit",
            "vxstream",
            "sample",
            "download",
            "trojan",
            "apt",
            "memoryfile scan",
            "ansi",
            "error",
            "runtime data",
            "highlight",
            "typeof e",
            "highlighttext",
            "windir",
            "graytext",
            "typeof symbol",
            "null",
            "date",
            "unknown",
            "path",
            "suspicious",
            "roboto",
            "meta",
            "4096",
            "span",
            "local",
            "scroll",
            "backspace",
            "insert",
            "this",
            "april",
            "hybrid",
            "model",
            "close",
            "click",
            "general",
            "strings",
            "team",
            "qakbot",
            "cookie"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/78a7e765ffd6dff7af3b92b6234271fd0dddf5945f38e70d0e22324c1ec06eca/64414afe0ebb5831a20ce8f0"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1491",
              "name": "Defacement",
              "display_name": "T1491 - Defacement"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            },
            {
              "id": "T1614",
              "name": "System Location Discovery",
              "display_name": "T1614 - System Location Discovery"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 26,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "callmeDoris",
            "id": "205385",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 25,
            "domain": 131,
            "URL": 23,
            "CVE": 1,
            "FileHash-MD5": 5,
            "FileHash-SHA1": 2,
            "FileHash-SHA256": 5
          },
          "indicator_count": 192,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 93,
          "modified_text": "1025 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "64766c6ffe0d936205c28197",
          "name": "miniwallet.bundle.js",
          "description": "confused cause hybrid scsn is clean",
          "modified": "2023-06-29T21:05:11.335000",
          "created": "2023-05-30T21:36:47.160000",
          "tags": [
            "sandbox",
            "malware",
            "analysis",
            "online",
            "submit",
            "vxstream",
            "sample",
            "download",
            "trojan",
            "apt",
            "memoryfile scan",
            "ansi",
            "error",
            "runtime data",
            "highlight",
            "typeof e",
            "highlighttext",
            "windir",
            "graytext",
            "typeof symbol",
            "null",
            "date",
            "unknown",
            "path",
            "suspicious",
            "roboto",
            "meta",
            "4096",
            "span",
            "local",
            "scroll",
            "backspace",
            "insert",
            "this",
            "april",
            "hybrid",
            "model",
            "close",
            "click",
            "general",
            "strings",
            "team",
            "qakbot",
            "cookie"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/78a7e765ffd6dff7af3b92b6234271fd0dddf5945f38e70d0e22324c1ec06eca/64414afe0ebb5831a20ce8f0"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1491",
              "name": "Defacement",
              "display_name": "T1491 - Defacement"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1573",
              "name": "Encrypted Channel",
              "display_name": "T1573 - Encrypted Channel"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            },
            {
              "id": "T1614",
              "name": "System Location Discovery",
              "display_name": "T1614 - System Location Discovery"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 26,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "callmeDoris",
            "id": "205385",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 25,
            "domain": 131,
            "URL": 23,
            "CVE": 1,
            "FileHash-MD5": 5,
            "FileHash-SHA1": 2,
            "FileHash-SHA256": 5
          },
          "indicator_count": 192,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 92,
          "modified_text": "1025 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "63ed8628367c1a4f3f8e773a",
          "name": "just a load of errors on edge watching twitch",
          "description": "load of unknown user pics, but that could just be a twitch thing",
          "modified": "2023-03-18T00:05:45.328000",
          "created": "2023-02-16T01:26:00.959000",
          "tags": [
            "object",
            "typeerror",
            "typeof symbol",
            "error",
            "typeof t",
            "array",
            "string",
            "typeof e",
            "typeof n",
            "referenceerror",
            "date",
            "body",
            "null",
            "local",
            "generator",
            "class",
            "typeof tcfapi",
            "tcfapi",
            "daten",
            "image",
            "typeof comscore",
            "true",
            "regexp",
            "config",
            "nolbundle",
            "novmsjs",
            "nlssdk",
            "retry request",
            "nolsdkbundle",
            "typeof o",
            "bsdk check",
            "optout",
            "basever",
            "lsid",
            "qqfunction",
            "nielsen log",
            "info",
            "stop",
            "logger",
            "android",
            "donate",
            "ukraine relief",
            "requestbuilder",
            "slotbuilder",
            "uint8array",
            "nthis",
            "promise",
            "symbol",
            "fullscreen",
            "adload",
            "false",
            "facebook",
            "unknown",
            "meta",
            "direct",
            "this",
            "close",
            "locale",
            "model",
            "survey",
            "companion",
            "scroll",
            "backspace",
            "insert",
            "infinity",
            "sandbox",
            "malware",
            "analysis",
            "online",
            "submit",
            "vxstream",
            "sample",
            "download",
            "trojan",
            "apt",
            "runtime data",
            "ansi",
            "path",
            "hybrid analysis",
            "api call",
            "registry access",
            "function",
            "calls",
            "window",
            "hybrid",
            "general",
            "click",
            "ransomware",
            "february",
            "strings",
            "suspicious",
            "irequestslot",
            "islotbuilder",
            "amazonerrorcode",
            "errortype",
            "adunit",
            "conflict",
            "please"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/5da0de230eb98e5598b152944d0e7e6b355485484052df6c7f1c747e2c5564c0/63ed708125f47738b45a6520",
            "webpack   buildin global.js",
            "SlotBuilder.ts",
            "P34D56F9D-5684-4C83-8EE1-5EA7DE9CF45D.js",
            "apstag.js",
            "nlsSDK600.bundle.min.js",
            "v6s.js",
            "https://sb.scorecardresearch.com/p?c1=2&c2=6745306&ns_type=hidden&ns_st_sv=5.1.3.160420&ns_st_smv=5.1&ns_st_it=r&ns_st_id=1676508021004&ns_st_ec=3&ns_st_sp=1&ns_st_sc=1&ns_st_sq=1&ns_st_ppc=1&ns_st_apc=1&ns_st_spc=1&ns_st_cn=1&ns_st_ev=hb&ns_st_po=1560430&ns_st_cl=0&ns_st_hc=31&ns_st_mp=js_api&ns_st_mv=5.1.3.160420&ns_st_pn=1&ns_st_tp=0&ns_st_ci=47976339133&ns_st_pt=1560430&ns_st_dpt=360423&ns_st_ipt=60010&ns_st_et=1560430&ns_st_det=360423&ns_st_upc=1560430&ns_st_dupc=360423&ns_st_iupc=60010&ns_st_upa=15604",
            "https://sb.scorecardresearch.com/p?ax_uuid=d247c6142f285bb0488533aa7f2d53c5&c1=9&c2=31864766&ns__t=1676508027511&ns_c=UTF-8&cv=3.1&c8=SecurityWeekly%20-%20Twitch&c7=https%3A%2F%2Fwww.twitch.tv%2Fsecurityweekly&c9=",
            "https://hybrid-analysis.com/sample/b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b/",
            "beacon.js",
            "https://static-cdn.jtvnw.net/jtv_user_pictures/6f4129f6-3750-4c02-b7c8-c88a05064129-profile_image-70x70.png"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "SlotBuilder",
              "display_name": "SlotBuilder",
              "target": null
            },
            {
              "id": "RequestBuilder",
              "display_name": "RequestBuilder",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "callmeDoris",
            "id": "205385",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1353,
            "hostname": 363,
            "domain": 201,
            "FileHash-SHA256": 203,
            "FileHash-MD5": 9,
            "FileHash-SHA1": 3
          },
          "indicator_count": 2132,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 90,
          "modified_text": "1129 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "63ed86228ecb2b03d35b046f",
          "name": "just a load of errors on edge watching twitch",
          "description": "load of unknown user pics, but that could just be a twitch thing",
          "modified": "2023-03-18T00:05:45.328000",
          "created": "2023-02-16T01:25:54.305000",
          "tags": [
            "object",
            "typeerror",
            "typeof symbol",
            "error",
            "typeof t",
            "array",
            "string",
            "typeof e",
            "typeof n",
            "referenceerror",
            "date",
            "body",
            "null",
            "local",
            "generator",
            "class",
            "typeof tcfapi",
            "tcfapi",
            "daten",
            "image",
            "typeof comscore",
            "true",
            "regexp",
            "config",
            "nolbundle",
            "novmsjs",
            "nlssdk",
            "retry request",
            "nolsdkbundle",
            "typeof o",
            "bsdk check",
            "optout",
            "basever",
            "lsid",
            "qqfunction",
            "nielsen log",
            "info",
            "stop",
            "logger",
            "android",
            "donate",
            "ukraine relief",
            "requestbuilder",
            "slotbuilder",
            "uint8array",
            "nthis",
            "promise",
            "symbol",
            "fullscreen",
            "adload",
            "false",
            "facebook",
            "unknown",
            "meta",
            "direct",
            "this",
            "close",
            "locale",
            "model",
            "survey",
            "companion",
            "scroll",
            "backspace",
            "insert",
            "infinity",
            "sandbox",
            "malware",
            "analysis",
            "online",
            "submit",
            "vxstream",
            "sample",
            "download",
            "trojan",
            "apt",
            "runtime data",
            "ansi",
            "path",
            "hybrid analysis",
            "api call",
            "registry access",
            "function",
            "calls",
            "window",
            "hybrid",
            "general",
            "click",
            "ransomware",
            "february",
            "strings",
            "suspicious",
            "irequestslot",
            "islotbuilder",
            "amazonerrorcode",
            "errortype",
            "adunit",
            "conflict",
            "please"
          ],
          "references": [
            "https://hybrid-analysis.com/sample/5da0de230eb98e5598b152944d0e7e6b355485484052df6c7f1c747e2c5564c0/63ed708125f47738b45a6520",
            "webpack   buildin global.js",
            "SlotBuilder.ts",
            "P34D56F9D-5684-4C83-8EE1-5EA7DE9CF45D.js",
            "apstag.js",
            "nlsSDK600.bundle.min.js",
            "v6s.js",
            "https://sb.scorecardresearch.com/p?c1=2&c2=6745306&ns_type=hidden&ns_st_sv=5.1.3.160420&ns_st_smv=5.1&ns_st_it=r&ns_st_id=1676508021004&ns_st_ec=3&ns_st_sp=1&ns_st_sc=1&ns_st_sq=1&ns_st_ppc=1&ns_st_apc=1&ns_st_spc=1&ns_st_cn=1&ns_st_ev=hb&ns_st_po=1560430&ns_st_cl=0&ns_st_hc=31&ns_st_mp=js_api&ns_st_mv=5.1.3.160420&ns_st_pn=1&ns_st_tp=0&ns_st_ci=47976339133&ns_st_pt=1560430&ns_st_dpt=360423&ns_st_ipt=60010&ns_st_et=1560430&ns_st_det=360423&ns_st_upc=1560430&ns_st_dupc=360423&ns_st_iupc=60010&ns_st_upa=15604",
            "https://sb.scorecardresearch.com/p?ax_uuid=d247c6142f285bb0488533aa7f2d53c5&c1=9&c2=31864766&ns__t=1676508027511&ns_c=UTF-8&cv=3.1&c8=SecurityWeekly%20-%20Twitch&c7=https%3A%2F%2Fwww.twitch.tv%2Fsecurityweekly&c9=",
            "https://hybrid-analysis.com/sample/b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b/",
            "beacon.js",
            "https://static-cdn.jtvnw.net/jtv_user_pictures/6f4129f6-3750-4c02-b7c8-c88a05064129-profile_image-70x70.png"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "SlotBuilder",
              "display_name": "SlotBuilder",
              "target": null
            },
            {
              "id": "RequestBuilder",
              "display_name": "RequestBuilder",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "callmeDoris",
            "id": "205385",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1353,
            "hostname": 363,
            "domain": 201,
            "FileHash-SHA256": 203,
            "FileHash-MD5": 9,
            "FileHash-SHA1": 3
          },
          "indicator_count": 2132,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 90,
          "modified_text": "1129 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "63a3b9aaaca8891186e6f7a2",
          "name": "vt errors on edge 21 dec 2022",
          "description": "var n-i,n-n, r.test, is a new type of webpack, which uses a set of rules to store data in the form of a single address, or code.",
          "modified": "2023-01-21T00:01:41.590000",
          "created": "2022-12-22T01:58:02.495000",
          "tags": [
            "eaca",
            "eace",
            "iaca",
            "iace",
            "boolean",
            "object",
            "path",
            "aacf",
            "customevent",
            "string",
            "span",
            "error",
            "code",
            "virustotal",
            "date",
            "null",
            "contact",
            "blank",
            "close",
            "twitter",
            "unknown",
            "download",
            "this",
            "easy",
            "desktop",
            "body",
            "requires",
            "footer",
            "refresh",
            "patch",
            "write",
            "cobalt strike",
            "shell",
            "zero",
            "harmless",
            "main",
            "aalfe",
            "getclass",
            "copy",
            "iframe",
            "divi",
            "roboto",
            "insert",
            "template",
            "class",
            "void",
            "form",
            "back",
            "ransomware",
            "trace",
            "comment",
            "tools",
            "premium",
            "bufferwriter",
            "bufferreader",
            "array",
            "typeerror",
            "vtuibutton",
            "number",
            "typeof o",
            "urls",
            "please",
            "javascript",
            "https://www.virustotal.com/gui/vt-ui-sw-installer.e0eb1a1e08d651",
            "https://www.virustotal.com/gui/main.900e36f7a852b9863014.js"
          ],
          "references": [
            "https://www.virustotal.com/gui/vt-ui-sw-installer.e0eb1a1e08d6512ba355.js/ Depreciated",
            "https://www.virustotal.com/gui/main.900e36f7a852b9863014.js"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "BufferReader",
              "display_name": "BufferReader",
              "target": null
            },
            {
              "id": "BufferWriter",
              "display_name": "BufferWriter",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "callmeDoris",
            "id": "205385",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1051,
            "FileHash-SHA256": 204,
            "hostname": 275,
            "domain": 212,
            "CVE": 1,
            "FileHash-MD5": 1,
            "FileHash-SHA1": 1
          },
          "indicator_count": 1745,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 92,
          "modified_text": "1185 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "630aa58da975d104891c6565",
          "name": "Live Sexcams: XXX Adult Shows - Free Porn Chat - BongaCams",
          "description": "",
          "modified": "2022-08-27T23:15:25.718000",
          "created": "2022-08-27T23:15:25.718000",
          "tags": [
            "hammer",
            "gc",
            "vob",
            "tvb",
            "service",
            "date",
            "check favorite",
            "dare",
            "continuecta",
            "vote",
            "goprivate",
            "buycredits",
            "ff8d00",
            "favorite",
            "error",
            "null",
            "nonce",
            "enterprise",
            "script",
            "please do",
            "not copy",
            "and paste",
            "this code",
            "cgrecaptchacfg",
            "ngrecaptcha",
            "eenterprise",
            "object",
            "customevent",
            "ethis",
            "layouttest",
            "faceliftlayout",
            "stubbutton",
            "similarmodels",
            "purchasepagev3",
            "langtag",
            "newbannerchat",
            "image",
            "typeof atrkopts",
            "dailagill",
            "strong",
            "streams",
            "your",
            "source of",
            "pleasure",
            "live sex",
            "normal",
            "cosplay",
            "fingering",
            "chat",
            "deepthroat",
            "close",
            "live",
            "free cams",
            "sex chat",
            "live porn",
            "sex cam",
            "livesex",
            "webcamsex",
            "adult cams",
            "free live sex chat",
            "webcam sex",
            "chat online",
            "free adults hd",
            "mins",
            "xxx cams",
            "xxx porn",
            "free live cam",
            "adult sex",
            "material",
            "majority",
            "here looking",
            "for child",
            "pornography",
            "move on",
            "on this",
            "website",
            "we will",
            "turn over",
            "free porn webcams",
            "live webcam",
            "online sex cam",
            "xxx girls",
            "live sex chat",
            "teen sexchat",
            "amateur video",
            "web cam",
            "sexcams",
            "shows",
            "porn chat",
            "bongacams",
            "function",
            "i2c1",
            "xeir",
            "cef4",
            "m4sr",
            "e4c4",
            "math",
            "ttmt",
            "y4giwe",
            "h5gg",
            "window",
            "css1062",
            "segoe ui",
            "emoji",
            "href",
            "roboto",
            "helvetica neue",
            "arial",
            "apple color",
            "symbol",
            "typecheckbox",
            "twitter",
            "web design",
            "iran",
            "author url",
            "github",
