{
  "type": "Domain",
  "indicator": "cachesdata.com",
  "general": {
    "sections": [
      "general",
      "geo",
      "url_list",
      "passive_dns",
      "malware",
      "whois",
      "http_scans"
    ],
    "whois": "http://whois.domaintools.com/cachesdata.com",
    "alexa": "http://www.alexa.com/siteinfo/cachesdata.com",
    "indicator": "cachesdata.com",
    "type": "domain",
    "type_title": "Domain",
    "validation": [],
    "base_indicator": {
      "id": 3739887531,
      "indicator": "cachesdata.com",
      "type": "domain",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 23,
      "pulses": [
        {
          "id": "66ce3eb4b4f1fc9eafb4b572",
          "name": "DDoS:Linux/Lightaidra | Mirai Botnet on US a State Computer",
          "description": "*Mirai Botnet on Colorado State computer. Im starting to wonder if potential problem cases are diverted to a botnet.\n1. Overlaps with a Colorado victim. Similar issues. I Recently became a senior in expensive Colorado, never compensated for workers compensation injury exacerbated when suddenly tossed a 60 lb weighted ball under care. Denied diagnoses of severe injury after toss. Complained, case closed, lawyers denied case after accepting case. Referred to JeffCo seeking assisted living resources. Was sent various packets with a variety of phone numbers, email addresses, etc. She keeps speaking to same man no matter what option chosen. Denied workforce training due to severity of injuries, No SSI or SSDI until years later. \n2. I can't pulse half of what I've researched without using multiple resources. No more 'contacted' made when new serious issues found. Pulses being modified. I rarely modify any pulse.",
          "modified": "2024-09-26T20:01:27.723000",
          "created": "2024-08-27T21:01:40.251000",
          "tags": [
            "memcommit",
            "read c",
            "nospltezraxuf",
            "writeconsolea",
            "write",
            "CVE-2023-22518",
            "tesla",
            "ye ye",
            "incapril",
            "yed ye",
            "yet ye",
            "yexe ye",
            "security",
            "search",
            "function read",
            "dll read",
            "installer",
            "april",
            "copy",
            "win32",
            "template",
            "creation date",
            "servers",
            "passive dns",
            "urls",
            "name servers",
            "scan endpoints",
            "all scoreblue",
            "hostname",
            "pulse pulses",
            "date",
            "windows",
            "medium",
            "shellexecuteexw",
            "hash",
            "show",
            "writeconsolew",
            "entries",
            "displayname",
            "sddl",
            "service",
            "august",
            "malware",
            "url http",
            "http",
            "ip address",
            "related nids",
            "files location",
            "domain",
            "status",
            "nxdomain",
            "whitelisted",
            "certificate",
            "backdoor",
            "record value",
            "body",
            "as15133 verizon",
            "united",
            "unknown",
            "mtb aug",
            "gmt server",
            "ecacc sed5906",
            "ransom",
            "trojan",
            "high",
            "cname",
            "as8075",
            "ipv4",
            "files",
            "asn as55720",
            "date hash",
            "default",
            "delete",
            "yara detections",
            "msvisualcpp60",
            "related pulses",
            "rootkit",
            "as16276",
            "canada unknown",
            "pulses",
            "expiration date",
            "exploit",
            "showing",
            "aaaa",
            "france unknown",
            "mtb sep",
            "worm",
            "msil",
            "mirai",
            "as36081 state",
            "reverse dns",
            "port",
            "destination",
            "south korea",
            "taiwan as3462",
            "as4766 korea",
            "asnone",
            "japan as17676",
            "china as4134",
            "china as4837",
            "file samples",
            "files matching",
            "next",
            "copyright",
            "levelblue",
            "as20940",
            "as15169 google",
            "ave suite",
            "purpose p5",
            "country united",
            "code us",
            "as41231",
            "united kingdom",
            "ddos",
            "sha256",
            "filehash",
            "av detections",
            "location london",
            "great britain",
            "gnulinux apt",
            "yara rule",
            "ids detections",
            "top source",
            "address",
            "as23969",
            "thailand"
          ],
          "references": [
            "In this instance a senior citizen needing assisted living resources redirected & social engineered by addresses originated from: jefferson.co.us",
            "Noted: Calls redirected, call jumps ahead of 25+ callers in wait, keeps getting same agent, told approved for services never applied for or received",
            "Exploits: IPv4 20.99.186.246 | 52.109.0.140 | CVE CVE-2023-22518 | Trojans: AgentTesla.KM , Cobalt Strike , Ransom: WannaCrypt , Malware: Dxqo",
            "Domain Name: IUQERFSODP9IFJAPOSDFJHGOSURIJFAEWRWERGWEA.COM  Emails: BotnetSinkhole@gmail.com",
            "Emails: abuse@namecheap.com Name: Botnet Sinkhole  | Address: Botnet Sinkhole City: Los Angeles Country: USA",
            "Dnssec:Unsigned | Name Servers | BRUCE.NS.CLOUDFLARE.COM",
            "Notable: Mirai - 192.70.175.110 Security Operations (DORA?) oit_isocsecurity@state.co.us | state.co.us | Reverse DNS dns1.state.co.us",
            "Unix.Trojan.Mirai-6976991-0 : FileHash-SHA256 a282f250e59f8754335993293bfbfcc154cdb67ff0e234162f40a6cce5c4290c",
            "ELF:Mirai-AII\\ [Trj] | FileHash-SHA256 760a17dea7794ebbfb5c54e7e74d0b53fd9e079e43be0b9b6e3df7eb14a47be9",
            "Overlaps: 4 others mailed information email address.",
            "Ransom:Win32/WannaCrypt.H",
            "iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com | CVE-2017-0147",
            "AS36081 State of Colorado General Government Computer",
            "Yara Detections Mirai_Botnet_Malware Alerts: dead_host network_icmp osquery_detection nolookup_communication",
            "ELF:Mirai-AII\\ [Trj]  | FileHash-SHA256:  760a17dea7794ebbfb5c54e7e74d0b53fd9e079e43be0b9b6e3df7eb14a47be9",
            "Detections Executable and linking format (ELF) file download Over HTTP |",
            "FileHash-SHA256 : 256760a17dea7794ebbfb5c54e7e74d0b53fd9e079e43be0b9b6e3df7eb14a47be9",
            "Yara Detections: UPXProtectorv10x2 ,  UPX ,  ELFHighEntropy ,  elf_empty_sections Alerts: dead_host | ELF:Mirai-AII\\ [Trj]",
            "77882 IP\u2019s Contacted: 1.1.69.67  1.10.237.208  1.101.233.31  1.102.46.59  1.103.37.126  1.105.106.252  1.106.108.182  1.106.193.143  1.109.132.165  1.11.116.209",
            "Domains Contacted: ntp.ubuntu.com | IDS Detections GNU/Linux APT User-Agent Outbound likely related to package management | 91.189.89.198",
            "Yara Detections: gafgyt IP\u2019s Contacted:  91.189.89.198 Domains Contacted :ntp.ubuntu.com",
            "FileHash-SHA256:  a0f50a7b0f9717589000b3414017bdcfcb9d3f6a3e5e03fe49c4dc8035e0d25c",
            "Related Domains: townofignacio.com | coloradoagriculture.com | coloradoworkforce.com | coworkforce.com | coloradoccjj.com | dns1.state.co.us",
            "https://www.rapidinterviews.com/api/jobs/redirect/public-transit-bus-drivers-with-utah-transit-authority-in-stansbury-park-apc-1932",
            "https://us.thebigjobsite.com/redirectfeedjob?jobid=2A5F97A6BAE0AA90DC418C2119E1E0EB&source=onestepjobsxmlus&utm_source=onestepjobsxmlus&jobSiteK",
            "redirect.wuxs.icu",
            "https://a-a.redirector.navexglobal.com/navex_hosting/404.html",
            "https://engage.navexglobal.com/topclass1/login.do?redirectTo=/expand.do?template=JasperReports&view=library"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "ALF:Trojan:MSIL/AgentTesla.KM",
              "display_name": "ALF:Trojan:MSIL/AgentTesla.KM",
              "target": null
            },
            {
              "id": "Win.Trojan.CobaltStrike-9044898-1",
              "display_name": "Win.Trojan.CobaltStrike-9044898-1",
              "target": null
            },
            {
              "id": "Win.Malware.Dxqo-6984072-0",
              "display_name": "Win.Malware.Dxqo-6984072-0",
              "target": null
            },
            {
              "id": "Ransom:Win32/WannaCrypt",
              "display_name": "Ransom:Win32/WannaCrypt",
              "target": "/malware/Ransom:Win32/WannaCrypt"
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Fynloski",
              "display_name": "Backdoor:Win32/Fynloski",
              "target": "/malware/Backdoor:Win32/Fynloski"
            },
            {
              "id": "Worm:Win32/Mofksys",
              "display_name": "Worm:Win32/Mofksys",
              "target": "/malware/Worm:Win32/Mofksys"
            },
            {
              "id": "TELPER:DDoS:Linux/Lightaidra",
              "display_name": "TELPER:DDoS:Linux/Lightaidra",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1410",
              "name": "Network Traffic Capture or Redirection",
              "display_name": "T1410 - Network Traffic Capture or Redirection"
            },
            {
              "id": "T1036.004",
              "name": "Masquerade Task or Service",
              "display_name": "T1036.004 - Masquerade Task or Service"
            },
            {
              "id": "T1009",
              "name": "Binary Padding",
              "display_name": "T1009 - Binary Padding"
            },
            {
              "id": "T1499",
              "name": "Endpoint Denial of Service",
              "display_name": "T1499 - Endpoint Denial of Service"
            },
            {
              "id": "T1498",
              "name": "Network Denial of Service",
              "display_name": "T1498 - Network Denial of Service"
            },
            {
              "id": "T1464",
              "name": "Jamming or Denial of Service",
              "display_name": "T1464 - Jamming or Denial of Service"
            }
          ],
          "industries": [
            "Telecom"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 18,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 2,
            "FileHash-MD5": 675,
            "FileHash-SHA1": 664,
            "FileHash-SHA256": 3327,
            "URL": 2448,
            "domain": 656,
            "hostname": 1281,
            "email": 11
          },
          "indicator_count": 9064,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 229,
          "modified_text": "570 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "66b8fe985a7460e0ee01be8a",
          "name": "r3.o.lencr.org",
          "description": "",
          "modified": "2024-08-11T18:14:13.378000",
          "created": "2024-08-11T18:10:32.276000",
          "tags": [
            "as20940",
            "united",
            "trojan",
            "search",
            "passive dns",
            "urls",
            "entries",
            "dashboard",
            "browse scan",
            "endpoints all",
            "date",
            "a domains",
            "aaaa",
            "record value",
            "scan endpoints",
            "all search",
            "otx octoseek",
            "domain related",
            "showing"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "64dc045f5344129c48c41826",
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 664,
            "email": 13,
            "hostname": 1352,
            "FileHash-SHA256": 2550,
            "URL": 5422,
            "FileHash-MD5": 761,
            "FileHash-SHA1": 615
          },
          "indicator_count": 11377,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "616 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6671e5844c155814e69ba4dd",
          "name": "Mirai Botnet Injection  affecting Alienvault.",
          "description": "It's unclear if some users or service itself is injecting users or if service is under a Mirai attack. I found evidence of both outbound & inbound activities.  *Crowdsourced context: Activity related to MIRAI - according to source Cluster25 - \nThis IPV4 is used by MIRAI. Mirai is a malware that created a big botnet of networked devices running Linux making them remotely controlled bots that can be used for large-scale network attacks. It primarily targets online consumer devices such as IP cameras and home routers.\n#zbetcheckin tracker\nDownloaded on 2023-11-07 19:34:59 UTC\nSRC URL : http://171.228.209.167/x86_64\nIP : 171.228.209.167\nAS : AS7552 Viettel Group\nYARA : #contentis_base64 #debuggerpattern__rdtsc #ip #math_entropy_6 #is__elf #http #ft_elf #executable_elf64",
          "modified": "2024-07-18T19:02:50.386000",
          "created": "2024-06-18T19:52:36.849000",
          "tags": [
            "problems",
            "threat network",
            "infrastructure",
            "historical ssl",
            "microsoft stuff",
            "domain check",
            "referrer",
            "generic malware",
            "injector",
            "no data",
            "tag count",
            "fri mar",
            "analyzer threat",
            "ip summary",
            "url summary",
            "summary",
            "downloader",
            "generic",
            "united",
            "as14315",
            "passive dns",
            "scan endpoints",
            "all scoreblue",
            "ipv4",
            "pulse pulses",
            "urls",
            "files",
            "america asn",
            "unknown",
            "ransom",
            "body",
            "coinminer",
            "malware generic",
            "wed jan",
            "first",
            "status",
            "creation date",
            "search",
            "date",
            "expiration date",
            "name servers",
            "next",
            "mirai",
            "yara detections",
            "filehash",
            "av detections",
            "ids detections",
            "alerts",
            "analysis date",
            "file score",
            "reverse dns",
            "location lao",
            "viet nam",
            "domain",
            "all search",
            "otx scoreblue",
            "hostname",
            "files ip",
            "lazarus",
            "as7552 viettel",
            "vietnam unknown",
            "win32",
            "worm",
            "win32sfone jul",
            "vietnam",
            "etag",
            "telecom",
            "as16625 akamai",
            "as20940",
            "germany",
            "united kingdom",
            "singapore",
            "as20546 soprado",
            "hong kong",
            "as45102 alibaba",
            "taobao network",
            "cname",
            "aaaa",
            "entries",
            "showing",
            "a domains",
            "as38731 vietel",
            "plesk",
            "a li",
            "default page",
            "plesk a",
            "mirai variant",
            "useragent",
            "apache",
            "accept",
            "hello",
            "create c",
            "read c",
            "delete",
            "write",
            "default",
            "create",
            "show",
            "medium",
            "dock",
            "execution",
            "copy",
            "xport",
            "address",
            "as131392",
            "cape",
            "orsam",
            "malware",
            "script urls",
            "moved",
            "record value",
            "cisco umbrella",
            "site",
            "heur",
            "alexa top",
            "safe site",
            "million",
            "malicious site",
            "phishing site",
            "malicious url",
            "opencandy",
            "exploit",
            "agent",
            "phishing",
            "acint",
            "iframe",
            "crack",
            "conduit",
            "artemis",
            "riskware",
            "mimikatz",
            "swrort",
            "downldr",
            "systweak",
            "behav",
            "tiggre",
            "genkryptik",
            "presenoker",
            "filetour",
            "cleaner",
            "wacatac",
            "outbreak",
            "installcore",
            "iobit",
            "rostpay",
            "dropper",
            "mediaget",
            "related pulses",
            "whois",
            "related",
            "msil",
            "zombie",
            "dridex",
            "location viet",
            "pulse submit",
            "url analysis",
            "content",
            "google tag",
            "utc gcfezl5ynvb",
            "utc na",
            "utc google",
            "analytics na",
            "utc linkedin",
            "insight tag",
            "deep malware",
            "iframes",
            "trackers",
            "external-resources",
            "text/html",
            "elf info",
            "header class",
            "elf64 data",
            "header version",
            "os abi",
            "unix",
            "v object",
            "file type",
            "exec",
            "executable file",
            "progbits",
            "type address",
            "offset size",
            "flags",
            "null",
            "nobits",
            "strtab",
            "ip detections",
            "country",
            "us bundled",
            "detections file",
            "name",
            "graph summary",
            "get hello",
            "jaws webserver",
            "outbound",
            "mvpower dvr",
            "shell uce",
            "inbound",
            "activity mirai",
            "mirai",
            "info",
            "performs dns",
            "mitre att",
            "access ta0006",
            "os credential",
            "dumping t1003",
            "enumerates",
            "command",
            "control ta0011",
            "protocol t1071",
            "protocol t1095",
            "relacionada",
            "mirai malware",
            "mirai 04022024",
            "nciipc",
            "ip reputaion",
            "msie",
            "windows nt",
            "slcc2",
            "media center",
            "china as37963",
            "simplified",
            "trojanspy",
            "virustotal",
            "panda",
            "detections type",
            "shell",
            "javascript",
            "dns replication",
            "files referring",
            "lookups",
            "as7552",
            "vhash",
            "ssdeep",
            "magic elf",
            "sysv",
            "trid elf",
            "executable",
            "linux",
            "elf executable",
            "loccel1",
            "echobot",
            "bashlite",
            "malwarebazaar",
            "echobot malware",
            "win32 exe",
            "magic msdos",
            "pe32 executable",
            "intel",
            "ms windows",
            "trid dos",
            "compiler",
            "delphi",
            "serial number",
            "algorithm",
            "thumbprint",
            "valid from",
            "code signing",
            "from",
            "microsoft root",
            "name microsoft",
            "verisign time",
            "stamping",
            "contained",
            "info sections",
            "name virtual",
            "address virtual",
            "size raw",
            "size entropy",
            "md5 chi2",
            "regsetvalueexa",
            "type rtrcdata",
            "sha256 file",
            "threat roundup",
            "october",
            "august",
            "june",
            "september",
            "highly targeted",
            "cyberstalking",
            "round",
            "december",
            "sneaky server",
            "facebook",
            "stealer",
            "agent tesla",
            "pony",
            "april",
            "whitelisted",
            "encrypt",
            "targeting",
            "tsara brashears",
            "otx",
            "alienvault",
            "memcommit",
            "regsz",
            "regopenkeyexw",
            "english",
            "module load",
            "t1129",
            "t1082",
            "windows module",
            "dlls",
            "redline stealer",
            "updater",
            "v3 serial",
            "number",
            "subject public",
            "key info",
            "key algorithm",
            "key identifier",
            "subject key",
            "identifier",
            "x509v3 key",
            "data redacted",
            "cloudflare",
            "redacted",
            "for privacy",
            "code",
            "server",
            "registrar abuse",
            "redacted for",
            "postal code",
            "registrant name",
            "red team",
            "shit",
            "logistics",
            "cyber defense",
            "gootloader",
            "march",
            "sinkhole",
            "just",
            "ramnit",
            "netsupport rat",
            "microsoft",
            "vault",
            "karen",
            "gifts",
            "hidden privacy",
            "threats",
            "malicious",
            "darkgate",
            "core",
            "hacktool",
            "emotet"
          ],
          "references": [