            "regexp",
            "pseudo",
            "child",
            "typeof n",
            "typeof t",
            "class",
            "attr",
            "typeof module",
            "this"
          ],
          "references": [
            "xfe-URL-payvtylhwjxnr.xyz-stix2-2.1-export.json",
            "https://payvtylhwjxnr.xyz/Content/script?v=2",
            "https://payvtylhwjxnr.xyz/Content/css/banks.css",
            "https://payvtylhwjxnr.xyz/Content/style?v=1",
            "xfe-IP-104.21.72.150-stix2-2.1-export.json",
            "xfe-IP-172.67.151.101-stix2-2.1-export.json",
            "https://static.selfpuc.com/mnpw3.js",
            "https://bcprm.com/promo.php?c=716918&type=embed_chat&page=popular_chat&top_model=1&stream_only_size=full",
            "https://en.bongacams.com/popular-chat-popup?livetab=female&top_model=1&c=716918&hit_url=https%3A%2F%2Fbongacams.com%2Ftrack%3Fc%3D716918%26ps%3Dembed_chat&stream_only=1&amute=1&classic=on",
            "https://bongacams.com/GianaWatson",
            "https://m.bimbim.com/en/DailaGill?psid=crakmedia2&psprogram=revs&pstool=450_1&utm_campaign=main&utm_content=redirect&utm_medium=webmaster&utm_source=promotools",
            "https://d31qbv1cthcecs.cloudfront.net/atrk.js",
            "https://i.bcicdn.com/js-min/1NCJjq/27984029c73362dbf9ec0727.js",
            "https://www.google.com/recaptcha/enterprise.js?&render=6LeY5wkeAAAAAHNlJZXiHgJrpCTsD-Qu0O2GlYgB",
            "https://staticx1.dditscdn.com/mbl/frontend_backbone/static/_common/modular-member-client/script/maincontext_9af26.min.js"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "New Caledonia",
            "New Zealand"
          ],
          "malware_families": [
            {
              "id": "Hammer",
              "display_name": "Hammer",
              "target": null
            },
            {
              "id": "Tvb",
              "display_name": "Tvb",
              "target": null
            },
            {
              "id": "Vob",
              "display_name": "Vob",
              "target": null
            },
            {
              "id": "Gc",
              "display_name": "Gc",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "62509a05316b00bcca30c693",
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Hardtogiveafuck",
            "id": "205637",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 425,
            "domain": 459,
            "URL": 1412,
            "FileHash-SHA256": 125
          },
          "indicator_count": 2421,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 7,
          "modified_text": "1331 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "62e1ca167a1591e7b4ca1129",
          "name": "VirusTotal view-source on https://www.virustotal.com/en/file/undefined/analysis/",
          "description": "someone really needs to figure out wtf this is all doing it has to be part of the net.sh",
          "modified": "2022-07-28T02:05:04.183000",
          "created": "2022-07-27T23:28:22.504000",
          "tags": [
            "array",
            "object",
            "typeof t",
            "layer1",
            "error",
            "path",
            "function",
            "typeerror",
            "date",
            "svg export",
            "span",
            "null",
            "unknown",
            "click",
            "february",
            "april",
            "june",
            "august",
            "this",
            "void",
            "bounce",
            "string",
            "regexp",
            "number",
            "sxa0",
            "amptoken",
            "optout",
            "notfound",
            "contenttype",
            "form",
            "copyright",
            "element",
            "polymer project",
            "authors",
            "bsd style",
            "code",
            "google",
            "software",
            "window",
            "generator",
            "comment",
            "trident",
            "typeof e",
            "typeof symbol",
            "typeof btoa",
            "btoa",
            "typeof reflect",
            "boolean",
            "customevent",
            "plugin",
            "build",
            "home",
            "intelligence",
            "graph",
            "report",
            "urls",
            "please",
            "javascript",
            "https://www.virustotal.com/en/file/undefined/analysis/",
            "net.sh"
          ],
          "references": [
            "entity%3Aip%20whois%3Ainfo%40anodicnetwork.com.html",
            "14.main.bundle.91f9f7ff635e0b797de3.js",
            "5.main.bundle.e92e5e24e074f9c2a52b.js",
            "0.main.bundle.a9d68f5204cd3ac257b6.js",
            "webcomponent-polyfill.js",
            "analytics.js",
            "12.main.bundle.50be73a11d1d3745a5ee.js",
            "\"<!DOCTYPE html PUBLIC \"-//W3C//DTD XHTML 1.0 Strict//EN\" \"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd\"> <html xmlns=\"http://www.w3.org/1999/xhtml\">   <head>     <title>           Page not found       </title>       <meta http-equiv=\"Content-type\" content=\"text/html; charset=utf-8\">     <meta http-equiv=\"Pragma\" content=\"no-cache\">     <meta http-equiv=\"Pragma\" content=\"no-store\">     <meta http-equiv=\"Expires\" content=\"-1\">     <meta name=\"keywords\" content=\"virustotal, antivirus, infected, free, sca",
            "https://www.virustotal.com/en/file/undefined/analysis/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "dorkingbeauty1",
            "id": "80137",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1538,
            "FileHash-SHA256": 138,
            "hostname": 363,
            "domain": 235
          },
          "indicator_count": 2274,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 391,
          "modified_text": "1362 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "628e790d414886e18b33c262",
          "name": "either emotet or a part of it",
          "description": "var a.tldDomains, AWIN.Tracking.com, has a new name for its basket, but how do you find it in your browser?.. and what does this mean?",
          "modified": "2022-06-24T00:01:00.706000",
          "created": "2022-05-25T18:44:29.280000",
          "tags": [
            "tfunction",
            "cnullvvoid",
            "wnullgvoid",
            "bnullhvoid",
            "gnullcvoid",
            "guidewrapper",
            "blog",
            "lfunction",
            "hotjar",
            "iab2",
            "code",
            "number",
            "party",
            "n strictly",
            "life spann",
            "azuren n",
            "cookie tracking",
            "tablen n",
            "n cookies",
            "cookie",
            "null",
            "date",
            "error",
            "ffffff",
            "typeof t",
            "uint16array",
            "regexp",
            "uint8array",
            "array",
            "uint32array",
            "helvetica",
            "void",
            "execution",
            "body",
            "roboto",
            "prop",
            "object",
            "param",
            "cookies",
            "getcookie",
            "name",
            "typeof",
            "uri component",
            "obj2",
            "typeof e",
            "webkit",
            "component",
            "typeof y",
            "typeof symbol",
            "suspense",
            "context",
            "forwardref",
            "unknown",
            "4096",
            "function",
            "typeof n",
            "typeof window",
            "uuidv4",
            "ajsanonymousid",
            "suffix",
            "bill",
            "viewed",
            "pavel krayzel",
            "psd2",
            "bt prorata",
            "amex",
            "squad",
            "march",
            "new visitors",
            "promise",
            "nthis",
            "eventprocessor",
            "typeof define",
            "info",
            "functional",
            "member",
            "hnew regexp",
            "qfunction",
            "adview",
            "addbillinginfo",
            "addtocart",
            "addtolist",
            "contact",
            "download",
            "install",
            "window",
            "value",
            "customevent",
            "image",
            "samesitelax",
            "invalid pixel",
            "snap",
            "afaf09",
            "sfunction",
            "cfunction",
            "post",
            "appcuesdeps",
            "typeerror",
            "hki3",
            "ogr1",
            "typeof self",
            "full selector",
            "heatmaps",
            "sans",
            "version",
            "releaseid",
            "appcues",
            "dashboard2",
            "dashboard3",
            "technology",
            "selector",
            "click",
            "next",
            "import",
            "generic",
            "started",
            "dismissed",
            "completed",
            "contextual help",
            "symbol",
            "appcuesfunction",
            "widget",
            "iframe",
            "pnull",
            "html",
            "style",
            "ctnull",
            "fanull",
            "license",
            "ynull",
            "config",
            "meta",
            "accept",
            "contabo gmbh",
            "typeof hj",
            "https",
            "learn",
            "surveyv2",
            "surveyisolated",
            "safari",
            "firefox",
            "chrome",
            "remove",
            "edge",
            "correct",
            "section",
            "segoe ui",
            "emoji",
            "opera",
            "path",
            "span",
            "this",
            "typeof document",
            "small",
            "blank",
            "pass",
            "core",
            "footer",
            "close",
            "form",
            "main",
            "direct",
            "reduceright",
            "string",
            "f420",
            "gyfpnzbgtf3",
            "copyright",
            "json",
            "sesprops",
            "href",
            "input",
            "class",
            "logger",
            "target",
            "push",
            "awalt",
            "awinawin",
            "explorer",
            "awatp",
            "ccampid",
            "impid",
            "tag1"
          ],
          "references": [
            "https://www.dwin1.com/13976.js",
            "https://cdn.heapanalytics.com/js/heap-3501642718.js",
            "https://www.googletagmanager.com/gtag/js?id=G-YFPNZBGTF3&l=dataLayer&cx=c",
            "https://contabo.com/client/client.a529db28.js",
            "https://contabo.com/client/client-30e55c50.css",
            "https://static.hotjar.com/c/hotjar-2086874.js?sv=6",
            "https://l.clarity.ms/s/0.6.34/clarity.js",
            "https://www.clarity.ms/tag/uet/5739677",
            "https://fast.appcues.com/generic/main/4.35.3/appcues.main.e826b3c1f5ab15648ac446eafdbb489fd58d7f2d.js",
            "https://fast.appcues.com/79878.js",
            "https://cdn.segment.com/next-integrations/integrations/vendor/commons.54701049fd6fb8497e9e.js.gz",
            "https://cdn.segment.com/next-integrations/integrations/appcues/2.3.0/appcues.dynamic.js.gz",
            "https://cdn.segment.com/next-integrations/integrations/google-analytics/2.18.5/google-analytics.dynamic.js.gz",
            "https://sc-static.net/scevent.min.js",
            "https://cdn.taboola.com/libtrc/unip/1331749/tfa.js",
            "https://snap.licdn.com/li.lms-analytics/insight.min.js",
            "https://unpkg.com/@optimizely/optimizely-sdk@3.5.0/dist/optimizely.browser.umd.min.js",
            "https://cdn.optimizely.com/datafiles/HgHVKrf9ZD2dsZYVFb9JnD.json/tag.js",
            "https://www.hotjar.com/ensureSegmentId.js",
            "https://www.hotjar.com/_next/static/chunks/webpack-ca4d94cab12a165a123f.js",
            "https://www.hotjar.com/_next/static/chunks/framework-6994461647f52f294af9.js",
            "https://www.hotjar.com/persistUtmParams.js",
            "https://www.hotjar.com/_next/static/chunks/pages/_app-be5fbad980fd377922f7.js",
            "https://www.hotjar.com/_next/static/chunks/pages/index-b7f010d5161cd8f6ddab.js",
            "https://cdn.cookielaw.org/scripttemplates/6.5.0/otBannerSdk.js"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "ReduceRight",
              "display_name": "ReduceRight",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 349,
            "hostname": 456,
            "URL": 1730,
            "FileHash-SHA256": 342,
            "FileHash-MD5": 1,
            "FileHash-SHA1": 1
          },
          "indicator_count": 2879,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 68,
          "modified_text": "1396 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6280921bfbaf2aace62511f1",
          "name": "1688.com .. 404-\u963f\u91cc\u5df4\u5df4",
          "description": "Alibaba",
          "modified": "2022-06-14T00:00:05.659000",
          "created": "2022-05-15T05:39:39.040000",
          "tags": [
            "typeerror",
            "object",
            "typeof t",
            "symbol",
            "typeof e",
            "typeof self",
            "webpackrequire",
            "typeof n",
            "json",
            "math",
            "body",
            "copyright",
            "apoorv saxena",
            "typeof",
            "typeof define",
            "detect ie",
            "typeof document",
            "substring",
            "\u963f\u91cc\u5df4\u5df4\uff0c1688\uff0c\u5fae\u5546\uff0c\u5fae\u5e97\uff0c\u8d27\u6e90\uff0c\u5973\u88c5\u6279\u53d1\uff0c\u7537\u88c5\uff0cb2b\uff0c\u6279\u53d1\uff0c\u91c7\u8d2d",
            "typeof symbol",
            "promise",
            "error",
            "date",
            "createclass",
            "array",
            "this",
            "typeof lib",
            "null",
            "mozilla",
            "regexp",
            "typeof require",
            "xmlhttprequest",
            "license",
            "xdomainrequest",
            "aplusscore",
            "s1e4",
            "cfunction",
            "html5",
            "span",
            "button",
            "android",
            "jupdate",
            "void",
            "webview",
            "kraken",
            "nundefined",
            "xfunction",
            "zfunction",
            "chrome",
            "xuexi",
            "nullj",
            "area",
            "mtopwvplugin",
            "activexobject",
            "post",
            "options",
            "function",
            "head",
            "delete",
            "false",
            "trace",
            "patch",
            "unknown",
            "alipay",
            "ff6a00",
            "opacity100",
            "opacity0",
            "f2f3f7",
            "e6e7eb",
            "f7f8fa",
            "helvetica neue",
            "helvetica",
            "tahoma",
            "arial",
            "\u963f\u91cc\u5df4\u5df4\uff0c\u91c7\u8d2d\u6279\u53d1\uff0c1688\uff0c\u884c\u4e1a\u95e8\u6237\uff0c\u7f51\u4e0a\u8d38\u6613\uff0cb2b\uff0c\u7535\u5b50\u5546\u52a1\uff0c\u5185\u8d38\uff0c\u5916\u8d38\uff0c\u6279\u53d1\uff0c\u884c\u4e1a\u8d44\u8baf\uff0c\u7f51\u4e0a\u8d38\u6613\uff0c\u7f51\u4e0a\u4ea4\u6613\uff0c\u4ea4\u6613\u5e02\u573a\uff0c\u5728",
            "1688",
            "1000",
            "yunos",
            "lazada",
            "http response",
            "gmt contenttype",
            "vary"
          ],
          "references": [
            "xfe-URL-1688.com-stix2-2.1-export.json",
            "xfe-IP-47.89.52.178-stix2-2.1-export.json",
            "https://page.1688.com/shtml/static/wrongpage.html",
            "http://polyfill.alicdn.com/",
            "xfe-URL-Alijk.com-stix2-2.1-export.json",
            "http://i.alicdn.com/",
            "http://is.alicdn.com/",
            "http://1688.com/",
            "https://mind.1688.com/wap/wapsy/dke4eosa0/index.html?no_cache=true&pageId=1150842&cms_id=1150842&src=desktop",
            "xfe-URL-mind.1688.com-stix2-2.1-export.json",
            "https://g.alicdn.com/secdev/sufei_data/3.9.9/index.js",
            "https://g.alicdn.com/alilog/mlog/aplus_wap.js",
            "https://mind.1688.com/zsh/zsh/d9my57ugj/index.html",
            "https://gw.alipayobjects.com/os/lib/lozad/1.16.0/dist/lozad.min.js",
            "http://g.alicdn.com/assets-group/croco/0.0.8/index.js"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 15,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 8598,
            "hostname": 2066,
            "domain": 1004,
            "FileHash-SHA256": 1645,
            "FileHash-MD5": 3
          },
          "indicator_count": 13316,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 71,
          "modified_text": "1406 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6281b34e4324a6b2fbc00d58",
          "name": "whitehouse.gov",
          "description": "",
          "modified": "2022-06-14T00:00:05.659000",
          "created": "2022-05-16T02:13:34.527000",
          "tags": [],
          "references": [
            "whitehouse.gov 2.27.22 6.pdf",
            "whitehouse.gov 2.28.22 8.pdf",
            "whitehouse.gov 2.27.22 3.pdf",
            "whitehouse.gov 2.27.22 2.pdf",
            "whithouse.gov 2.27.22 4.pdf",
            "whitehouse.gov 2.27.22 8.pdf",
            "whitehouse.govapi_2.27.22.pdf",
            "whitehouse.gov 2.27.22 7.pdf"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Kailula4",
            "id": "131997",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 639,
            "URL": 1610,
            "FileHash-SHA256": 449,
            "domain": 245,
            "FileHash-MD5": 4
          },
          "indicator_count": 2947,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 408,
          "modified_text": "1406 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "620c3b1f8af7ea0dcf2c1218",
          "name": "Jeeng / Powerbox",
          "description": "",
          "modified": "2022-06-12T22:01:23.105000",
          "created": "2022-02-15T23:45:35.234000",
          "tags": [
            "Jeeng",
            "tim pool",
            "timcast"
          ],
          "references": [
            "cf20ed53-cb6d-4dfd-a4e8-794fbe163efc.pcap"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scnrscnr",
            "id": "126475",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_126475/resized/80/avatar_67ca5b7bae.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 9072,
            "domain": 2500,
            "URL": 13548,
            "hostname": 3584,
            "FileHash-MD5": 197,
            "FileHash-SHA1": 162,
            "CVE": 3,
            "CIDR": 20,
            "SSLCertFingerprint": 2,
            "email": 19,
            "BitcoinAddress": 1
          },
          "indicator_count": 29108,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 97,
          "modified_text": "1407 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "62756a0d14664003affb0555",
          "name": "hush.com 301 to hushmail.com",
          "description": "var b[f, gw.b, \"dust\" - a.g - has been added to an Array by the end of the year, if there is any chance of it being added.",
          "modified": "2022-06-05T00:03:45.266000",
          "created": "2022-05-06T18:33:49.161000",
          "tags": [
            "widget",
            "null",
            "regexp",
            "array",
            "copyright",
            "license",
            "calltrkswap",
            "date",
            "typeof s",
            "xmlhttprequest",
            "typeof r",
            "script",
            "vd",
            "number",
            "string",