            "https://botnet.ngocronglau.xyz > link discovered by an Alienvault user who notified me they found it researching message from am active user.",
            "https://otx.alienvault.com/indicator/file/02b19639ad1efa59e77f45d130447c05bd2466e26a657cb9cc6ac2e8b30a0026",
            "https://otx.alienvault.com/indicator/file/001546d210a35b7c4c072b6c265f621cf4a9abdd152741d9b58deae2be204355",
            "https://otx.alienvault.com/indicator/hostname/botnet.ngocronglau.xyz",
            "Unix.Mirai Botnet: https://otx.alienvault.com/indicator/hostname/botnet.ngocronglau.xyz",
            "CnC IP: https://otx.alienvault.com/indicator/ip/142.202.242.45",
            "https://otx.alienvault.com/indicator/domain/bunny.net",
            "https://otx.alienvault.com/indicator/ip/210.211.117.205",
            "https://otx.alienvault.com/indicator/ip/143.244.50.212",
            "https://otx.alienvault.com/indicator/ip/125.235.4.59",
            "AV Detection: ELF:Mirai-GH\\ [Trj]",
            "IDS Detections:  MVPower DVR Shell UCE Mirai  | Variant User-Agent (Outbound) JAWS Webserver Unauthenticated Shell Command Execution",
            "IDS Detections: Huawei Remote Command Execution (CVE-2017-17215) Huawei Remote Command Execution - Outbound (CVE-2017-17215) Huawei HG532 RCE Vulnerability (CVE-2017-17215) Mirai Variant User-Agent (Inbound) HackingTrio UA (Hello, World) 401TRG Generic Webshell Request - POST with wget in body HTTP traffic on port 443 (POST",
            "IDS Detections: Mirai Variant User-Agent (Inbound) HackingTrio UA (Hello, World)",
            "IDS Detections: 401TRG Generic Webshell Request - POST with wget in body HTTP traffic on port 443 (POST) ...",
            "Alerts: dead_host network_icmp tcp_syn_scan nolookup_communication network_cnc_http network_http p2p_cnc writes_to_stdout",
            "Matches rule Linux_Trojan_Mirai_6a77af0f from ruleset Linux_Trojan_Mirai by Elastic Security | botnet.ngocronglau.xyz",
            "https://otx.alienvault.com/indicator/file/2b5deac6176124ee1f7d237f070c39b03c964fce9a9fba0aaa1bce102710d2e0",
            "cu-payment-porch.pdv-3.ap-southeast-2.production.jet-external.com | qa.proxy.cognito.tigomoney.io | https://trackon.fr/track/clique",
            "Crowdsourced YARA rules Matches:  rule INDICATOR_EXE_Packed_MEW from ruleset indicator_packed by ditekSHen",
            "Crowdsourced YARA rules Matches: INDICATOR_EXE_Packed_MEW from ruleset indicator_packed by ditekSHen",
            "Crowdsourced YARA rules Matches: SUSP_Unsigned_OSPPSVC from ruleset gen_sign_anomalies by Florian Roth (Nextron Systems",
            "Crowdsourced YARA rules Matches: IMPLANT_4_v3_AlternativeRule from ruleset apt_grizzlybear_uscert by Florian Roth (Nextron Systems)",
            "Crowdsourced YARA rules Matches: Matches rule IMPLANT_4_v3_AlternativeRule from ruleset apt_grizzlybear_uscert by Florian Roth (Nextron Systems",
            "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
            "wallpapers-nature.com",
            "Was anyone else notified? I'm not sure why I was.",
            "Through research I did notice many references to target I'm researching for. Phishing/Injection attempt? I didn't click on links.",
            "CS Sigma: Matches rule Python Initiated Connection by frack113"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Generic",
              "display_name": "Generic",
              "target": null
            },
            {
              "id": "Unix.Trojan.Mirai-9441505-0",
              "display_name": "Unix.Trojan.Mirai-9441505-0",
              "target": null
            },
            {
              "id": "ALF:E5.SpikeAex.rhh_mcv",
              "display_name": "ALF:E5.SpikeAex.rhh_mcv",
              "target": null
            },
            {
              "id": "Win.Dropper.Bulz-9910065-0",
              "display_name": "Win.Dropper.Bulz-9910065-0",
              "target": null
            },
            {
              "id": "Win32:Malware-gen",
              "display_name": "Win32:Malware-gen",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
              "display_name": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
              "target": null
            },
            {
              "id": "Win.Dropper.Autoit-6688751-0",
              "display_name": "Win.Dropper.Autoit-6688751-0",
              "target": null
            },
            {
              "id": "ELF:Mirai-GH\\ [Trj]",
              "display_name": "ELF:Mirai-GH\\ [Trj]",
              "target": null
            },
            {
              "id": "Win.Dropper.Dridex-9986041-0",
              "display_name": "Win.Dropper.Dridex-9986041-0",
              "target": null
            },
            {
              "id": "ALF:HeraklezEval:Trojan:Win32/Zombie",
              "display_name": "ALF:HeraklezEval:Trojan:Win32/Zombie",
              "target": null
            },
            {
              "id": "Win.Packer.pkr_ce1a-9980177-0",
              "display_name": "Win.Packer.pkr_ce1a-9980177-0",
              "target": null
            },
            {
              "id": "Worm:Win32/Sfone.A",
              "display_name": "Worm:Win32/Sfone.A",
              "target": "/malware/Worm:Win32/Sfone.A"
            },
            {
              "id": "Worm:Win32/Sfone",
              "display_name": "Worm:Win32/Sfone",
              "target": "/malware/Worm:Win32/Sfone"
            },
            {
              "id": "Win.Malware.Bbabdcdc-7358312-0",
              "display_name": "Win.Malware.Bbabdcdc-7358312-0",
              "target": null
            },
            {
              "id": "Win32:Trojan-gen",
              "display_name": "Win32:Trojan-gen",
              "target": null
            },
            {
              "id": "trojan.mirai/fszhh",
              "display_name": "trojan.mirai/fszhh",
              "target": null
            },
            {
              "id": "DDOS:Linux/Mirai",
              "display_name": "DDOS:Linux/Mirai",
              "target": "/malware/DDOS:Linux/Mirai"
            },
            {
              "id": "ANDROID/AVE.Mirai.fszhh",
              "display_name": "ANDROID/AVE.Mirai.fszhh",
              "target": null
            },
            {
              "id": "Flyagent L",
              "display_name": "Flyagent L",
              "target": null
            },
            {
              "id": "Win-Trojan/Malpacked5.Gen",
              "display_name": "Win-Trojan/Malpacked5.Gen",
              "target": null
            },
            {
              "id": "Atros3.LDJ",
              "display_name": "Atros3.LDJ",
              "target": null
            },
            {
              "id": "a variant of Win32/FlyStudio.Packed.AD potentially unwanted",
              "display_name": "a variant of Win32/FlyStudio.Packed.AD potentially unwanted",
              "target": null
            },
            {
              "id": "TrojanSpy:Win32/Gucotut.A",
              "display_name": "TrojanSpy:Win32/Gucotut.A",
              "target": "/malware/TrojanSpy:Win32/Gucotut.A"
            },
            {
              "id": "W32/Pidgeon-A",
              "display_name": "W32/Pidgeon-A",
              "target": null
            },
            {
              "id": "Variant.Zusy.151902",
              "display_name": "Variant.Zusy.151902",
              "target": null
            },
            {
              "id": "trojan.mirai/fedr",
              "display_name": "trojan.mirai/fedr",
              "target": null
            },
            {
              "id": "Win.Malware.Trojanx-9862538-0",
              "display_name": "Win.Malware.Trojanx-9862538-0",
              "target": null
            },
            {
              "id": "Win32:PWSX-gen\\ [Trj]",
              "display_name": "Win32:PWSX-gen\\ [Trj]",
              "target": null
            },
            {
              "id": "virus.ramnit/nimnul",
              "display_name": "virus.ramnit/nimnul",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1095",
              "name": "Non-Application Layer Protocol",
              "display_name": "T1095 - Non-Application Layer Protocol"
            },
            {
              "id": "T1571",
              "name": "Non-Standard Port",
              "display_name": "T1571 - Non-Standard Port"
            },
            {
              "id": "TA0006",
              "name": "Credential Access",
              "display_name": "TA0006 - Credential Access"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1005",
              "name": "Data from Local System",
              "display_name": "T1005 - Data from Local System"
            },
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1047",
              "name": "Windows Management Instrumentation",
              "display_name": "T1047 - Windows Management Instrumentation"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1081",
              "name": "Credentials in Files",
              "display_name": "T1081 - Credentials in Files"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 51,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 2,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 351,
            "FileHash-SHA1": 349,
            "FileHash-SHA256": 3715,
            "domain": 3326,
            "hostname": 5200,
            "URL": 13151,
            "email": 9,
            "CVE": 7,
            "CIDR": 2
          },
          "indicator_count": 26110,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 243,
          "modified_text": "640 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65d8c371cc0957afd9195ae0",
          "name": ":MalwareX-gen\\ [Trj]",
          "description": "",
          "modified": "2024-03-24T08:04:17.098000",
          "created": "2024-02-23T16:10:26",
          "tags": [
            "united",
            "command decode",
            "segoe ui",
            "emoji",
            "meta",
            "script",
            "alienvault",
            "open threat",
            "exchange",
            "learn",
            "date",
            "roboto",
            "path",
            "iframe",
            "body",
            "virustotal",
            "february",
            "hybrid",
            "general",
            "click",
            "strings",
            "span",
            "contact",
            "ssl certificate",
            "whois record",
            "threat roundup",
            "june",
            "october",
            "pe resource",
            "september",
            "referrer",
            "historical ssl",
            "march",
            "august",
            "formbook",
            "suspicious"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "65d85bc3164cd519bc4a282d",
          "export_count": 15,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Enqrypted",
            "id": "272105",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_272105/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 151,