            "ienew ca",
            "closure library",
            "error",
            "quota",
            "aafunction",
            "dafunction",
            "function",
            "typeof o",
            "reduceright",
            "aw1070742489",
            "uint8array",
            "void",
            "code",
            "typeof symbol",
            "wickedclientid",
            "wickedemail",
            "wickedurl",
            "wickednullurl",
            "typeof e",
            "direct",
            "typeof require",
            "modulenotfound",
            "mini",
            "cnull",
            "anull",
            "nl50",
            "pnull",
            "okcancel",
            "compiled",
            "true",
            "android",
            "trident",
            "form",
            "window",
            "false",
            "acronym",
            "body",
            "canvas",
            "embed",
            "footer",
            "iframe",
            "keygen",
            "legend",
            "mark",
            "meta",
            "ruby",
            "small",
            "span",
            "template",
            "blank",
            "twitter",
            "typeof t",
            "class",
            "attr",
            "pseudo",
            "child",
            "js foundation",
            "typeof module",
            "width",
            "object",
            "this",
            "accept",
            "fnumber",
            "gtmmf25krh",
            "host",
            "path"
          ],
          "references": [
            "xfe-URL-Hush.com-stix2-2.1-export.json",
            "https://www.googletagmanager.com/gtag/js?id=AW-1070742489&l=dataLayer&cx=c",
            "https://www.googletagmanager.com/gtm.js?id=GTM-MF25KRH",
            "https://www.hushmail.com/shared/javascript/jquery-3.5.1.min.js",
            "https://www.hushmail.com/javascriptinclude/eNrLKC3OyE3MzIkvT00qzixJtSpITE_V98lPz8xzyy_K1csqtjI0MzK2MDcwsbS0ysCq2qkov7w4tSi4JLGkGFUDAF_tIM0,.en_US.68448bd8190f2f2bae9633f547bbbbbe.0.js",
            "https://www.hushmail.com/javascriptinclude/eNpNzEEOQDAQQNEbtVoM7Sks7GXopB0pkQ5xfWJl-5P3JWGh4AvukSRzoKKtqlWlf0Wt4k3rnG2g641Pl6QNOU83zcIn-QMj6ZHpHQ2FF97jiHOmj0ED4FxfwQOf9yPU.en_US.68448bd8190f2f2bae9633f547bbbbbe.0.js",
            "https://widget.trustpilot.com/bootstrap/v5/tp.widget.bootstrap.min.js",
            "https://widget.wickedreports.com/widget.js",
            "https://www.googletagmanager.com/gtag/js?id=AW-1070742489",
            "https://www.hushmail.com/status/",
            "https://script.tapfiliate.com/tapfiliate.js",
            "https://www.googletagmanager.com/gtag/js?id=UA-1837381-13",
            "https://widget.wickedreports.com/v2/3469/wr-dafa9fae816c2f65d24d1eb593b58626.js",
            "https://cdn.callrail.com/companies/431115301/7c8f964bc12313c75ad2/12/swap.js",
            "https://js.callrail.com/group/0/7c8f964bc12313c75ad2/06ababf0-8852-4eef-95e1-285ae467a93a/poll.js?t=1651861725881&ids%5B%5D=431115301",
            "https://js.callrail.com/group/0/7c8f964bc12313c75ad2/06ababf0-8852-4eef-95e1-285ae467a93a/poll.js?t=1651861793229&ids%5B%5D=431115301",
            "https://widget.trustpilot.com/trustboxes/5406e65db0d04a09e042d5fc/index.html?templateId=5406e65db0d04a09e042d5fc&businessunitId=4bdc496b000064000505a89d#locale=en-US&styleHeight=28px&styleWidth=100%25&theme=light"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Vd",
              "display_name": "Vd",
              "target": null
            },
            {
              "id": "OkCancel",
              "display_name": "OkCancel",
              "target": null
            },
            {
              "id": "ReduceRight",
              "display_name": "ReduceRight",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1531",
              "name": "Account Access Removal",
              "display_name": "T1531 - Account Access Removal"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1917,
            "hostname": 698,
            "FileHash-SHA256": 116,
            "domain": 263
          },
          "indicator_count": 2994,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 70,
          "modified_text": "1415 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "62752a3d78ce35783bfc85cc",
          "name": "SafeFrame Container",
          "description": "If you want to know what is going to happen when you create a non-iterable object, try these three pieces of code in the form of a new \"word\" or \"phrase\".",
          "modified": "2022-06-05T00:03:45.266000",
          "created": "2022-05-06T14:01:33.267000",
          "tags": [
            "public",
            "typeof",
            "typeof define",
            "array",
            "typeerror",
            "typeof symbol",
            "error",
            "typeof enulle",
            "sdkversion",
            "internal",
            "date",
            "cnzzdata",
            "czuuid",
            "umdistinctid",
            "typeof e",
            "typeof t",
            "version",
            "swiper",
            "most",
            "copyright",
            "mit license",
            "april",
            "trident",
            "win32",
            "class",
            "lh",
            "vd",
            "function",
            "overlaylevel",
            "zdhxiong",
            "customevent",
            "symbol",
            "object",
            "string",
            "number",
            "null",
            "uint8array",
            "typeof b",
            "iframe",
            "android",
            "embed",
            "meta",
            "0x14a",
            "0x104",
            "0x97",
            "0xe1",
            "0x228",
            "0x12b",
            "0x14e",
            "0xf5",
            "0x11a",
            "0xc6",
            "sxa0",
            "typeof d",
            "closure library",
            "array int8array",
            "b1342177279",
            "regexp",
            "typeof r",
            "pseudo",
            "child",
            "typeof n",
            "template",
            "void",
            "this",
            "ienew ca",
            "quota",
            "aafunction",
            "dafunction",
            "gc",
            "trackpageview",
            "trackevent",
            "gtmmdcvhgd",
            "node",
            "element",
            "path",
            "reduceright",
            "p420",
            "gc3w7t6h5qw",
            "kafunction",
            "fafafa",
            "xlfunction",
            "kkfunction",
            "nkfunction",
            "qkfunction",
            "rkfunction",
            "skfunction",
            "span",
            "edge",
            "bad idp",
            "bad event",
            "crios",
            "invalid attempt",
            "afunction",
            "ufunction",
            "kfunction"
          ],
          "references": [
            "xfe-URL-himado.com-stix2-2.1-export.json",
            "xfe-IP-146.148.236.187-stix2-2.1-export.json",
            "xfe-URL-Psychz.net-stix2-2.1-export.json",
            "https://cdn.ampproject.org/rtv/012204221712000/amp4ads-host-v0.js",
            "https://apis.google.com/_/scs/abc-static/_/js/k=gapi.lb.en.iTmf4rxOyWc.O/m=auth2/rt=j/sv=1/d=1/ed=1/rs=AHpOoo-LTnDn-AS2QlMWYZdnaV1OuFR7Iw/cb=gapi.loaded_0?le=scs",
            "https://securepubads.g.doubleclick.net/gpt/pubads_impl_page_level_ads_2022050201.js",
            "https://www.googletagmanager.com/gtag/js?id=G-C3W7T6H5QW&l=dataLayer&cx=c",
            "https://www.googletagmanager.com/gtm.js?id=GTM-MDCVHGD",
            "https://www.googletagmanager.com/gtag/js?id=UA-122335014-2",
            "https://himado.com/heihei/layui/layui.all.js",
            "https://securepubads.g.doubleclick.net/tag/js/gpt.js",
            "https://himado.com/cdn-cgi/challenge-platform/h/g/scripts/invisible.js?ts=1651842000",
            "https://securepubads.g.doubleclick.net/gpt/pubads_impl_2022050201.js",
            "https://himado.com/heihei/node_modules/mdui/dist/js/mdui.min.js",
            "https://himado.com/heihei/js/swiper.min.js",
            "https://cdn.onesignal.com/sdks/OneSignalSDK.js",
            "https://c.cnzz.com/core.php?web_id=1280305902&t=z",
            "https://s4.cnzz.com/z_stat.php?id=1280305902&web_id=1280305902",
            "https://www.gstatic.com/firebasejs/8.1.2/firebase-app.js",
            "https://281cecd8ae73dff542e13679e60d5fb9.safeframe.googlesyndication.com/safeframe/1-0-38/html/container.html",
            "xfe-URL-Cnzz.com-stix2-2.1-export.json",
            "xfe-URL-Aliyun.com-stix2-2.1-export.json"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Lh",
              "display_name": "Lh",
              "target": null
            },
            {
              "id": "Gc",
              "display_name": "Gc",
              "target": null
            },
            {
              "id": "ReduceRight",
              "display_name": "ReduceRight",
              "target": null
            },
            {
              "id": "Vd",
              "display_name": "Vd",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 16,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 2262,
            "URL": 8251,
            "FileHash-SHA256": 1416,
            "domain": 2979
          },
          "indicator_count": 14908,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 71,
          "modified_text": "1415 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "62925b989eba65cefe8c5f88",
          "name": "Mathworks.com (work in progress) extractor is malfunctioning",
          "description": "defineProperty(t,n), Object.prototype, E.S.D, e.CmpApiModel, \"DeepClone\", \"deepClones\" - a description of all the functions in this.",
          "modified": "2022-05-28T17:43:49.055000",
          "created": "2022-05-28T17:27:52.332000",
          "tags": [
            "optin",
            "elqsitevisited",
            "qnew date",
            "rnew date",
            "dlkey",
            "dllookup",
            "image",
            "httponly",
            "typeof e",
            "typeerror",
            "typeof symbol",
            "string",
            "array",
            "date",
            "efunction",
            "sfunction",
            "target",
            "typeof h",
            "typeof t",
            "typeof n",
            "typeof",
            "copyright",
            "event",
            "jquery",
            "typeof u",
            "uspapi",
            "confirmation",
            "matlab",
            "matlab speaks",
            "video",
            "system toolbox",
            "international",
            "learning",
            "computer vision",
            "analytics",
            "toolbox",
            "shell",
            "loans",
            "b0b6c1",
            "send",
            "caced6",
            "qualaroo",
            "thank",
            "ffd700",
            "simulink",
            "blank",
            "pass",
            "undef",
            "false",
            "null",
            "martin",
            "6464",
            "12224",
            "survey",
            "close",
            "tools",
            "python",
            "typeof require",
            "error",
            "modulenotfound",
            "abcdef",
            "typeof visitor",
            "adcloud",
            "typeof alloy"
          ],
          "references": [
            "https://quantcast.mgr.consensu.org/tcfv2/27/cmp2.js?referer=m",
            "https://www.everestjs.net/static/le/last-event-tag-latest.min.js",
            "https://s3.amazonaws.com/ki.js/49559/ahy.js",
            "https://rules.quantcount.com/rules-p-zfNtLVVEHXE-1.js",
            "https://secure.quantserve.com/quant.js",
            "https://quantcast.mgr.consensu.org/tcfv2/27/cmp2.js?referer=mathworks.com",
            "https://img03.en25.com/i/elqCfg.min.js"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 13,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 156,
            "hostname": 192,
            "URL": 608,
            "FileHash-SHA256": 22,
            "FileHash-MD5": 2
          },
          "indicator_count": 980,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 67,
          "modified_text": "1422 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "626a8a564da0d5b27dc02619",
          "name": "App By Web",
          "description": "Israeli malware hosting",
          "modified": "2022-05-28T00:03:46.141000",
          "created": "2022-04-28T12:36:38.103000",
          "tags": [
            "hebrew",
            "truetype",
            "woff2",
            "woff",
            "body",
            "fh5cooffcanvas",
            "function",
            "click",
            "main menu",
            "superfish var",
            "parallax",
            "offcanvas",
            "mobile menu",
            "animations var",
            "mstouchaction",
            "superfish menu",
            "plugin",
            "copyright",
            "joel birch",
            "dual",
            "fill",
            "touchaction",
            "y position",
            "hoverintent",
            "brian cherne",
            "param",
            "threshold",
            "mit license",
            "or selector",
            "author",
            "1parseint",
            "mark dalgleish",
            "http",
            "webkitopacity",
            "webkit",
            "khtmlopacity",
            "khtml",
            "typeof d",
            "error",
            "this",
            "caleb troughton",
            "typeof f",
            "adapter",
            "bootstrap",
            "javascript",
            "typeof c",
            "twitter",
            "focus",
            "azaz",
            "including",
            "this software",
            "but not",
            "limited to",
            "terms of",
            "open",
            "bsd license",
            "redistribution",
            "redistributions",
            "neither",
            "direct",
            "gc",
            "regexp",
            "typeof b",
            "pseudo",
            "child",
            "array",
            "width",
            "sufeffxa0",
            "class",
            "null",
            "date",
            "accept",
            "boolean",
            "modernizr",
            "custom build",
            "build",
            "afunction",
            "cfunction",
            "typeerror",
            "object",
            "documenttouch",
            "websocket",
            "string",
            "silk",
            "script",
            "arial",
            "edge",
            "iframe",
            "promise",
            "void",
            "android",
            "trident",
            "embed",
            "meta",
            "roboto",
            "term",
            "\u05d4\u05d6\u05de\u05e0\u05ea \u05de\u05d5\u05e0\u05d9\u05ea",
            "wtaxi",
            "wapp",
            "app by web ltd",
            "03-5115656",
            "03-5109109",
            "+97235115656",
            "\u05de\u05e2\u05e8\u05db\u05d5\u05ea \u05d4\u05e1\u05e2\u05d9\u05dd",
            "\u05db\u05e8\u05d8\u05d9\u05e1 \u05d0\u05e9\u05e8\u05d0\u05d9 \u05d1\u05de\u05d5\u05e0\u05d9\u05ea",
            "web ltd",
            "reserved"
          ],
          "references": [
            "xfe-URL-appbyweb.net-stix2-2.1-export.json",
            "http://appbyweb.net/AppByWeb",
            "https://partner.googleadservices.com/gampad/cookie.js?domain=appbyweb.net&callback=_gfp_s_&client=ca-pub-2581829468247892",
            "https://pagead2.googlesyndication.com/pagead/managed/js/adsense/m202204200101/show_ads_impl_fy2019.js",
            "http://appbyweb.net/AppByWeb/js/modernizr-2.6.2.min.js",
            "http://appbyweb.net/AppByWeb/js/jquery.min.js",
            "http://appbyweb.net/AppByWeb/js/jquery.easing.1.3.js",
            "http://appbyweb.net/AppByWeb/js/bootstrap.min.js",
            "http://appbyweb.net/AppByWeb/js/jquery.waypoints.min.js",
            "http://appbyweb.net/AppByWeb/js/jquery.stellar.min.js",
            "http://appbyweb.net/AppByWeb/js/hoverIntent.js",
            "http://appbyweb.net/AppByWeb/js/superfish.js",
            "http://appbyweb.net/AppByWeb/js/main.js",
            "https://files.appbyweb.net/Fonts/OpenSansHebrew/font.css",
            "https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-2581829468247892&output=html&adk=1812271804&adf=3025194257&lmt=1651149220&plat=16%3A8388608%2C17%3A32%2C24%3A32%2C25%3A32%2C32%3A32&format=0x0&url=http%3A%2F%2Fappbyweb.net%2FAppByWeb%2F&ea=0&pra=5&wgl=1&dt=1651149220376&bpp=1&bdt=121&idt=18&shv=r20220425&mjsv=m202204200101&ptt=9&saldr=aa&abxe=1&cookie=ID%3De83d6067a4dac5b6-229192c549d200d1%3AT%3D1651148802%3ART%3D1651148802%3AS%3DALNI_MZSt9utXhYBHAIH9xwQp72WuxQxTw&nras=1&correlator=1655793633284&"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Gc",
              "display_name": "Gc",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1554,
            "hostname": 533,
            "domain": 211,
            "FileHash-SHA256": 199
          },
          "indicator_count": 2497,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 69,
          "modified_text": "1423 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6269a10ba1925979929dc566",
          "name": "apeiron.global",
          "description": "New RegExp(M) is a new type, and it will change any of the elements to the same type if you want to add them to your HTML page or add a third element.",
          "modified": "2022-05-27T00:00:15.468000",
          "created": "2022-04-27T20:01:15.714000",
          "tags": [
            "click",
            "getclicktarget",
            "date",
            "contexttrack",
            "view",
            "installtrigger",
            "processlink",
            "typeof blog",
            "msie",
            "image",
            "nonce",
            "script",
            "please do",
            "not copy",
            "and paste",
            "this code",
            "cgrecaptchacfg",
            "ngrecaptcha",
            "recaptchaapi",
            "render",
            "typeerror",
            "symbol",
            "error",
            "generator",
            "typeof e",
            "addtoany",
            "span",
            "facebook",
            "button",
            "helvetica neue",
            "subscribe",
            "email",
            "share",
            "arial",
            "helvetica",
            "light",
            "path",
            "discord",
            "find",
            "twitter",
            "push",
            "buttons",
            "typetext",
            "typeof intl",
            "intl",
            "event",
            "uefunction",
            "typeof define",
            "typeof module",
            "html tags",
            "ox20trnf",
            "dom element",
            "gc",
            "regexp",
            "typeof t",
            "class",
            "attr",
            "pseudo",
            "child",
            "function",
            "select",
            "string",
            "strong",
            "uint8array",
            "number",
            "edge",
            "null",
            "this",
            "iframe",
            "verify",
            "trident",
            "void",
            "next",
            "android",
            "stop",
            "enterprise",
            "form"
          ],
          "references": [
            "xfe-IP-103.136.42.186-stix2-2.1-export.json",
            "https://www.gstatic.com/recaptcha/releases/2W_gRz39xX8G13fM-OdyQPlc/recaptcha__en.js",
            "https://c0.wp.com/c/5.9.3/wp-includes/js/jquery/jquery.min.js",
            "https://c0.wp.com/c/5.9.3/wp-includes/js/jquery/jquery-migrate.min.js",
            "https://static.addtoany.com/menu/page.js",
            "https://c0.wp.com/p/jetpack/10.7/_inc/build/photon/photon.min.js",
            "https://c0.wp.com/c/5.9.3/wp-includes/js/dist/vendor/regenerator-runtime.min.js",
            "https://stats.wp.com/e-202217.js",
            "https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LdNytsaAAAAANS6DW8pofQamH4toQAAgfF7Q8qW&co=aHR0cHM6Ly93d3cuYXBlaXJvbi5nbG9iYWw6NDQz&hl=en&v=2W_gRz39xX8G13fM-OdyQPlc&size=invisible&cb=ghnkw160kgfd",
            "https://static.addtoany.com/menu/sm.23.html#type=core&event=load&url=https%3A%2F%2Fwww.apeiron.global%2F&referrer=",
            "xfe-URL-https___c0.wp.com_-stix2-2.1-export.json"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "GC",
              "display_name": "GC",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 498,
            "domain": 242,
            "URL": 1203,
            "hostname": 388,
            "CVE": 1,
            "FileHash-MD5": 1
          },
          "indicator_count": 2333,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 70,
          "modified_text": "1424 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6266f7e0e0264cba210a4e9e",
          "name": "intel gained from a spam text",
          "description": "var b[f]=g, if b(f) is not allowed to reach its maximum by the end of a set, then a.b(b) will be able to do so at the same time as a",
          "modified": "2022-05-25T00:04:03.622000",
          "created": "2022-04-25T19:34:56.772000",
          "tags": [
            "array",
            "typeerror",
            "symbol",
            "null",
            "string",
            "iterator",
            "object",
            "error",
            "boolean",
            "function",
            "service",
            "date",
            "phonenumber",
            "facebook",
            "meta",
            "typeof e",
            "typeof u",
            "typeof window",
            "es modules",
            "use esm",
            "webkit",
            "component",
            "typeof",
            "typeof y",
            "typeof symbol",
            "suspense",
            "context",
            "forwardref",
            "unknown",
            "4096",
            "typeof n",
            "promise",
            "weakmap",
            "dataview",
            "typeof t",
            "webpackrequire",
            "modulenotfound",
            "e1342177279",
            "array int8array",
            "loanup",
            "insurance",
            "group",
            "health",
            "solutions",
            "policy",
            "site",
            "america",
            "company",
            "life",
            "plan",
            "direct",
            "media",
            "alliance",
            "click",
            "team",
            "never",
            "advantage",
            "general",
            "light",
            "february",
            "april",
            "june",
            "august",
            "footer",
            "protect",
            "banker",
            "explorer",
            "fast",
            "martin",
            "union",
            "carrier",
            "next",
            "colony",
            "energy",
            "empire",
            "gerber",
            "philadelphia",
            "hippo",
            "king",
            "agent",
            "mercury",
            "moss",
            "premium",
            "nextgen",
            "oscar",
            "phoenix",
            "loans",
            "pure",
            "ramsey",
            "ranger",
            "solar",
            "titan",
            "tristate",
            "viking",
            "easy",
            "push",
            "code",
            "stop",
            "carriers",
            "live",
            "lucky",
            "moral",
            "story",
            "back",
            "lfunction",
            "dfunction",
            "cfunction",
            "typeof self",
            "number",
            "copyright",
            "closure library",
            "xdfunction",
            "cdfunction",
            "ddfunction",
            "bded",
            "kefunction",
            "reduceright",
            "gj9pcw0f6jv",
            "regexp",
            "r420",
            "uint8array",
            "typeof d",
            "void"
          ],
          "references": [
            "https://www.googletagmanager.com/gtag/js?id=G-J9PCW0F6JV",
            "https://www.googletagmanager.com/gtag/js?id=UA-185991747-1",
            "https://insurancerateusa.com/polyfill-036b4a134d8725752ba0.js",
            "xfe-URL-insurancerateusa.com-stix2-2.1-export.json",
            "https://insurancerateusa.com/app-74647f151b541f3098c2.js",
            "https://insurancerateusa.com/bfcc7b67-0b189ba6da3fc3ae8b88.js",
            "https://insurancerateusa.com/94297995-69529ad7536f090aa776.js",
            "https://insurancerateusa.com/3bea8d40-8926f4790c0b3689a361.js",
            "https://insurancerateusa.com/framework-19eddc0d879a49dfe606.js",
            "https://insurancerateusa.com/webpack-runtime-f014a3267add02a94afb.js",
            "https://connect.facebook.net/signals/config/3689470801106673?v=2.9.57&r=stable"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "ReduceRight",
              "display_name": "ReduceRight",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 615,
            "URL": 2246,
            "FileHash-SHA256": 823,
            "domain": 717,
            "CVE": 1,
            "email": 4,
            "FileHash-MD5": 5,
            "FileHash-SHA1": 1
          },
          "indicator_count": 4412,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 70,
          "modified_text": "1426 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "628d376ff4e346e1485cbea2",
          "name": "ZagreuS Ransomware Builder [ NEW! Ransomware as a Service ] - YouTube",
          "description": "If you want to find out more about this page, here is the full text of the code:w,c,S,R, E, T, Gd, W.S.",
          "modified": "2022-05-24T19:52:15.836000",
          "created": "2022-05-24T19:52:15.836000",
          "tags": [
            "video",
            "sharing",
            "camera phone",
            "video phone",
            "free",
            "upload",
            "builder",
            "ransomware",
            "service",
            "press copyright",
            "contact",
            "privacy policy",
            "safety how",
            "youtube",
            "test",
            "google llc",
            "typeerror",
            "decorate",
            "customevent",
            "copyright",
            "error",
            "license",
            "array",
            "number",
            "typeof symbol",
            "generator",
            "matrix",
            "string",
            "date",
            "closure library",
            "xdfunction",
            "adfunction",
            "bdfunction",
            "lefunction",
            "qefunction",
            "0x589122",
            "0x543585",
            "0x5123f6",
            "0x1aac5a",
            "0x2762ce",
            "software",
            "a00x3d7e",
            "0x2bffcb",
            "0x4b870a",
            "0x2808ca",
            "push",
            "picasso",
            "phantom",
            "canvas",
            "nightmare",
            "slice",
            "shift",
            "hello",
            "object",
            "typeof e",
            "edge",
            "dataname",
            "intercom",
            "apple",
            "webkiti",
            "criosi",
            "trident",
            "xu",
            "select",
            "strong",
            "uint8array",
            "null",
            "math",
            "svoid",
            "this",
            "iframe",
            "verify",
            "android",
            "stop",
            "form",
            "body",
            "span",
            "enterprise",
            "click",
            "next"
          ],
          "references": [
            "https://www.gstatic.com/recaptcha/releases/1_E1Jb45wiBZrQd45oGZ-2cU/recaptcha__en.js",
            "https://www.iubenda.com/cookie-solution/confs/js/33942990.js",
            "https://www.googletagmanager.com/gtag/js?id=UA-184179078-",
            "https://widget.intercom.io/widget/j3kafOpd",
            "https://cdn.iubenda.com/cs/iubenda_Cs.js",
            "https://sellix.io/cdn-cgi/bm/cv/669835187/api.js",
            "https://unpkg.com/@lottiefiles/lottie-player@1.5.7/dist/lottie-player.js",
            "https://youtu.be/ZKxvzrxDzt0"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "xU",
              "display_name": "xU",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 12,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1132,
            "hostname": 286,
            "domain": 259,
            "FileHash-SHA256": 107,
            "email": 1,
            "FileHash-MD5": 1
          },
          "indicator_count": 1786,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 67,
          "modified_text": "1426 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "626224efc28c918470fa07ed",
          "name": "inflect.com - malware",
          "description": "var e,t, r.o, is a new type of code, which can be used to build a website, but can't do so without a special code.. and the following:",
          "modified": "2022-05-21T00:03:44.725000",
          "created": "2022-04-22T03:45:51.681000",
          "tags": [
            "object",
            "typeof symbol",
            "typeerror",
            "html",
            "body",
            "software",
            "pops",
            "width",
            "error",
            "provider",
            "null",
            "code",
            "trident",
            "trcomponent",
            "typeof t",
            "referenceerror",
            "component",
            "date",
            "array",
            "header",
            "contact",
            "backspace",
            "next",
            "footer",
            "copy",
            "february",
            "april",
            "june",
            "august",
            "open",
            "project",
            "this",
            "unknown",
            "heapdeps",
            "number",
            "hki3",
            "ogr1",
            "function",
            "regexp",
            "typeof self",
            "typeof",
            "facebook pixel",
            "pixel code",
            "symbol",
            "iterator",
            "constantvalue",
            "globalvariable",
            "facebook",
            "string",
            "boolean",
            "service",
            "phonenumber",
            "meta",
            "typeof e",
            "sesprops",
            "nthis",
            "href",
            "image",
            "input",
            "class",
            "logger",
            "download",
            "target",
            "form",
            "push"
          ],
          "references": [
            "xfe-URL-inflect.com-stix2-2.1-export.json",
            "https://cdn.heapanalytics.com/js/heap-2001511295.js",
            "https://connect.facebook.net/signals/config/534474930374151?v=2.9.57&r=stable",
            "https://connect.facebook.net/en_US/fbevents.js",
            "https://cdn.segment.com/next-integrations/integrations/vendor/commons.54701049fd6fb8497e9e.js.gz",
            "https://cdn.segment.com/next-integrations/integrations/heap/2.1.2/heap.dynamic.js.gz",
            "https://storage.googleapis.com/inflect-frontend-assets/adb460de2098568d4c3580de1fde2f6690bcbd04/_next/static/s0TytVz2d0zNgb~bjg~~D/pages/search.js"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "TrComponent",
              "display_name": "TrComponent",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1064,
            "FileHash-SHA256": 222,
            "hostname": 162,
            "domain": 294
          },
          "indicator_count": 1742,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 68,
          "modified_text": "1430 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "625f492a0581b2eb202e47c9",
          "name": "Malware hosting - hostrocket.com",
          "description": "ChunkLoadError, a new type of error, failed to load a chunk of JavaScript, according to the web browser operator, E.noconflict.com, as well as the website itself.",
          "modified": "2022-05-19T00:00:49.028000",
          "created": "2022-04-19T23:43:38.539000",
          "tags": [
            "jxuiwidget",
            "null",
            "function",
            "jxuihtmldiv",
            "date",
            "jxuilabel",
            "zendesk chat",
            "regexp",
            "api update",
            "jxuihtmla",
            "window",
            "chat",
            "void",
            "error",
            "loader",
            "back",
            "click",
            "close",
            "agent",
            "hello",
            "form",
            "banned",
            "cookie",
            "small",
            "legacy",
            "direct",
            "colorbox core",
            "style",
            "user style",
            "colorbox",
            "html",
            "6deg",
            "e5e5e5",
            "dbdbdb",
            "d2d2d2",
            "eaedef",
            "michael farrell",
            "home",
            "helvetica",
            "ssd shared",
            "page",
            "formnum",
            "hidden",
            "current",
            "hostrocket",
            "dotblock",
            "fast",
            "href",
            "price slider",
            "tooltip",
            "dotblock popup",
            "callback",
            "rect",
            "cycle plugin",
            "number",
            "auto",
            "shuffle",
            "manual",
            "roll",
            "speed",
            "stop",
            "false",
            "first",
            "look",
            "copyright",
            "gpl version",
            "http",
            "document",
            "ui effects",
            "width",
            "left",
            "bottom",
            "this",
            "atom",
            "html id",
            "price",
            "timer",
            "value",
            "processor",
            "example",
            "storage",
            "string",
            "class",
            "thecookie",
            "create",
            "thevalue",
            "param",
            "type",
            "pluginscookie",
            "author",
            "jquery",
            "u00a0",
            "option",
            "body",
            "optgroup",
            "multiple",
            "selectboxhover",
            "selectbox",
            "label",
            "control",
            "slideshow",
            "jack moore",
            "mit license",
            "overlay",
            "wrapper",
            "content",
            "loadedcontent",
            "loadingoverlay",
            "next",
            "iframe",
            "array",
            "attr",
            "tools",
            "ui library",
            "no copyrights",
            "or licenses",
            "like",
            "media",
            "john resig",
            "dual",
            "gtmkw8b5l",
            "classes",
            "host",
            "path",
            "element",
            "trackpageview",
            "typeerror",
            "typeof symbol",
            "typeof e",
            "typeof t",
            "referenceerror",
            "promise",
            "script",
            "boolean",
            "typeof n"
          ],
          "references": [
            "xfe-URL-hostrocket.com-stix2-2.1-export 2.json",
            "https://www.googletagmanager.com/gtm.js?id=GTM-KW8B5L",
            "https://www.hostrocket.com/js/jquery-1.6.1.min.js",
            "https://www.hostrocket.com/js/jquery.tools.min.js",
            "https://www.hostrocket.com/js/jquery.colorbox-min.js",
            "https://www.hostrocket.com/js/jquery.selectBox.min.js",
            "https://www.hostrocket.com/js/jquery.cookie.js",
            "https://www.hostrocket.com/js/jquery.price_slider.js",
            "https://www.hostrocket.com/js/jquery-ui-1.8.13.custom.min.js",
            "https://www.hostrocket.com/js/jquery.cycle.all.js",
            "https://www.hostrocket.com/js/jquery.behavior.js",
            "https://www.hostrocket.com/contact-files/contact-form.js",
            "https://www.hostrocket.com/css/style.css",
            "https://www.hostrocket.com/css/colorbox.css",
            "https://www.hostrocket.com/css/style-nophone.css",
            "https://v2.zopim.com/bin/v/widget_v2.329.js"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 963,
            "email": 3,
            "domain": 412,
            "URL": 2338,
            "FileHash-SHA256": 232,
            "FileHash-MD5": 1,
            "FileHash-SHA1": 1
          },
          "indicator_count": 3950,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 68,
          "modified_text": "1432 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "62549aabb033e7afc5069f98",
          "name": "Malware - victim=fr",
          "description": "Mme, Mlle,   M. Compte, yn \u00f4l \u00c2\u00a31.5m (\u20ac2.4m; \u00e2\u201a\u00ac1m)",
          "modified": "2022-05-11T21:04:45.103000",
          "created": "2022-04-11T21:16:27.786000",
          "tags": [
            "freebox",
            "free",
            "mois pendant",
            "sabonner voir",
            "fibre free",
            "la fibre",
            "votre",
            "wifi",
            "freebox en",
            "offre",
            "delta",
            "face",
            "prix",
            "date",
            "this",
            "typeof e",
            "true",
            "function",
            "left",
            "bottom",
            "html",
            "nullt",
            "false",
            "next",
            "february",
            "april",
            "june",
            "august",
            "atom",
            "cookie",
            "close",
            "null",
            "back",
            "bounce",
            "kolab",
            "target",
            "object",
            "tcfuiservice",
            "reflect",
            "typeof proxy",
            "boolean",
            "agree",
            "disagree",
            "select",
            "save",
            "learn",
            "click",
            "gnu gpl",
            "copyright",
            "javascript code",
            "license",
            "extwin1",
            "framed1",
            "roundcube",
            "webmail client",
            "script",
            "team",
            "format",
            "regexp",
            "software",
            "error",
            "pseudo",
            "child",
            "the software",
            "sufeffxa0",
            "class",
            "attr",
            "javascript",
            "express",
            "nous",
            "didomi",
            "typeof t",
            "hmuvfyyh",
            "sekindo",
            "lkqd",
            "aol cdn",
            "ffffff",
            "montserrat",
            "adsl",
            "offres adsl",
            "internet",
            "t\u00e9l\u00e9phone",
            "t\u00e9l\u00e9phonie",
            "mobiles",
            "forfaits mobiles",
            "tv",
            "t\u00e9l\u00e9vision",
            "vod",
            "vid\u00e9o \u00e0 la demande",
            "multiposte",
            "radio",
            "routeur",
            "freeplayer",
            "multiplay",
            "d\u00e9groupage",
            "total",
            "partiel",
            "e-mail",
            "mail",
            "m\u00e9l",
            "fournisseur d'acc\u00e8s",
            "i.s.p.",
            "isp",
            "internaute",
            "internautes",
            "france",
            "fran\u00e7ais",
            "zimbra",