            "FileHash-SHA1": 151,
            "FileHash-SHA256": 2254,
            "domain": 693,
            "hostname": 974,
            "URL": 3461,
            "CVE": 1
          },
          "indicator_count": 7685,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 62,
          "modified_text": "756 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65d85bc3164cd519bc4a282d",
          "name": "Win32:RansomX-gen\\ [Ransom] \u2022 Win32:MalwareX-gen\\ [Trj]",
          "description": "https://otx.alienvault.com/indicator/ doesn't finish loading. Unable to analyze  detections.\nnetwork_icmp\nallocates_rwx\npacker_entropy\nhas_pdb\npe_unknown_resource_name\nsysinternals_tools_usage\nallocates_rwx\nsuspicious_process",
          "modified": "2024-03-24T08:04:17.098000",
          "created": "2024-02-23T08:48:03.696000",
          "tags": [
            "united",
            "command decode",
            "segoe ui",
            "emoji",
            "meta",
            "script",
            "alienvault",
            "open threat",
            "exchange",
            "learn",
            "date",
            "roboto",
            "path",
            "iframe",
            "body",
            "virustotal",
            "february",
            "hybrid",
            "general",
            "click",
            "strings",
            "span",
            "contact",
            "ssl certificate",
            "whois record",
            "threat roundup",
            "june",
            "october",
            "pe resource",
            "september",
            "referrer",
            "historical ssl",
            "march",
            "august",
            "formbook",
            "suspicious"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 19,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 151,
            "FileHash-SHA1": 151,
            "FileHash-SHA256": 2254,
            "domain": 693,
            "hostname": 974,
            "URL": 3461,
            "CVE": 1
          },
          "indicator_count": 7685,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "756 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65cab616bb5869335d184ae7",
          "name": "Malware Infection | Pseudonym 'Kevin Harden' Malvertizing RedTube Subsidiary",
          "description": "",
          "modified": "2024-03-11T02:01:13.710000",
          "created": "2024-02-13T00:21:42.183000",
          "tags": [
            "trojan",
            "show",
            "scan endpoints",
            "all scoreblue",
            "filehash",
            "av detections",
            "ids detections",
            "yara detections",
            "alerts",
            "april",
            "win32",
            "copy",
            "push",
            "malware infection",
            "threat roundup",
            "whois record",
            "contacted",
            "october",
            "execution",
            "january",
            "attack",
            "suspicious",
            "hacktool",
            "emotet",
            "injection",
            "http response",
            "final url",
            "ip address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers",
            "http",
            "resource path",
            "size",
            "type mimetype",
            "primary request",
            "servicelogin",
            "kb document",
            "general full",
            "url https"
          ],
          "references": [
            "https://www.redtube.com/ServiceLogin?hl=de&passive=true&continue=https://www.redtube.ccom/%3Fdata%3Dkevinharden1978%2540gmail.com%252Fkevinharden1978%2B.search",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Win32:Trojan-gen",
              "display_name": "Win32:Trojan-gen",
              "target": null
            },
            {
              "id": "Trojan:Win32/CryptInject.SD!MTB",
              "display_name": "Trojan:Win32/CryptInject.SD!MTB",
              "target": "/malware/Trojan:Win32/CryptInject.SD!MTB"
            },
            {
              "id": "Win.Malware.Fileinfector-9834127-0",
              "display_name": "Win.Malware.Fileinfector-9834127-0",
              "target": null
            },
            {
              "id": "Emotet b",
              "display_name": "Emotet b",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 15,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 276,
            "FileHash-SHA1": 274,
            "FileHash-SHA256": 3301,
            "URL": 2268,
            "hostname": 744,
            "CVE": 2,
            "domain": 340
          },
          "indicator_count": 7205,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 227,
          "modified_text": "770 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65cab60667f8205c19d6b67b",
          "name": "Malware Infection | Pseudonym 'Kevin Harden' Malvertizing RedTube Subsidiary",
          "description": "",
          "modified": "2024-03-11T02:01:13.710000",
          "created": "2024-02-13T00:21:26.244000",
          "tags": [
            "trojan",
            "show",
            "scan endpoints",
            "all scoreblue",
            "filehash",
            "av detections",
            "ids detections",
            "yara detections",
            "alerts",
            "april",
            "win32",
            "copy",
            "push",
            "malware infection",
            "threat roundup",
            "whois record",
            "contacted",
            "october",
            "execution",
            "january",
            "attack",
            "suspicious",
            "hacktool",
            "emotet",
            "injection",
            "http response",
            "final url",
            "ip address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers",
            "http",
            "resource path",
            "size",
            "type mimetype",
            "primary request",
            "servicelogin",
            "kb document",
            "general full",
            "url https"
          ],
          "references": [
            "https://www.redtube.com/ServiceLogin?hl=de&passive=true&continue=https://www.redtube.ccom/%3Fdata%3Dkevinharden1978%2540gmail.com%252Fkevinharden1978%2B.search",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Win32:Trojan-gen",
              "display_name": "Win32:Trojan-gen",
              "target": null
            },
            {
              "id": "Trojan:Win32/CryptInject.SD!MTB",
              "display_name": "Trojan:Win32/CryptInject.SD!MTB",
              "target": "/malware/Trojan:Win32/CryptInject.SD!MTB"
            },
            {
              "id": "Win.Malware.Fileinfector-9834127-0",
              "display_name": "Win.Malware.Fileinfector-9834127-0",
              "target": null
            },
            {
              "id": "Emotet b",
              "display_name": "Emotet b",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 14,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 276,
            "FileHash-SHA1": 274,
            "FileHash-SHA256": 3301,
            "URL": 2268,
            "hostname": 744,
            "CVE": 2,
            "domain": 340
          },
          "indicator_count": 7205,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 227,
          "modified_text": "770 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65cab601f0d674294b603758",
          "name": "Malware Infection | Pseudonym 'Kevin Harden' Malvertizing RedTube Subsidiary",
          "description": "",
          "modified": "2024-03-11T02:01:13.710000",
          "created": "2024-02-13T00:21:21.869000",
          "tags": [
            "trojan",
            "show",
            "scan endpoints",
            "all scoreblue",
            "filehash",
            "av detections",
            "ids detections",
            "yara detections",
            "alerts",
            "april",
            "win32",
            "copy",
            "push",
            "malware infection",
            "threat roundup",
            "whois record",
            "contacted",
            "october",
            "execution",
            "january",
            "attack",
            "suspicious",
            "hacktool",
            "emotet",
            "injection",
            "http response",
            "final url",
            "ip address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers",
            "http",
            "resource path",
            "size",
            "type mimetype",
            "primary request",
            "servicelogin",
            "kb document",
            "general full",
            "url https"
          ],
          "references": [
            "https://www.redtube.com/ServiceLogin?hl=de&passive=true&continue=https://www.redtube.ccom/%3Fdata%3Dkevinharden1978%2540gmail.com%252Fkevinharden1978%2B.search",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Win32:Trojan-gen",
              "display_name": "Win32:Trojan-gen",
              "target": null
            },
            {
              "id": "Trojan:Win32/CryptInject.SD!MTB",
              "display_name": "Trojan:Win32/CryptInject.SD!MTB",
              "target": "/malware/Trojan:Win32/CryptInject.SD!MTB"
            },
            {
              "id": "Win.Malware.Fileinfector-9834127-0",
              "display_name": "Win.Malware.Fileinfector-9834127-0",
              "target": null
            },
            {
              "id": "Emotet b",
              "display_name": "Emotet b",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 14,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 276,
            "FileHash-SHA1": 274,
            "FileHash-SHA256": 3301,
            "URL": 2268,
            "hostname": 744,
            "CVE": 2,
            "domain": 340
          },
          "indicator_count": 7205,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "770 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65cab5eb4d0a233bf6f32edb",
          "name": "Malware Infection | Pseudonym 'Kevin Harden' Malvertizing RedTube Subsidiary",
          "description": "",
          "modified": "2024-03-11T02:01:13.710000",
          "created": "2024-02-13T00:20:59.154000",
          "tags": [
            "trojan",
            "show",
            "scan endpoints",
            "all scoreblue",
            "filehash",
            "av detections",
            "ids detections",
            "yara detections",
            "alerts",
            "april",
            "win32",
            "copy",
            "push",
            "malware infection",
            "threat roundup",
            "whois record",
            "contacted",
            "october",
            "execution",
            "january",
            "attack",
            "suspicious",
            "hacktool",
            "emotet",
            "injection",
            "http response",
            "final url",
            "ip address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers",
            "http",
            "resource path",
            "size",
            "type mimetype",
            "primary request",
            "servicelogin",
            "kb document",
            "general full",
            "url https"
          ],
          "references": [
            "https://www.redtube.com/ServiceLogin?hl=de&passive=true&continue=https://www.redtube.ccom/%3Fdata%3Dkevinharden1978%2540gmail.com%252Fkevinharden1978%2B.search",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Win32:Trojan-gen",
              "display_name": "Win32:Trojan-gen",
              "target": null
            },
            {
              "id": "Trojan:Win32/CryptInject.SD!MTB",
              "display_name": "Trojan:Win32/CryptInject.SD!MTB",
              "target": "/malware/Trojan:Win32/CryptInject.SD!MTB"
            },
            {
              "id": "Win.Malware.Fileinfector-9834127-0",
              "display_name": "Win.Malware.Fileinfector-9834127-0",
              "target": null
            },
            {
              "id": "Emotet b",
              "display_name": "Emotet b",
              "target": null
            },
            {
              "id": "HackTool",
              "display_name": "HackTool",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 14,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 276,
            "FileHash-SHA1": 274,
            "FileHash-SHA256": 3301,
            "URL": 2268,
            "hostname": 744,
            "CVE": 2,
            "domain": 340
          },
          "indicator_count": 7205,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "770 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a989843b7acf6d0a79ac",
          "name": "Qakbot. Again. Today. Pulled from own device. Quasar RAT, Malvertizing",
          "description": "",
          "modified": "2023-12-06T17:04:09.133000",
          "created": "2023-12-06T17:04:09.133000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 15,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 2,
            "domain": 290,
            "FileHash-SHA256": 1478,
            "hostname": 1047,
            "URL": 4055,
            "FileHash-MD5": 89,
            "FileHash-SHA1": 85,
            "email": 1,
            "FilePath": 2,
            "Mutex": 1,
            "CIDR": 1
          },
          "indicator_count": 7051,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a921559dd331e2b31e4c",
          "name": "Brontok",
          "description": "",
          "modified": "2023-12-06T17:02:25.638000",
          "created": "2023-12-06T17:02:25.638000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 21,
            "hostname": 432,
            "domain": 161,
            "FileHash-SHA256": 714,
            "URL": 750,
            "FileHash-MD5": 1400,
            "FileHash-SHA1": 706,
            "Mutex": 1,
            "FilePath": 1,
            "URI": 1
          },
          "indicator_count": 4187,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a79534c615a8f10f3380",
          "name": "Qakbot | Info Stealer | Sourced:  Part-RU",
          "description": "",
          "modified": "2023-12-06T16:55:49.669000",
          "created": "2023-12-06T16:55:49.669000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 2383,
            "hostname": 1027,
            "domain": 418,
            "URL": 2673,
            "FileHash-MD5": 99,
            "FileHash-SHA1": 98
          },
          "indicator_count": 6698,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 112,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "652cc4de6aa3848c3722e9a6",
          "name": "Qakbot. Again. Today. Pulled from own device. Quasar RAT, Malvertizing",
          "description": "Serious concerns. Approached, threatened & told no cyber tool or literature would help me by a stranger in public place seconds after a male demanded to know if I had a SQL book or knowledge, asked for phone #, a date , to buy only 2 books and come with him? WHAT? He really wanted my number not me. he got so close to, I thought he had a wearable hacktool device. Ongoing. I realized dumping when I typed, the letter T only for another search term, results = Tsara Brashears dead? Clean search browser history. No Auto DL file titled: government Qbot Qakbot?! I couldn't open it. Last night I got a free unauthorized penetration test, apps, awful attack. Adult content dumping from listed in references. . I don't attack is China based despite server locations.. It's too easy to appear to be attacking from another country. Can't make it up. Ongoing long. Major disruption. Issue predates research.",
          "modified": "2023-11-15T01:03:46.666000",
          "created": "2023-10-16T05:06:38.412000",
          "tags": [
            "whois record",
            "tsara brashears",
            "contacted",
            "threat roundup",
            "whois whois",
            "remcos",
            "iocs",
            "cyberstalking",
            "cry kill",
            "nanocore",
            "attack",
            "core",
            "qakbot",
            "azorult",
            "njrat",
            "colibri loader",
            "metro",
            "nokoyawa",
            "formbook",
            "bank",
            "installer",
            "daxin",
            "malware",
            "awful",
            "open",
            "korplug",
            "execution",
            "pe resource",
            "referrer",
            "dark power",
            "cobalt strike",
            "hacktool",
            "emotet",
            "chaos",
            "ransomexx",
            "quasar",
            "ursnif",
            "name verdict",
            "falcon sandbox",
            "sha256",
            "size",
            "sha1",
            "show process",
            "runtime process",
            "unicode",
            "crlf line",
            "ascii text",
            "mitre att",
            "type data",
            "hybrid",
            "general",
            "local",
            "path",
            "click",
            "strings",
            "nanjing xinfeng",
            "xiongmao group",
            "road descr",
            "district",
            "nanjing",
            "jiangsu",
            "china country",
            "apnic irt",
            "beijing",
            "china email",
            "copy md5",
            "copy sha1",
            "copy sha256",
            "AMERICA",
            "threat",
            "cyber criminal",
            "teams",
            "bounce",
            "Please Stop \u2205",
            "eminent threat",
            "Apple",
            "Android",
            "adversarial",
            "injection",
            "Tulach.cc malware",
            "scanning_host",
            "exploit_source",
            "ransomware"
          ],
          "references": [
            "https://www.hybrid-analysis.com/sample/06558031f63aca4f043b4770ae780337408b276df3b1e3e05b3d536839c3ad9e",
            "114.114.114.114",
            "http://login.live.com/oauth20_remoteconnect.srf",
            "a-poster.info",
            "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
            "https://www.sweetheartvideo.com/tsara-brashears/",
            "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian"
          ],
          "public": 1,
          "adversary": "[Unnamed Teams Hacking Group]",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "QakBot - S0650",
              "display_name": "QakBot - S0650",
              "target": null
            },
            {
              "id": "njRAT - S0385",
              "display_name": "njRAT - S0385",
              "target": null
            },
            {
              "id": "Remcos",
              "display_name": "Remcos",
              "target": null
            },
            {
              "id": "Wanna Cry Kill Switch",
              "display_name": "Wanna Cry Kill Switch",
              "target": null
            },
            {
              "id": "RansomEXX (Windows)",
              "display_name": "RansomEXX (Windows)",
              "target": null
            },
            {
              "id": "Nanocore RAT",
              "display_name": "Nanocore RAT",
              "target": null
            },
            {
              "id": "Azorult - S0344",
              "display_name": "Azorult - S0344",
              "target": null
            },
            {
              "id": "Daxin",
              "display_name": "Daxin",
              "target": null
            },
            {
              "id": "Dark Power",
              "display_name": "Dark Power",
              "target": null
            },
            {
              "id": "Cobalt Strike",
              "display_name": "Cobalt Strike",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1035",
              "name": "Service Execution",
              "display_name": "T1035 - Service Execution"
            },
            {
              "id": "T1043",
              "name": "Commonly Used Port",
              "display_name": "T1043 - Commonly Used Port"
            },
            {
              "id": "T1179",
              "name": "Hooking",
              "display_name": "T1179 - Hooking"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 31,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 4055,
            "FileHash-MD5": 89,
            "FileHash-SHA1": 85,
            "FileHash-SHA256": 1478,
            "domain": 290,
            "hostname": 1047,
            "FilePath": 2,
            "Mutex": 1,
            "CVE": 2,
            "CIDR": 1,
            "email": 1
          },
          "indicator_count": 7051,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "887 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "653f1d0b195d4b6afe502318",
          "name": "Brontok",
          "description": "",
          "modified": "2023-11-13T15:00:53.499000",
          "created": "2023-10-30T03:03:39.499000",
          "tags": [
            "united",
            "proxy",
            "firehol",
            "anonymizer",
            "host",
            "team malware",
            "noname057",
            "cisco umbrella",
            "heur",
            "site",
            "safe site",
            "malware",
            "alexa top",
            "million",
            "phishing site",
            "malicious site",
            "artemis",
            "installcore",
            "unsafe",
            "alexa",
            "redline stealer",
            "outbreak",
            "iobit",
            "dropper",
            "crack",
            "riskware",
            "acint",
            "conduit",
            "installpack",
            "mediaget",
            "live",
            "presenoker",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "agent",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "team",
            "unruy",
            "trojanx",
            "webshell",