            "le webmail",
            "free fait",
            "webmail imp",
            "cela n",
            "webmail zimbra",
            "stockage",
            "pour migrer",
            "accder",
            "testteltext",
            "sans",
            "testziptext",
            "testziptext i",
            "testteltext i",
            "typenumber",
            "screenh",
            "tvbycanal",
            "tvbycanal147",
            "tvbycanal204",
            "tvbycanal83",
            "tvbycanal80",
            "tvbycanal34",
            "4000",
            "typeof console",
            "console",
            "nullc",
            "nulld",
            "customevent",
            "msanimationend",
            "typeof n",
            "typeof r",
            "x20trnf",
            "width",
            "accept",
            "json",
            "moz o",
            "custom build",
            "https",
            "xmlhttprequest",
            "typeof module",
            "webkit",
            "android",
            "flash",
            "span",
            "un espace",
            "phpmysql",
            "helvetica"
          ],
          "references": [
            "xfe-IP-212.27.63.109-stix2-2.1-export.json",
            "http://pageperso.free.fr/im/css/free.css",
            "http://passback.free.fr/pub/pp_300x250.html",
            "https://subscribe.free.fr/accesgratuit/index.html",
            "https://subscribe.free.fr/assets/js/vendor/modernizr.custom.js",
            "https://subscribe.free.fr/assets/js/vendor/jquery-1.9.1.min.js",
            "https://subscribe.free.fr/assets/js/plugins.min.js",
            "https://subscribe.free.fr/assets/js/vendor/wow.min.js",
            "https://subscribe.free.fr/assets/js/main.min.js",
            "https://subscribe.free.fr/assets/css/accesgratuit.min.css",
            "https://subscribe.free.fr/assets/css/app2.min.css",
            "https://webmail.free.fr/",
            "https://sdk.privacy-center.org/87df2f8d-232a-4617-8efc-3764b3bbd0c0/loader.js?target=webmail.free.fr",
            "https://webmail.free.fr/program/js/jquery.min.js?s=1510166541",
            "https://webmail.free.fr/program/js/app.min.js?s=1510166525",
            "https://sdk.privacy-center.org/ui-gdpr-en.a96c69ed0cb8f37a2deea6c49dd453517875ac60.js",
            "https://webmail.free.fr/plugins/jqueryui/js/jquery-ui.min.js?s=1510166524",
            "https://www.free.fr/freebox/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1078,
            "URL": 2104,
            "domain": 290,
            "FileHash-SHA256": 117,
            "FileHash-MD5": 4,
            "FileHash-SHA1": 2
          },
          "indicator_count": 3595,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 68,
          "modified_text": "1439 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "62509a05316b00bcca30c693",
          "name": "Live Sexcams: XXX Adult Shows - Free Porn Chat - BongaCams",
          "description": "Here is the full text of the code for the new animation, which will take place at 20:00 GMT on Friday, 1:30 BST.. (19:45 GMT)..",
          "modified": "2022-05-08T00:03:14.586000",
          "created": "2022-04-08T20:24:37.141000",
          "tags": [
            "hammer",
            "gc",
            "vob",
            "tvb",
            "service",
            "date",
            "check favorite",
            "dare",
            "continuecta",
            "vote",
            "goprivate",
            "buycredits",
            "ff8d00",
            "favorite",
            "error",
            "null",
            "nonce",
            "enterprise",
            "script",
            "please do",
            "not copy",
            "and paste",
            "this code",
            "cgrecaptchacfg",
            "ngrecaptcha",
            "eenterprise",
            "object",
            "customevent",
            "ethis",
            "layouttest",
            "faceliftlayout",
            "stubbutton",
            "similarmodels",
            "purchasepagev3",
            "langtag",
            "newbannerchat",
            "image",
            "typeof atrkopts",
            "dailagill",
            "strong",
            "streams",
            "your",
            "source of",
            "pleasure",
            "live sex",
            "normal",
            "cosplay",
            "fingering",
            "chat",
            "deepthroat",
            "close",
            "live",
            "free cams",
            "sex chat",
            "live porn",
            "sex cam",
            "livesex",
            "webcamsex",
            "adult cams",
            "free live sex chat",
            "webcam sex",
            "chat online",
            "free adults hd",
            "mins",
            "xxx cams",
            "xxx porn",
            "free live cam",
            "adult sex",
            "material",
            "majority",
            "here looking",
            "for child",
            "pornography",
            "move on",
            "on this",
            "website",
            "we will",
            "turn over",
            "free porn webcams",
            "live webcam",
            "online sex cam",
            "xxx girls",
            "live sex chat",
            "teen sexchat",
            "amateur video",
            "web cam",
            "sexcams",
            "shows",
            "porn chat",
            "bongacams",
            "function",
            "i2c1",
            "xeir",
            "cef4",
            "m4sr",
            "e4c4",
            "math",
            "ttmt",
            "y4giwe",
            "h5gg",
            "window",
            "css1062",
            "segoe ui",
            "emoji",
            "href",
            "roboto",
            "helvetica neue",
            "arial",
            "apple color",
            "symbol",
            "typecheckbox",
            "twitter",
            "web design",
            "iran",
            "author url",
            "github",
            "regexp",
            "pseudo",
            "child",
            "typeof n",
            "typeof t",
            "class",
            "attr",
            "typeof module",
            "this"
          ],
          "references": [
            "xfe-URL-payvtylhwjxnr.xyz-stix2-2.1-export.json",
            "https://payvtylhwjxnr.xyz/Content/script?v=2",
            "https://payvtylhwjxnr.xyz/Content/css/banks.css",
            "https://payvtylhwjxnr.xyz/Content/style?v=1",
            "xfe-IP-104.21.72.150-stix2-2.1-export.json",
            "xfe-IP-172.67.151.101-stix2-2.1-export.json",
            "https://static.selfpuc.com/mnpw3.js",
            "https://bcprm.com/promo.php?c=716918&type=embed_chat&page=popular_chat&top_model=1&stream_only_size=full",
            "https://en.bongacams.com/popular-chat-popup?livetab=female&top_model=1&c=716918&hit_url=https%3A%2F%2Fbongacams.com%2Ftrack%3Fc%3D716918%26ps%3Dembed_chat&stream_only=1&amute=1&classic=on",
            "https://bongacams.com/GianaWatson",
            "https://m.bimbim.com/en/DailaGill?psid=crakmedia2&psprogram=revs&pstool=450_1&utm_campaign=main&utm_content=redirect&utm_medium=webmaster&utm_source=promotools",
            "https://d31qbv1cthcecs.cloudfront.net/atrk.js",
            "https://i.bcicdn.com/js-min/1NCJjq/27984029c73362dbf9ec0727.js",
            "https://www.google.com/recaptcha/enterprise.js?&render=6LeY5wkeAAAAAHNlJZXiHgJrpCTsD-Qu0O2GlYgB",
            "https://staticx1.dditscdn.com/mbl/frontend_backbone/static/_common/modular-member-client/script/maincontext_9af26.min.js"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "New Caledonia",
            "New Zealand"
          ],
          "malware_families": [
            {
              "id": "Hammer",
              "display_name": "Hammer",
              "target": null
            },
            {
              "id": "Tvb",
              "display_name": "Tvb",
              "target": null
            },
            {
              "id": "Vob",
              "display_name": "Vob",
              "target": null
            },
            {
              "id": "Gc",
              "display_name": "Gc",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 425,
            "domain": 459,
            "URL": 1412,
            "FileHash-SHA256": 125
          },
          "indicator_count": 2421,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 71,
          "modified_text": "1443 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "62276abfaa65cd33f64331f8",
          "name": "TarrantCounty.com ~ 03.01.2022",
          "description": "",
          "modified": "2022-04-07T00:04:02.553000",
          "created": "2022-03-08T14:39:59.235000",
          "tags": [
            "march",
            "lookup go",
            "rescan add",
            "verdict report",
            "de summary",
            "http",
            "redirects links",
            "behaviour",
            "similar dom",
            "content api",
            "value",
            "search url",
            "search domain",
            "scan url",
            "url search",
            "domain scan",
            "url url",
            "motor vehicle",
            "aqb1",
            "eventsevent10",
            "meta",
            "show",
            "download go",
            "full url",
            "reverse dns",
            "resource",
            "windows nt",
            "win64",
            "khtml",
            "gecko",
            "response",
            "main",
            "milan",
            "apache",
            "paris",
            "accept"
          ],
          "references": [
            "TarrantCounty3df.pdf",
            "TarantCounty2df.pdf",
            "TarrantCounty4df.pdf",
            "TarrantCounty5df.pdf",
            "tarrant23df.pdf",
            "TarrantCounty1df.pdf",
            "tarrantcounty.com:en:elections:Voter-Information:Voter- Registration.html%22,.pdf",
            "TarrantCounty6df.pdf",
            "TarrantCounty7df.pdf",
            "TarrantCounty10df.pdf",
            "TarrantCounty9df.pdf",
            "TarrantCounty17df.pdf",
            "TarrantCounty15df.pdf",
            "TarrantCounty12df.pdf",
            "TarrantCounty14df.pdf",
            "tarrantcounty8df.pdf",
            "TarrantCounty18df.pdf",
            "TarrantCounty19df.pdf",
            "TarrantCounty21df.pdf",
            "tarrantcounty22df.pdf",
            "TarrantCounty20df.pdf",
            "tarrantcountydf.pdf"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [],
          "industries": [
            "Government"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Kailula4",
            "id": "131997",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4134,
            "hostname": 1607,
            "domain": 838,
            "FileHash-SHA256": 1078,
            "FileHash-SHA1": 2,
            "email": 3,
            "CIDR": 4,
            "FileHash-MD5": 15
          },
          "indicator_count": 7681,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 406,
          "modified_text": "1474 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6249afa504d9fb8ce09eb0df",
          "name": "\u5fc5\u535a\u4f53\u80b2-botnet",
          "description": "A-word-split-by-words, a-single-sigBytes, is an extension of the word-stringing system used by the BBC to create the words in the English language.",
          "modified": "2022-04-03T14:31:01.201000",
          "created": "2022-04-03T14:31:01.201000",
          "tags": [
            "object",
            "function",
            "kefuheader",
            "kefufooter",
            "scoremodal",
            "error404",
            "date",
            "mmdd hh",
            "chat",
            "aobject",
            "javascript",
            "please",
            "strong",
            "datav1e1730b8",
            "emoji",
            "helvetica",
            "arial",
            "datavce814536",
            "noto color",
            "apple color",
            "segoe ui",
            "datav5edb4000",
            "datav6d25583c",
            "promise",
            "error",
            "array",
            "name",
            "regexp",
            "uint8array",
            "string",
            "typeerror",
            "null",
            "this",
            "void",
            "internal",
            "patch",
            "target",
            "4096",
            "6144",
            "4112",
            "light",
            "dark",
            "generator",
            "infinity",
            "shutdown",
            "direct"
          ],
          "references": [
            "https://ejp3z5.com/h5/js/chunk-vendors.0903293f.js",
            "https://ejp3z5.com/h5/js/app.71cd3a66.js",
            "https://ejp3z5.com/h5/css/app.61c96454.css",
            "http://bibo113.com/",
            "https://ejp3z5.com/#/?business_id=66&access_key=3532E209E7051ED50C08BF7D92C3FC44"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 113,
            "URL": 665,
            "hostname": 145,
            "FileHash-SHA256": 40,
            "email": 1
          },
          "indicator_count": 964,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 68,
          "modified_text": "1477 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "62223e385f1cfc8916db66fb",
          "name": "Dominionvoting.com 03.03.22",
          "description": "",
          "modified": "2022-04-03T00:00:55.161000",
          "created": "2022-03-04T16:28:40.422000",
          "tags": [],
          "references": [
            "dominion voting1f",
            "dominion2",
            "dominion3",
            "dominion4",
            "dominion5"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Kailula4",
            "id": "131997",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 413,
            "URL": 2183,
            "FileHash-SHA256": 663,
            "hostname": 588,
            "FileHash-MD5": 7
          },
          "indicator_count": 3854,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 407,
          "modified_text": "1478 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "621fff12d2c54f70fea90576",
          "name": "Bexar.org",
          "description": "",
          "modified": "2022-04-01T00:01:54.852000",
          "created": "2022-03-02T23:34:42.531000",
          "tags": [],
          "references": [
            "www.bexar.org - urlscan.io.pdf",
            "bexar api 4.pdf",
            "bexar api 8.pdf",
            "bexar 6.pdf",
            "bexar api 2.pdf",
            "bexar api 7.pdf",
            "bexar api 3.pdf",
            "bexar api 9.pdf",
            "bexar api 12.pdf",
            "bexar api 17.pdf",
            "bexar api 15.pdf",
            "bexar api 18.pdf",
            "bexar api 10.pdf",
            "bexar api 19.pdf",
            "bexar api 20.pdf",
            "bexar api 13.pdf",
            "bexar api 21.pdf",
            "bexar api 14.pdf",
            "bexar api 22.pdf",
            "bexar1.pdf",
            "bexar api5.pdf",
            "bexar2.pdf",
            "bexar3.pdf",
            "bexar.org 3.2.22.pdf",
            "bexar6.pdf",
            "bexar5.pdf",
            "bexar api_1.pdf",
            "bexar10.pdf",
            "bexar api.pdf",
            "bexar_v1df.pdf",
            "bexarv4df.pdf",
            "bexarv2df.pdf",
            "bexarv6df.pdf",
            "bexasv3df.pdf",
            "bexarv7df.pdf",
            "bear_v apidf.pdf"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [],
          "industries": [
            "Government"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Kailula4",
            "id": "131997",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1833,
            "URL": 4669,
            "domain": 1025,
            "FileHash-SHA256": 1735,
            "email": 4,
            "FileHash-MD5": 133,
            "FileHash-SHA1": 6,
            "CIDR": 5
          },
          "indicator_count": 9410,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 407,
          "modified_text": "1480 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "621bc13f579cdd25d609b309",
          "name": "whitehouse.govapi_2.27.22",
          "description": "",
          "modified": "2022-03-29T00:03:34.773000",
          "created": "2022-02-27T18:21:51.099000",
          "tags": [
            "show",
            "download go",
            "full url",
            "reverse dns",
            "request",
            "windows nt",
            "win64",
            "khtml",
            "gecko",
            "response",
            "main",
            "accept",
            "february",
            "behaviour",
            "lookup go",
            "rescan add",
            "verdict report",
            "de summary",
            "http",
            "redirects links",
            "similar dom",
            "content api",
            "value",
            "search domain",
            "scan url",
            "search url",
            "meta",
            "detected",
            "akamaiasn1",
            "google",
            "expand overall",
            "page url",
            "iframe"
          ],
          "references": [
            "whitehouse.govapi_2.27.22.pdf",
            "whithouse.gov 2.27.22 4.pdf",
            "whitehouse.gov 2.27.22 2.pdf",
            "whitehouse.gov 2.27.22 1.pdf",
            "whitehouse.gov 2.27.22 6.pdf",
            "whitehouse.gov 2.27.22 3.pdf",
            "whitehouse.gov 2.27.22 5.pdf",
            "whitehouse.gov 2.28.22 8.pdf",
            "whitehouse.gov 2.27.22 7.pdf",
            "whitehouse.gov 2.27.22 8.pdf"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1199",
              "name": "Trusted Relationship",
              "display_name": "T1199 - Trusted Relationship"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Kailula4",
            "id": "131997",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1452,
            "hostname": 405,
            "domain": 306,
            "FileHash-SHA256": 489,
            "email": 1,
            "FileHash-MD5": 4
          },
          "indicator_count": 2657,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 408,
          "modified_text": "1483 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "61f749125efb5aa1fa9ed51f",
          "name": "twimg url pasted into otx - txt file from webpage save upload of URL",
          "description": "",
          "modified": "2022-01-31T21:24:46.365000",
          "created": "2022-01-31T02:27:30.574000",
          "tags": [
            "object",
            "erkp",
            "mwbm",
            "p1r1",
            "rqpi",
            "fpor",
            "inprogress",
            "h9ma",
            "date",
            "xhsv"
          ],
          "references": [
            "https://abs.twimg.com/responsive-web/client-web/bundle.Settings.de9a05f5.js",
            "https abs.twimg.com responsive-web:client-web:bundle.Settings.de9a05f5.js.txt"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "dorkingbeauty1",
            "id": "80137",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 6,
            "URL": 9,
            "domain": 20,
            "FileHash-SHA256": 1
          },
          "indicator_count": 36,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 392,
          "modified_text": "1539 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "tarrant23df.pdf",
        "https://tagassistant.google.com/ \u2022  https://www.google-analytics.com/debug/bootstrap?id=",
        "bexar 6.pdf",
        "cedevice.io  \u2022 decagonsoftware.com",
        "https://himado.com/heihei/layui/layui.all.js",
        "car hacking | phone hacking | remote access & system control of entire system",
        "https://gw.alipayobjects.com/os/lib/lozad/1.16.0/dist/lozad.min.js",
        "IDS Detections Win32/ZonaInstaller Install Beacon",