            "exploit",
            "maltiverse",
            "generic malware",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "blacklist",
            "site top",
            "html",
            "malware site",
            "win64",
            "opencandy",
            "phishing",
            "fusioncore",
            "wacatac",
            "iframe",
            "downldr",
            "softcnapp",
            "cleaner",
            "tiggre",
            "vidar",
            "raccoon",
            "union",
            "xtrat",
            "bank",
            "cve201711882",
            "phish",
            "nsis",
            "xrat",
            "stealer",
            "download",
            "first",
            "vnc",
            "slimware",
            "trojanspy",
            "blacklist https",
            "Phishing Banco De Brasil",
            "remote",
            "msil, rat,revenge-rat -evasive"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "VNC",
              "display_name": "VNC",
              "target": null
            },
            {
              "id": "Slimware",
              "display_name": "Slimware",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "PUP.Bundler",
              "display_name": "PUP.Bundler",
              "target": null
            },
            {
              "id": "DangerousObject. Agent",
              "display_name": "DangerousObject. Agent",
              "target": null
            },
            {
              "id": "WebToolBar.Backdoor",
              "display_name": "WebToolBar.Backdoor",
              "target": null
            },
            {
              "id": "Gregory",
              "display_name": "Gregory",
              "target": null
            },
            {
              "id": "NBAE",
              "display_name": "NBAE",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "652ac38b58830eb3825f84e8",
          "export_count": 15,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 21,
            "domain": 161,
            "hostname": 432,
            "FileHash-MD5": 1400,
            "FileHash-SHA1": 706,
            "FileHash-SHA256": 714,
            "URL": 750,
            "Mutex": 1,
            "FilePath": 1,
            "URI": 1
          },
          "indicator_count": 4187,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 218,
          "modified_text": "888 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "652ac38b58830eb3825f84e8",
          "name": "Brontok",
          "description": "Colorado Malicious link found in Colorado Secretary of State Website. \n.\nhttps://www.sos.state.co.us/ucc/pages/biz/bizSearch.xhtml \nCritical vulnerabilities:\nVNC Server Authentication-less; The VNC server installed on the remote host allows an attacker to connect to the remote host as no authentication is required to access this service.\n\nBrontok: a computer worm running on Microsoft Windows \n\nRedLine Stealer: infostealer malware stealing password credentials, credit card numbers, etc,. \n\nVulnerable to CVE exploits: 21 CVE's over time.\ncyber criminal web attack?",
          "modified": "2023-11-13T15:00:53.499000",
          "created": "2023-10-14T16:36:27.390000",
          "tags": [
            "united",
            "proxy",
            "firehol",
            "anonymizer",
            "host",
            "team malware",
            "noname057",
            "cisco umbrella",
            "heur",
            "site",
            "safe site",
            "malware",
            "alexa top",
            "million",
            "phishing site",
            "malicious site",
            "artemis",
            "installcore",
            "unsafe",
            "alexa",
            "redline stealer",
            "outbreak",
            "iobit",
            "dropper",
            "crack",
            "riskware",
            "acint",
            "conduit",
            "installpack",
            "mediaget",
            "live",
            "presenoker",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "agent",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "team",
            "unruy",
            "trojanx",
            "webshell",
            "exploit",
            "maltiverse",
            "generic malware",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "blacklist",
            "site top",
            "html",
            "malware site",
            "win64",
            "opencandy",
            "phishing",
            "fusioncore",
            "wacatac",
            "iframe",
            "downldr",
            "softcnapp",
            "cleaner",
            "tiggre",
            "vidar",
            "raccoon",
            "union",
            "xtrat",
            "bank",
            "cve201711882",
            "phish",
            "nsis",
            "xrat",
            "stealer",
            "download",
            "first",
            "vnc",
            "slimware",
            "trojanspy",
            "blacklist https",
            "Phishing Banco De Brasil",
            "remote",
            "msil, rat,revenge-rat -evasive"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "VNC",
              "display_name": "VNC",
              "target": null
            },
            {
              "id": "Slimware",
              "display_name": "Slimware",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "PUP.Bundler",
              "display_name": "PUP.Bundler",
              "target": null
            },
            {
              "id": "DangerousObject. Agent",
              "display_name": "DangerousObject. Agent",
              "target": null
            },
            {
              "id": "WebToolBar.Backdoor",
              "display_name": "WebToolBar.Backdoor",
              "target": null
            },
            {
              "id": "Gregory",
              "display_name": "Gregory",
              "target": null
            },
            {
              "id": "NBAE",
              "display_name": "NBAE",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 23,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 21,
            "domain": 161,
            "hostname": 432,
            "FileHash-MD5": 1400,
            "FileHash-SHA1": 706,
            "FileHash-SHA256": 714,
            "URL": 750,
            "Mutex": 1,
            "FilePath": 1,
            "URI": 1
          },
          "indicator_count": 4187,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "888 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "653f1344cd54f3a86745a617",
          "name": "Qakbot | Info Stealer | Sourced: Part-RU",
          "description": "",
          "modified": "2023-10-31T16:03:29.760000",
          "created": "2023-10-30T02:21:56.497000",
          "tags": [
            "ssl certificate",
            "contacted",
            "whois record",
            "execution",
            "bundled",
            "resolutions",
            "referrer",
            "communicating",
            "network",
            "historical ssl",
            "malware",
            "twitter",
            "hacktool",
            "june"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": "6519c4b76612eda702942ad6",
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 99,
            "FileHash-SHA1": 98,
            "FileHash-SHA256": 2383,
            "URL": 2673,
            "domain": 418,
            "hostname": 1027
          },
          "indicator_count": 6698,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "901 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6519c4b76612eda702942ad6",
          "name": "Qakbot | Info Stealer | Sourced:  Part-RU",
          "description": "Info Stealer\nET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 789",
          "modified": "2023-10-31T16:03:29.760000",
          "created": "2023-10-01T19:12:55.573000",
          "tags": [
            "ssl certificate",
            "contacted",
            "whois record",
            "execution",
            "bundled",
            "resolutions",
            "referrer",
            "communicating",
            "network",
            "historical ssl",
            "malware",
            "twitter",
            "hacktool",
            "june"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 99,
            "FileHash-SHA1": 98,
            "FileHash-SHA256": 2383,
            "URL": 2673,
            "domain": 418,
            "hostname": 1027
          },
          "indicator_count": 6698,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 229,
          "modified_text": "901 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "64dc045f5344129c48c41826",
          "name": "r3.o.lencr.org",
          "description": "Malware. R3.o.lencr.org is a browser-redirecting app aka browser hijacking, that attaches itself to main browser in devices. Ability to take control over some settings. Tracker. Scammers use Lencr.org/ LetsEncrypt in websites that have  malicious content and activities. \nMalicious Activity:\nALF:Trojan:Win32/Cassini_f9070846!ibt\nALFPER:CERT:SoftwareBundler:Win32/InstallMonetizer\nTrojan:Win32/Dorv.A!rfn\nTrojan:Win32/Prepscram\nTrojan:Win32/Zbot.SIBG!MTB\nTrojanDownloader:Win32/Banload\nTrojanDownloader:Win32/Upatre.D\nTrojanDownloader:Win32/Upatre.J\nWin.Downloader.Mailru-9797354-1\nWin.Dropper.Agent-185636\nRiskware\nMalicious Adware spamming \n\n(Auto Generated Description: A complete list of malicious files has been published on the website of Cloudflare.com, the company that provides access to the service for users who use its services to access their email addresses.)",
          "modified": "2023-09-15T04:05:29.096000",
          "created": "2023-08-15T23:03:59.403000",
          "tags": [
            "as20940",
            "united",
            "trojan",
            "search",
            "passive dns",
            "urls",
            "entries",
            "dashboard",
            "browse scan",
            "endpoints all",
            "date",
            "a domains",
            "aaaa",
            "record value",
            "scan endpoints",
            "all search",
            "otx octoseek",
            "domain related",
            "showing"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 664,
            "email": 13,
            "hostname": 1352,
            "FileHash-SHA256": 1750,
            "URL": 5422,
            "FileHash-MD5": 207,
            "FileHash-SHA1": 61
          },
          "indicator_count": 9469,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "948 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "64dc046b5e8f1a8a730b4b5a",
          "name": "r3.o.lencr.org",