        "https://rules.quantcount.com/rules-p-zfNtLVVEHXE-1.js",
        "whithouse.gov 2.27.22 4.pdf",
        "https://pagead2.googlesyndication.com/pagead/managed/js/adsense/m202204200101/show_ads_impl_fy2019.js",
        "TarrantCounty4df.pdf",
        "http://appbyweb.net/AppByWeb/js/modernizr-2.6.2.min.js",
        "https://www.googletagmanager.com/gtag/js?id=AW-1070742489&l=dataLayer&cx=c",
        "xfe-URL-Cnzz.com-stix2-2.1-export.json",
        "https://www.googletagmanager.com/gtag/js?id=G-YFPNZBGTF3&l=dataLayer&cx=c",
        "https://youtu.be/ZKxvzrxDzt0",
        "bexar api 4.pdf",
        "http://appbyweb.net/AppByWeb/js/jquery.waypoints.min.js",
        "https://www.virustotal.com/gui/domain/hyundaitx.com/summary",
        "nlsSDK600.bundle.min.js",
        "https://brand2.centurylinktechnology.com",
        "xfe-URL-Aliyun.com-stix2-2.1-export.json",
        "apstag.js",
        "https://c.cnzz.com/core.php?web_id=1280305902&t=z",
        "https://www.hostrocket.com/js/jquery.cycle.all.js",
        "https://www.hostrocket.com/js/jquery-ui-1.8.13.custom.min.js",
        "bexar.org 3.2.22.pdf",
        "https://widget.wickedreports.com/v2/3469/wr-dafa9fae816c2f65d24d1eb593b58626.js",
        "https://www.googletagmanager.com/gtm.js?id=GTM-KW8B5L",
        "https://cdn.taboola.com/libtrc/unip/1331749/tfa.js",
        "File Type PEXE - PE32+ executable (console) x86-64, for MS Windows ..",
        "whitehouse.gov 2.27.22 8.pdf",
        "https://www.hotjar.com/persistUtmParams.js",
        "https://c0.wp.com/c/5.9.3/wp-includes/js/dist/vendor/regenerator-runtime.min.js",
        "tarrantcounty22df.pdf",
        "Containers-Pecorino.PalantirGov.com -pecorino.palantirgov.com",
        "https://js.callrail.com/group/0/7c8f964bc12313c75ad2/06ababf0-8852-4eef-95e1-285ae467a93a/poll.js?t=1651861793229&ids%5B%5D=431115301",
        "bexasv3df.pdf",
        "https://widget.trustpilot.com/trustboxes/5406e65db0d04a09e042d5fc/index.html?templateId=5406e65db0d04a09e042d5fc&businessunitId=4bdc496b000064000505a89d#locale=en-US&styleHeight=28px&styleWidth=100%25&theme=light",
        "bexar api 2.pdf",
        "https://www.hotjar.com/_next/static/chunks/webpack-ca4d94cab12a165a123f.js",
        "12.main.bundle.50be73a11d1d3745a5ee.js",
        "https://www.google.com/recaptcha/enterprise.js?&render=6LeY5wkeAAAAAHNlJZXiHgJrpCTsD-Qu0O2GlYgB",
        "https://stats.wp.com/e-202217.js",
        "https://connect.facebook.net/en_US/fbevents.js",
        "https://himado.com/cdn-cgi/challenge-platform/h/g/scripts/invisible.js?ts=1651842000",
        "xfe-URL-Alijk.com-stix2-2.1-export.json",
        "https://payvtylhwjxnr.xyz/Content/script?v=2",
        "TarrantCounty9df.pdf",
        "bexar api_1.pdf",
        "bexar api 21.pdf",
        "bexar api 18.pdf",
        "https://www.googletagmanager.com/gtm.js?id=GTM-MF25KRH",
        "http://appbyweb.net/AppByWeb/js/main.js",
        "https://m.bimbim.com/en/DailaGill?psid=crakmedia2&psprogram=revs&pstool=450_1&utm_campaign=main&utm_content=redirect&utm_medium=webmaster&utm_source=promotools",
        "https://www.gstatic.com/recaptcha/releases/1_E1Jb45wiBZrQd45oGZ-2cU/recaptcha__en.js",
        "https://www.hotjar.com/ensureSegmentId.js",
        "http://appbyweb.net/AppByWeb/js/jquery.min.js",
        "https://www.googletagmanager.com/gtag/js?id=UA-184179078-",
        "https://www.google-analytics.com/gtm/js?id=\\  \u2022 https://www.googletagmanager.com/gtag/js?id= \u2022",
        "whitehouse.gov 2.27.22 1.pdf",
        "http://1688.com/",
        "bexar api 3.pdf",
        "\u2018Lumen Technologies\u2019 Acting as administrator of a targeted Apple IOS device",
        "https://securepubads.g.doubleclick.net/gpt/pubads_impl_page_level_ads_2022050201.js",
        "https://insurancerateusa.com/94297995-69529ad7536f090aa776.js",
        "https://www.hushmail.com/javascriptinclude/eNpNzEEOQDAQQNEbtVoM7Sks7GXopB0pkQ5xfWJl-5P3JWGh4AvukSRzoKKtqlWlf0Wt4k3rnG2g641Pl6QNOU83zcIn-QMj6ZHpHQ2FF97jiHOmj0ED4FxfwQOf9yPU.en_US.68448bd8190f2f2bae9633f547bbbbbe.0.js",
        "TarrantCounty14df.pdf",
        "TarrantCounty19df.pdf",
        "https://fast.appcues.com/generic/main/4.35.3/appcues.main.e826b3c1f5ab15648ac446eafdbb489fd58d7f2d.js",
        "https://insurancerateusa.com/polyfill-036b4a134d8725752ba0.js",
        "https://js.callrail.com/group/0/7c8f964bc12313c75ad2/06ababf0-8852-4eef-95e1-285ae467a93a/poll.js?t=1651861725881&ids%5B%5D=431115301",
        "https://www.everestjs.net/static/le/last-event-tag-latest.min.js",
        "https://sc-static.net/scevent.min.js",
        "https://c0.wp.com/c/5.9.3/wp-includes/js/jquery/jquery.min.js",
        "https://secure.quantserve.com/quant.js",
        "https://hybrid-analysis.com/sample/5da0de230eb98e5598b152944d0e7e6b355485484052df6c7f1c747e2c5564c0/63ed708125f47738b45a6520",
        "whitehouse.govapi_2.27.22.pdf",
        "https://s3.amazonaws.com/ki.js/49559/ahy.js",
        "bexar5.pdf",
        "Yara Detections :compromised_site_redirector_fromcharcode Alerts network_icmp js_eval recon_fingerprint",
        "https://blackbook.drivably.com | blackboxpedals.com",
        "bexar api 7.pdf",
        "bexar2.pdf",
        "pornhub.com - contextualizing, malvertizing, tagging, apple password crack",
        "P34D56F9D-5684-4C83-8EE1-5EA7DE9CF45D.js",
        "appleid.com, apple.com, icloud.com",
        "T1622 - Debugger Evasion",
        "https://cdn.optimizely.com/datafiles/HgHVKrf9ZD2dsZYVFb9JnD.json/tag.js",
        "https://subscribe.free.fr/assets/js/main.min.js",
        "xfe-URL-https___c0.wp.com_-stix2-2.1-export.json",
        "https://quantcast.mgr.consensu.org/tcfv2/27/cmp2.js?referer=m",
        "xfe-URL-Hush.com-stix2-2.1-export.json",
        "https://www.hotjar.com/_next/static/chunks/pages/index-b7f010d5161cd8f6ddab.js",
        "entity%3Aip%20whois%3Ainfo%40anodicnetwork.com.html",
        "https://connect.facebook.net/en_US/sdk.js#xfbml=1&version=v4.0&appId=705930270206797&autoLogAppEvents=1 Akamai rank:",
        "https://www.gstatic.com/firebasejs/8.1.2/firebase-app.js",
        "https://pcup.gov.ph/375 pcup.gov.ph: | https://www.pcup.gov.ph/ pcup.gov.ph:",
        "bexar api 20.pdf",
        "Yare: compromised_site_redirector_fromcharcode",
        "Alerts: network_icmp nolookup_communication js_eval recon_fingerprint",
        "https://sb.scorecardresearch.com/p?ax_uuid=d247c6142f285bb0488533aa7f2d53c5&c1=9&c2=31864766&ns__t=1676508027511&ns_c=UTF-8&cv=3.1&c8=SecurityWeekly%20-%20Twitch&c7=https%3A%2F%2Fwww.twitch.tv%2Fsecurityweekly&c9=",
        "bexarv7df.pdf",
        "https://subscribe.free.fr/accesgratuit/index.html",
        "Tipped: A targets AI and other cyber research findings.",
        "https://ejp3z5.com/h5/js/chunk-vendors.0903293f.js",
        "https://cdn.callrail.com/companies/431115301/7c8f964bc12313c75ad2/12/swap.js",
        "https://cdn.segment.com/next-integrations/integrations/google-analytics/2.18.5/google-analytics.dynamic.js.gz",
        "https://hybrid-analysis.com/sample/235ae35db42acacf6bb9dbab1ca6392f67a60680275ec03f86866b7867db651f/65901471e396520cb3032621",
        "https://www.hostrocket.com/js/jquery.price_slider.js",
        "https://webmail.free.fr/program/js/app.min.js?s=1510166525",
        "http://bibo113.com/",
        "TarrantCounty15df.pdf",
        "xfe-URL-hostrocket.com-stix2-2.1-export 2.json",
        "xfe-IP-103.136.42.186-stix2-2.1-export.json",
        "This is why our team tells a back story. It can and does happen to anyone.",
        "https://l.clarity.ms/s/0.6.34/clarity.js",
        "http://appbyweb.net/AppByWeb",
        "http://www.pcup.gov.ph/images/pdf/Contract_of_SecurityServices2013.pdf pcup.gov.ph:",
        "elonmuskisafailure.com - tracker (yt3.ggpht.com tracker)",
        "bexarv6df.pdf",
        "https://i.bcicdn.com/js-min/1NCJjq/27984029c73362dbf9ec0727.js",
        "whitehouse.gov 2.27.22 6.pdf",
        "https://www.googletagmanager.com/gtag/js?id=UA-1837381-13",
        "\"<!DOCTYPE html PUBLIC \"-//W3C//DTD XHTML 1.0 Strict//EN\" \"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd\"> <html xmlns=\"http://www.w3.org/1999/xhtml\">   <head>     <title>           Page not found       </title>       <meta http-equiv=\"Content-type\" content=\"text/html; charset=utf-8\">     <meta http-equiv=\"Pragma\" content=\"no-cache\">     <meta http-equiv=\"Pragma\" content=\"no-store\">     <meta http-equiv=\"Expires\" content=\"-1\">     <meta name=\"keywords\" content=\"virustotal, antivirus, infected, free, sca",
        "https://static.addtoany.com/menu/page.js",
        "xfe-URL-himado.com-stix2-2.1-export.json",
        "https://www.hostrocket.com/contact-files/contact-form.js",
        "tarrantcounty8df.pdf",
        "dominion4",
        "https://www.googletagmanager.com/gtag/js?id=G-J9PCW0F6JV",
        "https://securepubads.g.doubleclick.net/tag/js/gpt.js",
        "pcup.gov.ph:",
        "xfe-IP-172.67.151.101-stix2-2.1-export.json",
        "7box.vip",
        "beacon.js",
        "https://subscribe.free.fr/assets/css/app2.min.css",
        "https://www.dwin1.com/13976.js",
        "https://ejp3z5.com/h5/css/app.61c96454.css",
        "https://www.googletagmanager.com/gtag/js?id=UA-122335014-2",
        "https://cdn.iubenda.com/cs/iubenda_Cs.js",
        "We apologize for so may typos and errors. We strive to do better at that.",
        "https://stats.g.doubleclick.net/j/collect\\ \u2022 https://tagassistant.google.com/ \u2022 https://www.google.com/ads/ga",
        "bexar3.pdf",
        "https://www.hostrocket.com/js/jquery.selectBox.min.js",
        "http://appbyweb.net/AppByWeb/js/superfish.js",
        "5.main.bundle.e92e5e24e074f9c2a52b.js",
        "https://www.googletagmanager.com/gtag/js?id=AW-1070742489",
        "https abs.twimg.com responsive-web:client-web:bundle.Settings.de9a05f5.js.txt",
        "bexar api 19.pdf",
        "T1218 - System Binary Proxy Execution",
        "https://www.hostrocket.com/css/style-nophone.css",
        "https://www.virustotal.com/en/file/undefined/analysis/",
        "https://contabo.com/client/client.a529db28.js",
        "whitehouse.gov 2.28.22 8.pdf",
        "https://sellix.io/cdn-cgi/bm/cv/669835187/api.js",
        "whitehouse.gov 2.27.22 2.pdf",
        "https://bongacams.com/GianaWatson",
        "dominion3",
        "https://static-cdn.jtvnw.net/jtv_user_pictures/6f4129f6-3750-4c02-b7c8-c88a05064129-profile_image-70x70.png",
        "whitehouse.gov 2.27.22 3.pdf",
        "https://www.googletagmanager.com/gtag/js?id=UA-185991747-1",
        "xfe-URL-insurancerateusa.com-stix2-2.1-export.json",
        "https://insurancerateusa.com/bfcc7b67-0b189ba6da3fc3ae8b88.js",
        "https://connect.facebook.net/signals/config/3689470801106673?v=2.9.57&r=stable",
        "0.main.bundle.a9d68f5204cd3ac257b6.js",
        "https://securepubads.g.doubleclick.net/gpt/pubads_impl_2022050201.js",
        "bexar10.pdf",
        "https://www.hushmail.com/shared/javascript/jquery-3.5.1.min.js",
        "https://brand.centurylinktechnology.com",
        "track.spywarewatchdog.org \u2022  https://track.spywarewatchdog.org - monitoring software",
        "https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LdNytsaAAAAANS6DW8pofQamH4toQAAgfF7Q8qW&co=aHR0cHM6Ly93d3cuYXBlaXJvbi5nbG9iYWw6NDQz&hl=en&v=2W_gRz39xX8G13fM-OdyQPlc&size=invisible&cb=ghnkw160kgfd",
        "https://cdn.onesignal.com/sdks/OneSignalSDK.js",
        "www.youtube.com/watch?v=GyuMozsVyYs -tracking Tsara Brashears' SongCulture Youtube",
        "https://partner.googleadservices.com/gampad/cookie.js?domain=appbyweb.net&callback=_gfp_s_&client=ca-pub-2581829468247892",
        "https://en.bongacams.com/popular-chat-popup?livetab=female&top_model=1&c=716918&hit_url=https%3A%2F%2Fbongacams.com%2Ftrack%3Fc%3D716918%26ps%3Dembed_chat&stream_only=1&amute=1&classic=on",
        "https://storage.googleapis.com/inflect-frontend-assets/adb460de2098568d4c3580de1fde2f6690bcbd04/_next/static/s0TytVz2d0zNgb~bjg~~D/pages/search.js",
        "https://static.addtoany.com/menu/sm.23.html#type=core&event=load&url=https%3A%2F%2Fwww.apeiron.global%2F&referrer=",
        "cf20ed53-cb6d-4dfd-a4e8-794fbe163efc.pcap",
        "https://www.google \u2022  https://ampcid.google.com/v1/publisher \u2022\u2019https://ampcid.google.com/v1/publisher:getClientId\\",
        "https://apis.google.com/_/scs/abc-static/_/js/k=gapi.lb.en.iTmf4rxOyWc.O/m=auth2/rt=j/sv=1/d=1/ed=1/rs=AHpOoo-LTnDn-AS2QlMWYZdnaV1OuFR7Iw/cb=gapi.loaded_0?le=scs",
        "bexar api 9.pdf",
        "https://hybrid-analysis.com/sample/a16d11910953b800369dbb667f178b3cc45cb8e3315217c0e6ceac68eeba206d",
        "Alerts: console_output has_pdb pe_unknown_resource_name",
        "bexar api 15.pdf",
        "v6s.js",
        "bexarv2df.pdf",
        "https://contabo.com/client/client-30e55c50.css",
        "TarrantCounty1df.pdf",
        "A \u2018Target\u2019 became a \u2018Target\u2019 vja close association to main Target of predatory retaliation campaign.",
        "TarrantCounty3df.pdf",
        "http://g.alicdn.com/assets-group/croco/0.0.8/index.js",
        "https://elegantcosmedampyeah.pages.dev/",
        "https://snap.licdn.com/li.lms-analytics/insight.min.js",
        "dominion5",
        "https://cdn.segment.com/next-integrations/integrations/vendor/commons.54701049fd6fb8497e9e.js.gz",
        "https://page.1688.com/shtml/static/wrongpage.html",
        "http://appbyweb.net/AppByWeb/js/jquery.easing.1.3.js",
        "TarrantCounty17df.pdf",
        "https://insurancerateusa.com/framework-19eddc0d879a49dfe606.js",
        "https://unpkg.com/@lottiefiles/lottie-player@1.5.7/dist/lottie-player.js",
        "bexarv4df.pdf",
        "https://www.hostrocket.com/js/jquery.tools.min.js",
        "https://g.alicdn.com/alilog/mlog/aplus_wap.js",
        "xfe-IP-212.27.63.109-stix2-2.1-export.json",
        "https://www.hotjar.com/_next/static/chunks/framework-6994461647f52f294af9.js",
        "nginx-php.7d4jelnf.trdlpbvl.sdp3.sdp.vic.gov.au",
        "http://i.alicdn.com/",
        "https://www.virustotal.com/gui/vt-ui-sw-installer.e0eb1a1e08d6512ba355.js/ Depreciated",
        "bexar api 22.pdf",
        "xfe-URL-appbyweb.net-stix2-2.1-export.json",
        "https://v2.zopim.com/bin/v/widget_v2.329.js",
        "tarrantcounty.com:en:elections:Voter-Information:Voter- Registration.html%22,.pdf",
        "http://polyfill.alicdn.com/",
        "https://www.googletagmanager.com/gtm.js?id=GTM-MDCVHGD",
        "xfe-IP-47.89.52.178-stix2-2.1-export.json",
        "xfe-URL-mind.1688.com-stix2-2.1-export.json",
        "TarantCounty2df.pdf",
        "xfe-URL-Psychz.net-stix2-2.1-export.json",
        "https://widget.wickedreports.com/widget.js",
        "https://cdn.segment.com/next-integrations/integrations/heap/2.1.2/heap.dynamic.js.gz",
        "https://sdk.privacy-center.org/87df2f8d-232a-4617-8efc-3764b3bbd0c0/loader.js?target=webmail.free.fr",
        "https://webmail.free.fr/",
        "bexar api 13.pdf",
        "https://ejp3z5.com/h5/js/app.71cd3a66.js",
        "bexar api.pdf",
        "https://hybrid-analysis.com/sample/b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b/",
        "bexar api 12.pdf",
        "https://fast.appcues.com/79878.js",
        "TarrantCounty20df.pdf",
        "bexar api5.pdf",
        "https://script.tapfiliate.com/tapfiliate.js",
        "https://himado.com/heihei/js/swiper.min.js",
        "14.main.bundle.91f9f7ff635e0b797de3.js",
        "https://www.hostrocket.com/js/jquery.behavior.js",
        "https://www.free.fr/freebox/",
        "UPX_OEP_place",
        "whitehouse.gov 2.27.22 5.pdf",
        "https://insurancerateusa.com/app-74647f151b541f3098c2.js",
        "https://insurancerateusa.com/3bea8d40-8926f4790c0b3689a361.js",
        "https://abs.twimg.com/responsive-web/client-web/bundle.Settings.de9a05f5.js",
        "https://mind.1688.com/wap/wapsy/dke4eosa0/index.html?no_cache=true&pageId=1150842&cms_id=1150842&src=desktop",
        "https://webmail.free.fr/program/js/jquery.min.js?s=1510166541",
        "https://files.appbyweb.net/Fonts/OpenSansHebrew/font.css",
        "https://sb.scorecardresearch.com/p?c1=2&c2=6745306&ns_type=hidden&ns_st_sv=5.1.3.160420&ns_st_smv=5.1&ns_st_it=r&ns_st_id=1676508021004&ns_st_ec=3&ns_st_sp=1&ns_st_sc=1&ns_st_sq=1&ns_st_ppc=1&ns_st_apc=1&ns_st_spc=1&ns_st_cn=1&ns_st_ev=hb&ns_st_po=1560430&ns_st_cl=0&ns_st_hc=31&ns_st_mp=js_api&ns_st_mv=5.1.3.160420&ns_st_pn=1&ns_st_tp=0&ns_st_ci=47976339133&ns_st_pt=1560430&ns_st_dpt=360423&ns_st_ipt=60010&ns_st_et=1560430&ns_st_det=360423&ns_st_upc=1560430&ns_st_dupc=360423&ns_st_iupc=60010&ns_st_upa=15604",
        "http://www.pcup.gov.ph/images/2018/pdf/ComEnBancReso/Commission_Resolution_07s2018.PDF",
        "http://is.alicdn.com/",
        "https://subscribe.free.fr/assets/js/vendor/modernizr.custom.js",
        "https://281cecd8ae73dff542e13679e60d5fb9.safeframe.googlesyndication.com/safeframe/1-0-38/html/container.html",
        "TarrantCounty5df.pdf",
        "http://watchhers.net/index.php - remote attacks",
        "webpack   buildin global.js",
        "https://www.google-analytics.com/debug/bootstrap?id=\\",
        "bexar api 10.pdf",
        "http://applevless.dns-dynamic.net/\t\u2022 dns-dynamic.net",
        "Russia or Muskware? URL http://store.7box.vip/ad/C467F60A1AD6.Jpeg",
        "http://appbyweb.net/AppByWeb/js/jquery.stellar.min.js",
        "bexar api 17.pdf",
        "https://www.iubenda.com/cookie-solution/confs/js/33942990.js",
        "https://mobile-pocket-guide.centurylinktechnology.com",
        "https://insurancerateusa.com/webpack-runtime-f014a3267add02a94afb.js",
        "https://www.hushmail.com/javascriptinclude/eNrLKC3OyE3MzIkvT00qzixJtSpITE_V98lPz8xzyy_K1csqtjI0MzK2MDcwsbS0ysCq2qkov7w4tSi4JLGkGFUDAF_tIM0,.en_US.68448bd8190f2f2bae9633f547bbbbbe.0.js",
        "https://www.googletagmanager.com/gtag/js?id=\\ \u2022 https://www.google-analytics.com/gtm/js?id=",
        "xfe-IP-104.21.72.150-stix2-2.1-export.json",
        "xfe-URL-inflect.com-stix2-2.1-export.json",
        "https://payvtylhwjxnr.xyz/Content/style?v=1",
        "bexar6.pdf",
        "https://feedback.ptv.vic.gov.au/360",
        "https://g.alicdn.com/secdev/sufei_data/3.9.9/index.js",
        "http://appbyweb.net/AppByWeb/js/bootstrap.min.js",
        "dominion2",
        "https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-2581829468247892&output=html&adk=1812271804&adf=3025194257&lmt=1651149220&plat=16%3A8388608%2C17%3A32%2C24%3A32%2C25%3A32%2C32%3A32&format=0x0&url=http%3A%2F%2Fappbyweb.net%2FAppByWeb%2F&ea=0&pra=5&wgl=1&dt=1651149220376&bpp=1&bdt=121&idt=18&shv=r20220425&mjsv=m202204200101&ptt=9&saldr=aa&abxe=1&cookie=ID%3De83d6067a4dac5b6-229192c549d200d1%3AT%3D1651148802%3ART%3D1651148802%3AS%3DALNI_MZSt9utXhYBHAIH9xwQp72WuxQxTw&nras=1&correlator=1655793633284&",
        "https://s4.cnzz.com/z_stat.php?id=1280305902&web_id=1280305902",
        "142.250.74.142.250.74.138 _exploit_source | 142.250.74.138 _exploit_source | 142.250.74.142_exploit_source",
        "TarrantCounty21df.pdf",
        "Tesla Hackers  | https://www.teslarati.com/spacex",
        "https://www.hotjar.com/_next/static/chunks/pages/_app-be5fbad980fd377922f7.js",
        "https://subscribe.free.fr/assets/js/plugins.min.js",
        "https://subscribe.free.fr/assets/js/vendor/wow.min.js",
        "https://staticx1.dditscdn.com/mbl/frontend_backbone/static/_common/modular-member-client/script/maincontext_9af26.min.js",
        "https://c0.wp.com/p/jetpack/10.7/_inc/build/photon/photon.min.js",
        "https://subscribe.free.fr/assets/js/vendor/jquery-1.9.1.min.js",
        "xfe-IP-146.148.236.187-stix2-2.1-export.json",
        "SlotBuilder.ts",
        "https://unpkg.com/@optimizely/optimizely-sdk@3.5.0/dist/optimizely.browser.umd.min.js",
        "https://quantcast.mgr.consensu.org/tcfv2/27/cmp2.js?referer=mathworks.com",