          "description": "Malware. R3.o.lencr.org is a browser-redirecting app aka browser hijacking, that attaches itself to main browser in devices. Ability to take control over some settings. Tracker. Scammers use Lencr.org/ LetsEncrypt in websites that have  malicious content and activities. \nMalicious Activity:\nALF:Trojan:Win32/Cassini_f9070846!ibt\nALFPER:CERT:SoftwareBundler:Win32/InstallMonetizer\nTrojan:Win32/Dorv.A!rfn\nTrojan:Win32/Prepscram\nTrojan:Win32/Zbot.SIBG!MTB\nTrojanDownloader:Win32/Banload\nTrojanDownloader:Win32/Upatre.D\nTrojanDownloader:Win32/Upatre.J\nWin.Downloader.Mailru-9797354-1\nWin.Dropper.Agent-185636\nRiskware\nMalicious Adware spamming \n\n(Auto Generated Description: A complete list of malicious files has been published on the website of Cloudflare.com, the company that provides access to the service for users who use its services to access their email addresses.)",
          "modified": "2023-09-14T22:03:31.530000",
          "created": "2023-08-15T23:04:11.199000",
          "tags": [
            "as20940",
            "united",
            "trojan",
            "search",
            "passive dns",
            "urls",
            "entries",
            "dashboard",
            "browse scan",
            "endpoints all",
            "date",
            "a domains",
            "aaaa",
            "record value",
            "scan endpoints",
            "all search",
            "otx octoseek",
            "domain related",
            "showing"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 147,
            "email": 1,
            "hostname": 364,
            "FileHash-SHA256": 260,
            "URL": 1749
          },
          "indicator_count": 2521,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 218,
          "modified_text": "948 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "64dc046a5a8beadd263d255d",
          "name": "r3.o.lencr.org",
          "description": "Malware. R3.o.lencr.org is a browser-redirecting app aka browser hijacking, that attaches itself to main browser in devices. Ability to take control over some settings. Tracker. Scammers use Lencr.org/ LetsEncrypt in websites that have  malicious content and activities. \nMalicious Activity:\nALF:Trojan:Win32/Cassini_f9070846!ibt\nALFPER:CERT:SoftwareBundler:Win32/InstallMonetizer\nTrojan:Win32/Dorv.A!rfn\nTrojan:Win32/Prepscram\nTrojan:Win32/Zbot.SIBG!MTB\nTrojanDownloader:Win32/Banload\nTrojanDownloader:Win32/Upatre.D\nTrojanDownloader:Win32/Upatre.J\nWin.Downloader.Mailru-9797354-1\nWin.Dropper.Agent-185636\nRiskware\nMalicious Adware spamming \n\n(Auto Generated Description: A complete list of malicious files has been published on the website of Cloudflare.com, the company that provides access to the service for users who use its services to access their email addresses.)",
          "modified": "2023-09-14T22:03:31.530000",
          "created": "2023-08-15T23:04:10.805000",
          "tags": [
            "as20940",
            "united",
            "trojan",
            "search",
            "passive dns",
            "urls",
            "entries",
            "dashboard",
            "browse scan",
            "endpoints all",
            "date",
            "a domains",
            "aaaa",
            "record value",
            "scan endpoints",
            "all search",
            "otx octoseek",
            "domain related",
            "showing"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 147,
            "email": 1,
            "hostname": 364,
            "FileHash-SHA256": 260,
            "URL": 1749
          },
          "indicator_count": 2521,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 218,
          "modified_text": "948 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "64dc046719495deba564bbd8",
          "name": "r3.o.lencr.org",
          "description": "Malware. R3.o.lencr.org is a browser-redirecting app aka browser hijacking, that attaches itself to main browser in devices. Ability to take control over some settings. Tracker. Scammers use Lencr.org/ LetsEncrypt in websites that have  malicious content and activities. \nMalicious Activity:\nALF:Trojan:Win32/Cassini_f9070846!ibt\nALFPER:CERT:SoftwareBundler:Win32/InstallMonetizer\nTrojan:Win32/Dorv.A!rfn\nTrojan:Win32/Prepscram\nTrojan:Win32/Zbot.SIBG!MTB\nTrojanDownloader:Win32/Banload\nTrojanDownloader:Win32/Upatre.D\nTrojanDownloader:Win32/Upatre.J\nWin.Downloader.Mailru-9797354-1\nWin.Dropper.Agent-185636\nRiskware\nMalicious Adware spamming \n\n(Auto Generated Description: A complete list of malicious files has been published on the website of Cloudflare.com, the company that provides access to the service for users who use its services to access their email addresses.)",
          "modified": "2023-09-14T22:03:31.530000",
          "created": "2023-08-15T23:04:07.914000",
          "tags": [
            "as20940",
            "united",
            "trojan",
            "search",
            "passive dns",
            "urls",
            "entries",
            "dashboard",
            "browse scan",
            "endpoints all",
            "date",
            "a domains",
            "aaaa",
            "record value",
            "scan endpoints",
            "all search",
            "otx octoseek",
            "domain related",
            "showing"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 147,
            "email": 1,
            "hostname": 364,
            "FileHash-SHA256": 260,
            "URL": 1749
          },
          "indicator_count": 2521,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 218,
          "modified_text": "948 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "64dc046717ad683a5239a8a6",
          "name": "r3.o.lencr.org",
          "description": "Malware. R3.o.lencr.org is a browser-redirecting app aka browser hijacking, that attaches itself to main browser in devices. Ability to take control over some settings. Tracker. Scammers use Lencr.org/ LetsEncrypt in websites that have  malicious content and activities. \nMalicious Activity:\nALF:Trojan:Win32/Cassini_f9070846!ibt\nALFPER:CERT:SoftwareBundler:Win32/InstallMonetizer\nTrojan:Win32/Dorv.A!rfn\nTrojan:Win32/Prepscram\nTrojan:Win32/Zbot.SIBG!MTB\nTrojanDownloader:Win32/Banload\nTrojanDownloader:Win32/Upatre.D\nTrojanDownloader:Win32/Upatre.J\nWin.Downloader.Mailru-9797354-1\nWin.Dropper.Agent-185636\nRiskware\nMalicious Adware spamming \n\n(Auto Generated Description: A complete list of malicious files has been published on the website of Cloudflare.com, the company that provides access to the service for users who use its services to access their email addresses.)",
          "modified": "2023-09-14T22:03:31.530000",
          "created": "2023-08-15T23:04:07.114000",
          "tags": [
            "as20940",
            "united",
            "trojan",
            "search",
            "passive dns",
            "urls",
            "entries",
            "dashboard",
            "browse scan",
            "endpoints all",
            "date",
            "a domains",
            "aaaa",
            "record value",
            "scan endpoints",
            "all search",
            "otx octoseek",
            "domain related",
            "showing"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 147,
            "email": 1,
            "hostname": 364,
            "FileHash-SHA256": 260,
            "URL": 1749
          },
          "indicator_count": 2521,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 218,
          "modified_text": "948 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "64dc0463e890964b99513901",
          "name": "r3.o.lencr.org",
          "description": "Malware. R3.o.lencr.org is a browser-redirecting app aka browser hijacking, that attaches itself to main browser in devices. Ability to take control over some settings. Tracker. Scammers use Lencr.org/ LetsEncrypt in websites that have  malicious content and activities. \nMalicious Activity:\nALF:Trojan:Win32/Cassini_f9070846!ibt\nALFPER:CERT:SoftwareBundler:Win32/InstallMonetizer\nTrojan:Win32/Dorv.A!rfn\nTrojan:Win32/Prepscram\nTrojan:Win32/Zbot.SIBG!MTB\nTrojanDownloader:Win32/Banload\nTrojanDownloader:Win32/Upatre.D\nTrojanDownloader:Win32/Upatre.J\nWin.Downloader.Mailru-9797354-1\nWin.Dropper.Agent-185636\nRiskware\nMalicious Adware spamming \n\n(Auto Generated Description: A complete list of malicious files has been published on the website of Cloudflare.com, the company that provides access to the service for users who use its services to access their email addresses.)",
          "modified": "2023-09-14T22:03:31.530000",
          "created": "2023-08-15T23:04:03.466000",
          "tags": [
            "as20940",
            "united",
            "trojan",
            "search",
            "passive dns",
            "urls",
            "entries",
            "dashboard",
            "browse scan",
            "endpoints all",
            "date",
            "a domains",
            "aaaa",
            "record value",
            "scan endpoints",
            "all search",
            "otx octoseek",
            "domain related",
            "showing"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 147,
            "email": 1,
            "hostname": 364,
            "FileHash-SHA256": 260,
            "URL": 1749
          },
          "indicator_count": 2521,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 218,
          "modified_text": "948 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "Overlaps: 4 others mailed information email address.",
        "AS36081 State of Colorado General Government Computer",
        "Crowdsourced YARA rules Matches: IMPLANT_4_v3_AlternativeRule from ruleset apt_grizzlybear_uscert by Florian Roth (Nextron Systems)",
        "Crowdsourced YARA rules Matches:  rule INDICATOR_EXE_Packed_MEW from ruleset indicator_packed by ditekSHen",
        "Detections Executable and linking format (ELF) file download Over HTTP |",
        "Notable: Mirai - 192.70.175.110 Security Operations (DORA?) oit_isocsecurity@state.co.us | state.co.us | Reverse DNS dns1.state.co.us",
        "Unix.Trojan.Mirai-6976991-0 : FileHash-SHA256 a282f250e59f8754335993293bfbfcc154cdb67ff0e234162f40a6cce5c4290c",
        "FileHash-SHA256:  a0f50a7b0f9717589000b3414017bdcfcb9d3f6a3e5e03fe49c4dc8035e0d25c",
        "Domains Contacted: ntp.ubuntu.com | IDS Detections GNU/Linux APT User-Agent Outbound likely related to package management | 91.189.89.198",
        "https://www.redtube.com/ServiceLogin?hl=de&passive=true&continue=https://www.redtube.ccom/%3Fdata%3Dkevinharden1978%2540gmail.com%252Fkevinharden1978%2B.search",
        "cu-payment-porch.pdv-3.ap-southeast-2.production.jet-external.com | qa.proxy.cognito.tigomoney.io | https://trackon.fr/track/clique",
        "CnC IP: https://otx.alienvault.com/indicator/ip/142.202.242.45",
        "IDS Detections:  MVPower DVR Shell UCE Mirai  | Variant User-Agent (Outbound) JAWS Webserver Unauthenticated Shell Command Execution",
        "Yara Detections: UPXProtectorv10x2 ,  UPX ,  ELFHighEntropy ,  elf_empty_sections Alerts: dead_host | ELF:Mirai-AII\\ [Trj]",
        "IDS Detections: 401TRG Generic Webshell Request - POST with wget in body HTTP traffic on port 443 (POST) ...",