        "https://connect.facebook.net/signals/config/534474930374151?v=2.9.57&r=stable",
        "https://www.hushmail.com/status/",
        "https://img03.en25.com/i/elqCfg.min.js",
        "https://www.hostrocket.com/js/jquery-1.6.1.min.js",
        "https://cdn.segment.com/next-integrations/integrations/appcues/2.3.0/appcues.dynamic.js.gz",
        "https://mind.1688.com/zsh/zsh/d9my57ugj/index.html",
        "https://static.selfpuc.com/mnpw3.js",
        "https://www.virustotal.com/gui/url/105e81bb8b366deb8e6b8849a7c61ebcff181fbc2e48347f5476d9e42b361b37/community",
        "nginx-php.standby.content-premier-vic-gov-au.sdp3.sdp.vic.gov.au",
        "http://appbyweb.net/AppByWeb/js/hoverIntent.js",
        "https://palapa.c.id\t (c.id)",
        "command_and_control 195.208.1.128 | 206.46.232.39",
        "https://www.hostrocket.com/js/jquery.cookie.js",
        "dominion voting1f",
        "https://cdn.cookielaw.org/scripttemplates/6.5.0/otBannerSdk.js",
        "drvtrd-widget.netlify.app/drivably-widget.js | drvtrd-widget.netlify.app/drivably.js | http://drvtrd-widget.netlify.app/drivably-widget.js",
        "HyunDAITX.COM | Remote CnC of vehicle systems, connected devices. Critical",
        "TarrantCounty6df.pdf",
        "https://www.ptv.vic.gov.au/more/travelling-on-the-network/lets-go/",
        "https://www.clarity.ms/tag/uet/5739677",
        "bear_v apidf.pdf",
        "https://payvtylhwjxnr.xyz/Content/css/banks.css",
        "analytics.js",
        "bexar api 8.pdf",
        "bexar api 14.pdf",
        "https://www.hostrocket.com/css/style.css",
        "https://www.virustotal.com/gui/main.900e36f7a852b9863014.js",
        "https://ejp3z5.com/#/?business_id=66&access_key=3532E209E7051ED50C08BF7D92C3FC44",
        "https://c0.wp.com/c/5.9.3/wp-includes/js/jquery/jquery-migrate.min.js",
        "https://www.gstatic.com/recaptcha/releases/2W_gRz39xX8G13fM-OdyQPlc/recaptcha__en.js",
        "Creates a process in suspended mode (likely for process injection",
        "https://subscribe.free.fr/assets/css/accesgratuit.min.css",
        "webcomponent-polyfill.js",
        "ASP. NET",
        "https://bcprm.com/promo.php?c=716918&type=embed_chat&page=popular_chat&top_model=1&stream_only_size=full",
        "https://cdn.heapanalytics.com/js/heap-2001511295.js",
        "bexar1.pdf",
        "xfe-URL-payvtylhwjxnr.xyz-stix2-2.1-export.json",
        "https://webmail.free.fr/plugins/jqueryui/js/jquery-ui.min.js?s=1510166524",
        "https://www.virustotal.com/gui/url/87327571bc18df63df91ba61da25389eb32563074ccd640e2b15b2d38cf5b968/summary",
        "https://www.hostrocket.com/js/jquery.colorbox-min.js",
        "https://cdn.heapanalytics.com/js/heap-3501642718.js",
        "https://static.hotjar.com/c/hotjar-2086874.js?sv=6",
        "https://cdn.ampproject.org/rtv/012204221712000/amp4ads-host-v0.js",
        "https://hybrid-analysis.com/sample/78a7e765ffd6dff7af3b92b6234271fd0dddf5945f38e70d0e22324c1ec06eca/64414afe0ebb5831a20ce8f0",
        "simple investigation shows Brashears historical family vehicles listed.",
        "https://himado.com/heihei/node_modules/mdui/dist/js/mdui.min.js",
        "https://www.hostrocket.com/css/colorbox.css",
        "TarrantCounty10df.pdf",
        "whitehouse.gov 2.27.22 7.pdf",
        "https://prod.centurylinktechnology.com",
        "TarrantCounty12df.pdf",
        "bexar_v1df.pdf",
        "www.bexar.org - urlscan.io.pdf",
        "http://pageperso.free.fr/im/css/free.css",
        "xfe-URL-1688.com-stix2-2.1-export.json",
        "https://sdk.privacy-center.org/ui-gdpr-en.a96c69ed0cb8f37a2deea6c49dd453517875ac60.js",
        "inst.govelopscold.com",
        "http://passback.free.fr/pub/pp_300x250.html",
        "https://widget.trustpilot.com/bootstrap/v5/tp.widget.bootstrap.min.js",
        "https://d31qbv1cthcecs.cloudfront.net/atrk.js",
        "https://widget.intercom.io/widget/j3kafOpd",
        "TarrantCounty18df.pdf",
        "tarrantcountydf.pdf",
        "https://www.googletagmanager.com/gtag/js?id=G-C3W7T6H5QW&l=dataLayer&cx=c",
        "TarrantCounty7df.pdf"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": []
        },
        "other": {
          "adversary": [
            "Tesla Hackers"
          ],
          "malware_families": [
            "Bufferwriter",
            "Tvb",
            "Trcomponent",
            "Hammer",
            "Backdoor:win32/tofsee.t",
            "Okcancel",
            "Requestbuilder",
            "Alf:jasyp:trojan:win32/ircbot!atmn",
            "Vob",
            "Pws:win32/axespec.a",
            "Worm:win32/lightmoon.h",
            "Slotbuilder",
            "Xu",
            "Lh",
            "Trojan.tofsee/botx",
            "Reduceright",
            "Vd",
            "Gc",
            "Win.trojan.12382640-1",
            "Bufferreader"
          ],
          "industries": [
            "Government"
          ]
        }
      }
    },
    "false_positive": []
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 45,
  "pulses": [
    {
      "id": "69b7ac3b32ac89ecba53f3d9",
      "name": "Malicious",
      "description": "",
      "modified": "2026-04-15T08:44:52.171000",
      "created": "2026-03-16T07:07:39.495000",
      "tags": [
        "march",
        "input http",
        "posix shell",
        "ascii text",
        "threat level",
        "summary av",
        "detection",
        "environment",
        "action"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 291,
        "URL": 272,
        "hostname": 296,
        "domain": 293,
        "FileHash-MD5": 90,
        "FileHash-SHA1": 89,
        "CIDR": 3,
        "email": 3,
        "SSLCertFingerprint": 9
      },
      "indicator_count": 1346,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 49,
      "modified_text": "5 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "697cdce9ec418c422eee2054",
      "name": "Device Isolation: Lumen Technologies | Palantir and \u2018Boots on the Ground Operations\u2019",
      "description": "Device Isolation: Lumen Technologies (formerly CenturyLink) deployed as an admin on iOS devices. Standard factory resets may prove ineffective. Complete hardware \"air-gap\" or clean devices that have never touched your home network may be best option for deeply monitored targets.\n\nSummary of the Campaign:\nThe involvement of Lumen Technologies (as an unwanted admin), Foundry (Palantir) for data mapping, and Mirai Botnet for network disruption represents a \"scorched earth\" approach to digital destruction. Target treated  as a criminal through Cellebrite, implicates specific attackers attempted to legalize what was actually a predatory stalking campaign/s.\n\n\nSurveillance Overlap: The use of  Lumen Technologies and Palantir, tools allows for real-time tracking of a target's physical location\u2014explains how \u2018boots on the ground\u2019 offenders can stalk , surveillance , confront, assault  and engage in various damaging attacks of specific monitored targets.",
      "modified": "2026-03-01T16:05:57.375000",
      "created": "2026-01-30T16:31:37.011000",
      "tags": [
        "url https",
        "url http",
        "tlsv1",
        "whitelisted",
        "united",
        "read c",
        "as15169",
        "stcalifornia",
        "execution",
        "dock",
        "write",
        "persistence",
        "malware",
        "encrypt",
        "active",
        "lumen technologies",
        "number",
        "error",
        "regexp",
        "sxa0",
        "amptoken",
        "optout",
        "retrieving",
        "notfound",
        "unknown",
        "form",
        "flash",
        "backdoor",
        "writeconsolew",
        "yara detections",
        "command line",
        "pdb path",
        "pe resource",
        "internalname",
        "windows command",
        "A",
        "aws",
        "name servers",
        "url analysis",
        "passive dns",
        "urls",
        "data upload",
        "extraction",
        "palantir",
        "c2",
        "aerospace",
        "tracking",
        "spywatchdog",
        "palapa-c2",
        "communications satellite",
        "amazon",
        "hughesnet",
        "icmp traffic",
        "washington c",
        "washington ou",
        "mopr",
        "mon jul",
        "local",
        "dynamic",
        "apple",
        "network",
        "t1057",
        "discovery",
        "t1069",
        "t1071",
        "protocol",
        "t1105",
        "tool transfer",
        "t1480",
        "guardrails",
        "t1566",
        "present jan",
        "unknown ns",
        "ip address",
        "dnssec",
        "domain",
        "dynamic dns",
        "government",
        "pcup",
        "germany unknown",
        "link",
        "dns hosting",
        "cloudns",
        "cloud dns",
        "a domains",
        "ipv4 add",
        "title",
        "meta",
        "class",
        "servers",
        "present aug",
        "aaaa",
        "present sep",
        "present nov",
        "present jul",
        "present may",
        "moved",
        "canada unknown",
        "begin",
        "record value",
        "gmt content",
        "type",
        "hostname add",
        "files",
        "ascii text",
        "pattern match",
        "href",
        "mitre att",
        "ck id",
        "ck matrix",
        "network traffic",
        "et info",
        "general",
        "path",
        "click",
        "learn",
        "command",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "input url",
        "defense evasion",
        "france",
        "ireland",
        "netherlands",
        "denmark",
        "united kingdom",
        "type indicator",
        "role title",
        "added active",
        "savvis",
        "centurylinktechnology",
        "hybrid analysis",
        "monitoring tools",
        "monitored target",
        "triangulation",
        "worm",
        "intel",
        "ms windows",
        "pe32",
        "write c",
        "delete c",
        "show",
        "russia as47764",
        "unix",
        "lsan jose",
        "odigicert inc",
        "markus",
        "url add",
        "http",
        "related nids",
        "files location",
        "russia flag",
        "russia hostname",
        "russia",
        "russia unknown",
        "hosting",
        "federation flag",
        "body",
        "gmt vary",
        "accept encoding",
        "gmt cache",
        "certificate",
        "pulse submit",
        "unknown aaaa",
        "search",
        "entries",
        "script domains",
        "script urls",
        "pdx cf"
      ],
      "references": [
        "\u2018Lumen Technologies\u2019 Acting as administrator of a targeted Apple IOS device",
        "Yare: compromised_site_redirector_fromcharcode",
        "Alerts: network_icmp nolookup_communication js_eval recon_fingerprint",
        "Alerts: console_output has_pdb pe_unknown_resource_name",
        "File Type PEXE - PE32+ executable (console) x86-64, for MS Windows ..",
        "Tipped: A targets AI and other cyber research findings.",
        "A \u2018Target\u2019 became a \u2018Target\u2019 vja close association to main Target of predatory retaliation campaign.",
        "track.spywarewatchdog.org \u2022  https://track.spywarewatchdog.org - monitoring software",
        "https://palapa.c.id\t (c.id)",
        "Containers-Pecorino.PalantirGov.com -pecorino.palantirgov.com",
        "cedevice.io  \u2022 decagonsoftware.com",
        "http://applevless.dns-dynamic.net/\t\u2022 dns-dynamic.net",
        "http://www.pcup.gov.ph/images/2018/pdf/ComEnBancReso/Commission_Resolution_07s2018.PDF",
        "pcup.gov.ph:",
        "http://www.pcup.gov.ph/images/pdf/Contract_of_SecurityServices2013.pdf pcup.gov.ph:",
        "https://pcup.gov.ph/375 pcup.gov.ph: | https://www.pcup.gov.ph/ pcup.gov.ph:",
        "https://elegantcosmedampyeah.pages.dev/",
        "https://www.ptv.vic.gov.au/more/travelling-on-the-network/lets-go/",
        "inst.govelopscold.com",
        "https://feedback.ptv.vic.gov.au/360",
        "nginx-php.7d4jelnf.trdlpbvl.sdp3.sdp.vic.gov.au",
        "nginx-php.standby.content-premier-vic-gov-au.sdp3.sdp.vic.gov.au",
        "https://hybrid-analysis.com/sample/a16d11910953b800369dbb667f178b3cc45cb8e3315217c0e6ceac68eeba206d",
        "https://brand.centurylinktechnology.com",
        "https://prod.centurylinktechnology.com",
        "https://brand2.centurylinktechnology.com",
        "https://mobile-pocket-guide.centurylinktechnology.com",
        "UPX_OEP_place",
        "Russia or Muskware? URL http://store.7box.vip/ad/C467F60A1AD6.Jpeg",
        "ASP. NET",
        "https://connect.facebook.net/en_US/sdk.js#xfbml=1&version=v4.0&appId=705930270206797&autoLogAppEvents=1 Akamai rank:",
        "7box.vip"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Trojan.Tofsee/Botx",
          "display_name": "Trojan.Tofsee/Botx",
          "target": null
        },
        {
          "id": "ALF:JASYP:Trojan:Win32/IRCbot!atmn",
          "display_name": "ALF:JASYP:Trojan:Win32/IRCbot!atmn",
          "target": null
        },
        {
          "id": "PWS:Win32/Axespec.A",
          "display_name": "PWS:Win32/Axespec.A",
          "target": "/malware/PWS:Win32/Axespec.A"
        },
        {
          "id": "Worm:Win32/Lightmoon.H",
          "display_name": "Worm:Win32/Lightmoon.H",
          "target": "/malware/Worm:Win32/Lightmoon.H"
        }
      ],
      "attack_ids": [
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "TA0003",
          "name": "Persistence",
          "display_name": "TA0003 - Persistence"
        },
        {
          "id": "T1147",
          "name": "Hidden Users",
          "display_name": "T1147 - Hidden Users"
        },
        {
          "id": "T1041",
          "name": "Exfiltration Over C2 Channel",
          "display_name": "T1041 - Exfiltration Over C2 Channel"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1439",
          "name": "Eavesdrop on Insecure Network Communication",
          "display_name": "T1439 - Eavesdrop on Insecure Network Communication"
        },
        {
          "id": "T1410",
          "name": "Network Traffic Capture or Redirection",
          "display_name": "T1410 - Network Traffic Capture or Redirection"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1155",
          "name": "AppleScript",
          "display_name": "T1155 - AppleScript"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1557",
          "name": "Man-in-the-Middle",
          "display_name": "T1557 - Man-in-the-Middle"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1132",
          "name": "Data Encoding",
          "display_name": "T1132 - Data Encoding"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1573",
          "name": "Encrypted Channel",
          "display_name": "T1573 - Encrypted Channel"
        },
        {
          "id": "T1078.004",
          "name": "Cloud Accounts",
          "display_name": "T1078.004 - Cloud Accounts"
        },
        {
          "id": "T1069.003",
          "name": "Cloud Groups",
          "display_name": "T1069.003 - Cloud Groups"
        },
        {
          "id": "T1562.001",
          "name": "Disable or Modify Tools",
          "display_name": "T1562.001 - Disable or Modify Tools"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 102,
        "FileHash-SHA1": 59,
        "FileHash-SHA256": 1929,
        "domain": 854,
        "hostname": 2156,
        "URL": 4475,
        "SSLCertFingerprint": 9,
        "email": 7,
        "CVE": 1
      },
      "indicator_count": 9592,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "49 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "693b7dc3cf1996347652ef92",
      "name": "Google Site Redirector - Tesla Hackers",
      "description": "Silencing. By Tesla hackers. Awful example of how any victim of a crime; can become a target of the government..\nThis is especially true when the actual perpetrators work for the government are government affiliated, very wealthy, a celebrity or someone who is deemed important. In this instance the Quasi government sought to keep target seeking and obtaining life saving medical treatment, financial settlement that she was entitled to from assault, injuries from assault, false imprisonment, punitive damgages, pain and suffering, humiliation, premise liability, permanent (whole body disability @MMI ), many other crimes. The victims suffered from a great sadness and betrayal. \n\nObviously racist Elon Musk and crew have access to all government tools. Musk, All things cyber are at his disposal as \ncontinues to abuse privilege.\n They keep  playing a God  they  don\u2019t believe in. God is the Ultimate Avenger.",
      "modified": "2026-01-11T00:03:08.581000",
      "created": "2025-12-12T02:28:19.107000",
      "tags": [
        "compromised_site_redirector_fromcharcode",
        "site_redirector",
        "string",
        "regexp",
        "error",
        "number",
        "sxa0",
        "amptoken",
        "optout",
        "retrieving",
        "notfound",
        "write",
        "form",
        "flash",
        "vd",
        "tesla hackers",
        "nxdomain",
        "passive dns",
        "ip address",
        "domain",
        "a nxdomain",
        "urls",
        "files",
        "ip related",
        "pulses otx",
        "google",
        "unknown",
        "oracle",
        "dynamicloader",
        "medium",
        "high",
        "windows",
        "rndhex",
        "write c",
        "rndchar",
        "displayname",
        "tofsee",
        "yara rule",
        "stream",
        "strings",
        "push",
        "lte all",
        "search otx",
        "ource url",
        "or text",
        "paste",
        "data upload",
        "extraction",
        "elon musk",
        "indicator role",
        "active related",
        "ipv4",
        "exploitsource",
        "url https",
        "url http",
        "desktopinternet",
        "title added",
        "pulses ipv4",
        "less see",
        "ids detections",
        "vuze bt",
        "udp connection",
        "contacted",
        "filehash",
        "av detections",
        "yara detections",
        "alerts",
        "0x8aa42",
        "0xe3107",
        "upnp",
        "http request",
        "bittorrent",
        "file",
        "module load",
        "t1129",
        "post http",
        "install",
        "execution",
        "malware",
        "hostile",
        "crawl",
        "windows nt",
        "wow64",
        "get zona",
        "get httpget",
        "hash",
        "entries",
        "read c",
        "suspicious",
        "next",
        "united"
      ],
      "references": [
        "Tesla Hackers  | https://www.teslarati.com/spacex",
        "Yara Detections :compromised_site_redirector_fromcharcode Alerts network_icmp js_eval recon_fingerprint",
        "142.250.74.142.250.74.138 _exploit_source | 142.250.74.138 _exploit_source | 142.250.74.142_exploit_source",
        "IDS Detections Win32/ZonaInstaller Install Beacon",
        "https://www.google \u2022  https://ampcid.google.com/v1/publisher \u2022\u2019https://ampcid.google.com/v1/publisher:getClientId\\",
        "https://tagassistant.google.com/ \u2022  https://www.google-analytics.com/debug/bootstrap?id=",
        "https://www.google-analytics.com/debug/bootstrap?id=\\",
        "https://stats.g.doubleclick.net/j/collect\\ \u2022 https://tagassistant.google.com/ \u2022 https://www.google.com/ads/ga",
        "https://www.google-analytics.com/gtm/js?id=\\  \u2022 https://www.googletagmanager.com/gtag/js?id= \u2022",
        "https://www.googletagmanager.com/gtag/js?id=\\ \u2022 https://www.google-analytics.com/gtm/js?id=",
        "This is why our team tells a back story. It can and does happen to anyone.",
        "We apologize for so may typos and errors. We strive to do better at that."
      ],
      "public": 1,
      "adversary": "Tesla Hackers",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Vd",
          "display_name": "Vd",
          "target": null
        },
        {
          "id": "Backdoor:Win32/Tofsee.T",
          "display_name": "Backdoor:Win32/Tofsee.T",
          "target": "/malware/Backdoor:Win32/Tofsee.T"
        },
        {
          "id": "Win.Trojan.12382640-1",
          "display_name": "Win.Trojan.12382640-1",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1023",
          "name": "Shortcut Modification",
          "display_name": "T1023 - Shortcut Modification"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1047",
          "name": "Windows Management Instrumentation",
          "display_name": "T1047 - Windows Management Instrumentation"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 4,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 65,
        "FileHash-SHA1": 34,
        "FileHash-SHA256": 2032,
        "URL": 4921,
        "domain": 567,
        "hostname": 1586,
        "SSLCertFingerprint": 4
      },
      "indicator_count": 9209,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "99 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "663d2869e0f3a42bbddc42ff",
      "name": "UPX executable packer.",
      "description": "A new rule has been introduced  a \"suspicious\" ELF binary that is packed with the UPX executable packer.\nSuggested ATT&CK IDs: rule SUSP_ELF_LNX_UPX_Compressed_File { meta: description = \"Detects a suspicious ELF binary with UPX compression\" author = \"Florian Roth (Nextron Systems)\" reference = \"Internal Research\" date = \"2018-12-12\" score = 40 hash1 = \"038ff8b2fef16f8ee9d70e6c219c5f380afe1a21761791e8cbda21fa4d09fdb4\" id = \"078937de-59b3-538e-a5c3-57f4e6050212\" strings: $s1 = \"PROT_EXEC|PROT_WRITE failed.\" fullword ascii $s2 = \"$Id: UPX\" fullword ascii $s3 = \"$Info: This file is packed with the UPX executable packer\" ascii $fp1 = \"check your UCL installation !\"",
      "modified": "2024-10-14T00:01:17.069000",
      "created": "2024-05-09T19:47:53.786000",
      "tags": [
        "cioch adrian",
        "centrum usug",
        "sieciowych",
        "elf binary",
        "upx compression",
        "roth",
        "nextron",
        "info",
        "javascript",
        "html",
        "office open",
        "xml document",
        "network capture",
        "win32 exe",
        "xml pakietu",
        "pdf zestawy",
        "przechwytywanie",
        "office",
        "filehashsha1",
        "url https",
        "cve cve20201070",
        "cve cve20203153",
        "cve cve20201048",
        "cve cve20211732",
        "cve20201048 apr",
        "filehashmd5",
        "cve cve20010901",
        "cve cve20021841",
        "cve20153202 apr",
        "cve cve20160728",
        "cve cve20161807",
        "cve cve20175123",
        "cve20185407 apr",
        "cve cve20054605",
        "cve cve20060745",
        "cve cve20070452",
        "cve cve20070453",
        "cve cve20070454",
        "cve cve20071355",
        "cve cve20071358",
        "cve cve20071871",
        "cve20149614 apr",
        "cve cve20151503",
        "cve cve20152080",
        "cve cve20157377",
        "cve cve20170131",
        "cve20200796 may",
        "cve cve20113403"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 6861,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Arek-BTC",
        "id": "212764",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 5771,
        "domain": 3139,
        "URL": 14525,
        "FileHash-SHA1": 2610,
        "IPv4": 108,
        "CIDR": 40,
        "FileHash-SHA256": 10705,
        "FileHash-MD5": 3373,
        "YARA": 2,
        "CVE": 148,
        "Mutex": 7,
        "FilePath": 3,
        "SSLCertFingerprint": 3,
        "email": 23,
        "JA3": 1,
        "IPv6": 2
      },
      "indicator_count": 40460,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 137,
      "modified_text": "553 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "6590412931fa8523e305795e",
      "name": "System Owner/User Discovery | Automobile CnC | HyunDAITX.COM",
      "description": "",
      "modified": "2024-01-29T15:00:34.177000",
      "created": "2023-12-30T16:11:21.071000",
      "tags": [
        "remote cnc",
        "no expiration",
        "filehashsha256",
        "domain",
        "filehashsha1",
        "filehashmd5",
        "expiration",
        "iocs",
        "hostname",
        "ipv4",
        "scan endpoints",
        "next",
        "url http",
        "url https",
        "apple",
        "appleid",
        "icloud",
        "tsara brashears",
        "all octoseek",
        "create new",
        "pulse use",
        "pdf report",
        "debugger evasion",
        "evasive",
        "who's driving",
        "yaaa",
        "xobo",
        "writes data to a remote process",
        "widget",
        "win64",
        "waaa",
        "vt report",
        "ttl value",
        "uaaa",
        "united",
        "unknown",
        "urls url",
        "stealthyness",
        "critical",
        "accept",
        "address",
        "admin country",
        "baaa",
        "anti-detection",
        "as11042",
        "network ascii text",
        "network",
        "back",
        "black",
        "body length",
        "attack",
        "boolean",
        "silly",
        "bundled",
        "caaa",
        "caca",
        "caca4baaa",
        "cacf",
        "caea",
        "click",
        "close",
        "cobalt strike",
        "checkbox",
        "ck id",
        "ck matrix",
        "contacted",
        "copy",
        "creation date",
        "code",
        "comcast tmobile",
        "communicating",
        "contact",
        "historical ssl",
        "csc corporate",
        "date",
        "desktop",
        "dns replication",
        "domain related",
        "domains dropped",
        "elf wgetboat",
        "error",
        "execution",
        "factory",
        "false",
        "files",
        "final",
        "url",
        "first",
        "general",
        "getprocaddress",
        "green",
        "group",
        "headers",
        "hr rtd",
        "http response",
        "hybrid",
        "iana id",
        "id",
        "apple id",
        "import",
        "infor",
        "installation",
        "january",
        "kb body",
        "loader",
        "localappdata",
        "love",
        "major",
        "malicious",
        "metro",
        "mitre att",
        "model",
        "netlify",
        "netlify edge",
        "next",
        "trim",
        "null",
        "threat roundup",
        "tech email",
        "subdomains",
        "status code",
        "ssl certificate",
        "show technique span",
        "sha256",
        "serving ip",
        "open",
        "server",
        "override",
        "path",
        "pattern match",
        "payment",
        "pe resource",
        "persistence",
        "phonenumber",
        "record type",
        "referrer",
        "registrar abuse",
        "rust",
        "search"
      ],
      "references": [
        "HyunDAITX.COM | Remote CnC of vehicle systems, connected devices. Critical",
        "https://www.virustotal.com/gui/domain/hyundaitx.com/summary",
        "https://hybrid-analysis.com/sample/235ae35db42acacf6bb9dbab1ca6392f67a60680275ec03f86866b7867db651f/65901471e396520cb3032621",
        "command_and_control 195.208.1.128 | 206.46.232.39",
        "drvtrd-widget.netlify.app/drivably-widget.js | drvtrd-widget.netlify.app/drivably.js | http://drvtrd-widget.netlify.app/drivably-widget.js",
        "https://www.virustotal.com/gui/url/87327571bc18df63df91ba61da25389eb32563074ccd640e2b15b2d38cf5b968/summary",
        "https://hybrid-analysis.com/sample/235ae35db42acacf6bb9dbab1ca6392f67a60680275ec03f86866b7867db651f/65901471e396520cb3032621",
        "appleid.com, apple.com, icloud.com",
        "https://blackbook.drivably.com | blackboxpedals.com",
        "car hacking | phone hacking | remote access & system control of entire system",
        "http://watchhers.net/index.php - remote attacks",
        "https://www.virustotal.com/gui/url/105e81bb8b366deb8e6b8849a7c61ebcff181fbc2e48347f5476d9e42b361b37/community",
        "pornhub.com - contextualizing, malvertizing, tagging, apple password crack",
        "https://www.virustotal.com/gui/url/105e81bb8b366deb8e6b8849a7c61ebcff181fbc2e48347f5476d9e42b361b37/community",
        "simple investigation shows Brashears historical family vehicles listed.",
        "elonmuskisafailure.com - tracker (yt3.ggpht.com tracker)",
        "www.youtube.com/watch?v=GyuMozsVyYs -tracking Tsara Brashears' SongCulture Youtube",
        "T1622 - Debugger Evasion",
        "T1218 - System Binary Proxy Execution",
        "Creates a process in suspended mode (likely for process injection"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1546",
          "name": "Event Triggered Execution",
          "display_name": "T1546 - Event Triggered Execution"
        },
        {
          "id": "T1518",
          "name": "Software Discovery",
          "display_name": "T1518 - Software Discovery"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1218",
          "name": "Signed Binary Proxy Execution",
          "display_name": "T1218 - Signed Binary Proxy Execution"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1114.002",
          "name": "Remote Email Collection",
          "display_name": "T1114.002 - Remote Email Collection"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1408",
          "name": "Disguise Root/Jailbreak Indicators",
          "display_name": "T1408 - Disguise Root/Jailbreak Indicators"
        },
        {
          "id": "T1428",
          "name": "Exploit Enterprise Resources",
          "display_name": "T1428 - Exploit Enterprise Resources"
        },
        {
          "id": "T1422",
          "name": "System Network Configuration Discovery",
          "display_name": "T1422 - System Network Configuration Discovery"
        },
        {
          "id": "T1421",
          "name": "System Network Connections Discovery",
          "display_name": "T1421 - System Network Connections Discovery"
        },
        {
          "id": "T1427",
          "name": "Attack PC via USB Connection",
          "display_name": "T1427 - Attack PC via USB Connection"
        },
        {
          "id": "T1429",
          "name": "Capture Audio",
          "display_name": "T1429 - Capture Audio"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1213",
          "name": "Data from Information Repositories",
          "display_name": "T1213 - Data from Information Repositories"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1033",
          "name": "System Owner/User Discovery",
          "display_name": "T1033 - System Owner/User Discovery"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1010",
          "name": "Application Window Discovery",
          "display_name": "T1010 - Application Window Discovery"
        },
        {
          "id": "T1005",
          "name": "Data from Local System",
          "display_name": "T1005 - Data from Local System"
        },
        {
          "id": "TA0030",
          "name": "Defense Evasion",
          "display_name": "TA0030 - Defense Evasion"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 22,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 184,
        "FileHash-SHA1": 177,
        "FileHash-SHA256": 1078,
        "URL": 318,
        "domain": 511,
        "email": 4,
        "hostname": 520
      },
      "indicator_count": 2792,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 221,
      "modified_text": "811 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65708ef0cdb40fa0e7d239ca",
      "name": "either emotet or a part of it",
      "description": "",
      "modified": "2023-12-06T15:10:40.867000",
      "created": "2023-12-06T15:10:40.867000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 342,
        "hostname": 456,
        "domain": 349,
        "URL": 1730,
        "FileHash-MD5": 1,
        "FileHash-SHA1": 1
      },
      "indicator_count": 2879,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65708e456bdbf8ea8d0d504a",
      "name": "whitehouse.gov",
      "description": "",
      "modified": "2023-12-06T15:07:49.577000",
      "created": "2023-12-06T15:07:49.577000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 449,
        "hostname": 639,
        "domain": 245,
        "URL": 1609,
        "FileHash-MD5": 4
      },
      "indicator_count": 2946,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65708e254b734f1efd8bd0ad",
      "name": "1688.com .. 404-\u963f\u91cc\u5df4\u5df4",
      "description": "",
      "modified": "2023-12-06T15:07:17.380000",
      "created": "2023-12-06T15:07:17.380000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 1645,
        "URL": 8598,
        "domain": 1004,
        "hostname": 2066,
        "FileHash-MD5": 3
      },
      "indicator_count": 13316,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 110,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65708d657f0895a860febf8f",
      "name": "SafeFrame Container",
      "description": "",
      "modified": "2023-12-06T15:04:05.932000",
      "created": "2023-12-06T15:04:05.932000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 1416,
        "domain": 2979,
        "URL": 8250,
        "hostname": 2262
      },
      "indicator_count": 14907,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 110,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65708cca842536f1582636be",
      "name": "apeiron.global",
      "description": "",
      "modified": "2023-12-06T15:01:30.558000",
      "created": "2023-12-06T15:01:30.558000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 498,
        "hostname": 388,
        "domain": 242,
        "CVE": 1,
        "URL": 1203,
        "FileHash-MD5": 1
      },
      "indicator_count": 2333,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "c.map",
    "type": "Domain"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "c.map",
    "found": false,
    "verdict": "clean",
    "urls": [],
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776685709.821785
}