        "https://www.hybrid-analysis.com/sample/06558031f63aca4f043b4770ae780337408b276df3b1e3e05b3d536839c3ad9e",
        "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
        "Unix.Mirai Botnet: https://otx.alienvault.com/indicator/hostname/botnet.ngocronglau.xyz",
        "Crowdsourced YARA rules Matches: INDICATOR_EXE_Packed_MEW from ruleset indicator_packed by ditekSHen",
        "wallpapers-nature.com",
        "https://www.sweetheartvideo.com/tsara-brashears/",
        "https://a-a.redirector.navexglobal.com/navex_hosting/404.html",
        "FileHash-SHA256 : 256760a17dea7794ebbfb5c54e7e74d0b53fd9e079e43be0b9b6e3df7eb14a47be9",
        "Noted: Calls redirected, call jumps ahead of 25+ callers in wait, keeps getting same agent, told approved for services never applied for or received",
        "Yara Detections: gafgyt IP\u2019s Contacted:  91.189.89.198 Domains Contacted :ntp.ubuntu.com",
        "redirect.wuxs.icu",
        "https://otx.alienvault.com/indicator/file/02b19639ad1efa59e77f45d130447c05bd2466e26a657cb9cc6ac2e8b30a0026",
        "https://otx.alienvault.com/indicator/domain/bunny.net",
        "Matches rule Linux_Trojan_Mirai_6a77af0f from ruleset Linux_Trojan_Mirai by Elastic Security | botnet.ngocronglau.xyz",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "a-poster.info",
        "AV Detection: ELF:Mirai-GH\\ [Trj]",
        "In this instance a senior citizen needing assisted living resources redirected & social engineered by addresses originated from: jefferson.co.us",
        "https://otx.alienvault.com/indicator/file/001546d210a35b7c4c072b6c265f621cf4a9abdd152741d9b58deae2be204355",
        "CS Sigma: Matches rule Python Initiated Connection by frack113",
        "ELF:Mirai-AII\\ [Trj]  | FileHash-SHA256:  760a17dea7794ebbfb5c54e7e74d0b53fd9e079e43be0b9b6e3df7eb14a47be9",
        "77882 IP\u2019s Contacted: 1.1.69.67  1.10.237.208  1.101.233.31  1.102.46.59  1.103.37.126  1.105.106.252  1.106.108.182  1.106.193.143  1.109.132.165  1.11.116.209",
        "Ransom:Win32/WannaCrypt.H",
        "Related Domains: townofignacio.com | coloradoagriculture.com | coloradoworkforce.com | coworkforce.com | coloradoccjj.com | dns1.state.co.us",
        "https://botnet.ngocronglau.xyz > link discovered by an Alienvault user who notified me they found it researching message from am active user.",
        "IDS Detections: Mirai Variant User-Agent (Inbound) HackingTrio UA (Hello, World)",
        "https://otx.alienvault.com/indicator/ip/125.235.4.59",
        "Domain Name: IUQERFSODP9IFJAPOSDFJHGOSURIJFAEWRWERGWEA.COM  Emails: BotnetSinkhole@gmail.com",
        "iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com | CVE-2017-0147",
        "https://us.thebigjobsite.com/redirectfeedjob?jobid=2A5F97A6BAE0AA90DC418C2119E1E0EB&source=onestepjobsxmlus&utm_source=onestepjobsxmlus&jobSiteK",
        "https://otx.alienvault.com/indicator/hostname/botnet.ngocronglau.xyz",
        "https://otx.alienvault.com/indicator/file/2b5deac6176124ee1f7d237f070c39b03c964fce9a9fba0aaa1bce102710d2e0",
        "https://engage.navexglobal.com/topclass1/login.do?redirectTo=/expand.do?template=JasperReports&view=library",
        "ELF:Mirai-AII\\ [Trj] | FileHash-SHA256 760a17dea7794ebbfb5c54e7e74d0b53fd9e079e43be0b9b6e3df7eb14a47be9",
        "Crowdsourced YARA rules Matches: SUSP_Unsigned_OSPPSVC from ruleset gen_sign_anomalies by Florian Roth (Nextron Systems",
        "https://www.rapidinterviews.com/api/jobs/redirect/public-transit-bus-drivers-with-utah-transit-authority-in-stansbury-park-apc-1932",
        "https://otx.alienvault.com/indicator/ip/210.211.117.205",
        "https://otx.alienvault.com/indicator/ip/143.244.50.212",
        "Alerts: dead_host network_icmp tcp_syn_scan nolookup_communication network_cnc_http network_http p2p_cnc writes_to_stdout",
        "Through research I did notice many references to target I'm researching for. Phishing/Injection attempt? I didn't click on links.",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian",
        "114.114.114.114",
        "Yara Detections Mirai_Botnet_Malware Alerts: dead_host network_icmp osquery_detection nolookup_communication",
        "Emails: abuse@namecheap.com Name: Botnet Sinkhole  | Address: Botnet Sinkhole City: Los Angeles Country: USA",
        "Dnssec:Unsigned | Name Servers | BRUCE.NS.CLOUDFLARE.COM",
        "Was anyone else notified? I'm not sure why I was.",
        "http://login.live.com/oauth20_remoteconnect.srf",
        "IDS Detections: Huawei Remote Command Execution (CVE-2017-17215) Huawei Remote Command Execution - Outbound (CVE-2017-17215) Huawei HG532 RCE Vulnerability (CVE-2017-17215) Mirai Variant User-Agent (Inbound) HackingTrio UA (Hello, World) 401TRG Generic Webshell Request - POST with wget in body HTTP traffic on port 443 (POST",
        "Crowdsourced YARA rules Matches: Matches rule IMPLANT_4_v3_AlternativeRule from ruleset apt_grizzlybear_uscert by Florian Roth (Nextron Systems",
        "Exploits: IPv4 20.99.186.246 | 52.109.0.140 | CVE CVE-2023-22518 | Trojans: AgentTesla.KM , Cobalt Strike , Ransom: WannaCrypt , Malware: Dxqo"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": []
        },
        "other": {
          "adversary": [
            "[Unnamed Teams Hacking Group]"
          ],
          "malware_families": [
            "Ddos:linux/mirai",
            "A variant of win32/flystudio.packed.ad potentially unwanted",
            "Alf:e5.spikeaex.rhh_mcv",
            "Generic",
            "Maltiverse",
            "Trojan.mirai/fszhh",
            "W32/pidgeon-a",
            "Wanna cry kill switch",
            "Vnc",
            "Win32:trojan-gen",
            "Backdoor:win32/fynloski",
            "Win.packer.pkr_ce1a-9980177-0",
            "Trojanspy:win32/gucotut.a",
            "Win.malware.dxqo-6984072-0",
            "Win.malware.trojanx-9862538-0",
            "Alf:heraklezeval:trojan:win32/clipbanker",
            "Elf:mirai-gh\\ [trj]",
            "Win.trojan.cobaltstrike-9044898-1",
            "Alf:heraklezeval:trojan:win32/zombie",
            "Worm:win32/sfone",
            "Flyagent l",
            "Remcos",
            "Ransomexx (windows)",
            "Nanocore rat",
            "Trojan:win32/cryptinject.sd!mtb",
            "Slimware",
            "Daxin",
            "Webtoolbar.backdoor",
            "Nbae",
            "Emotet b",
            "Virus.ramnit/nimnul",
            "Dark power",
            "Alf:trojan:msil/agenttesla.km",
            "Variant.zusy.151902",
            "Atros3.ldj",
            "Trojan.mirai/fedr",
            "Qakbot - s0650",
            "Win.malware.bbabdcdc-7358312-0",
            "Worm:win32/mofksys",
            "Azorult - s0344",
            "Ransom:win32/wannacrypt",
            "Win32:pwsx-gen\\ [trj]",
            "Telper:ddos:linux/lightaidra",
            "Quasar rat",
            "Win.dropper.autoit-6688751-0",
            "Gregory",
            "Android/ave.mirai.fszhh",
            "Dangerousobject. agent",
            "Cobalt strike",
            "Trojanspy",
            "Hacktool",
            "Pup.bundler",
            "Win-trojan/malpacked5.gen",
            "Win32:malware-gen",
            "Mirai",
            "Win.dropper.dridex-9986041-0",
            "Win.malware.fileinfector-9834127-0",
            "Unix.trojan.mirai-9441505-0",
            "Njrat - s0385",
            "Win.dropper.bulz-9910065-0",
            "Worm:win32/sfone.a"
          ],
          "industries": [
            "Telecom"
          ]
        }
      }
    },
    "false_positive": []
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 23,
  "pulses": [
    {
      "id": "66ce3eb4b4f1fc9eafb4b572",
      "name": "DDoS:Linux/Lightaidra | Mirai Botnet on US a State Computer",
      "description": "*Mirai Botnet on Colorado State computer. Im starting to wonder if potential problem cases are diverted to a botnet.\n1. Overlaps with a Colorado victim. Similar issues. I Recently became a senior in expensive Colorado, never compensated for workers compensation injury exacerbated when suddenly tossed a 60 lb weighted ball under care. Denied diagnoses of severe injury after toss. Complained, case closed, lawyers denied case after accepting case. Referred to JeffCo seeking assisted living resources. Was sent various packets with a variety of phone numbers, email addresses, etc. She keeps speaking to same man no matter what option chosen. Denied workforce training due to severity of injuries, No SSI or SSDI until years later. \n2. I can't pulse half of what I've researched without using multiple resources. No more 'contacted' made when new serious issues found. Pulses being modified. I rarely modify any pulse.",
      "modified": "2024-09-26T20:01:27.723000",
      "created": "2024-08-27T21:01:40.251000",
      "tags": [
        "memcommit",
        "read c",
        "nospltezraxuf",
        "writeconsolea",
        "write",
        "CVE-2023-22518",
        "tesla",
        "ye ye",
        "incapril",
        "yed ye",
        "yet ye",
        "yexe ye",
        "security",
        "search",
        "function read",
        "dll read",
        "installer",
        "april",
        "copy",
        "win32",
        "template",
        "creation date",
        "servers",
        "passive dns",
        "urls",
        "name servers",
        "scan endpoints",
        "all scoreblue",
        "hostname",
        "pulse pulses",
        "date",
        "windows",
        "medium",
        "shellexecuteexw",
        "hash",
        "show",
        "writeconsolew",
        "entries",
        "displayname",
        "sddl",
        "service",
        "august",
        "malware",
        "url http",
        "http",
        "ip address",
        "related nids",
        "files location",
        "domain",
        "status",
        "nxdomain",
        "whitelisted",
        "certificate",
        "backdoor",
        "record value",
        "body",
        "as15133 verizon",
        "united",
        "unknown",
        "mtb aug",
        "gmt server",
        "ecacc sed5906",
        "ransom",
        "trojan",
        "high",
        "cname",
        "as8075",
        "ipv4",
        "files",
        "asn as55720",
        "date hash",
        "default",
        "delete",
        "yara detections",
        "msvisualcpp60",
        "related pulses",
        "rootkit",
        "as16276",
        "canada unknown",
        "pulses",
        "expiration date",
        "exploit",
        "showing",
        "aaaa",
        "france unknown",
        "mtb sep",
        "worm",
        "msil",
        "mirai",
        "as36081 state",
        "reverse dns",
        "port",
        "destination",
        "south korea",
        "taiwan as3462",
        "as4766 korea",
        "asnone",
        "japan as17676",
        "china as4134",
        "china as4837",
        "file samples",
        "files matching",
        "next",
        "copyright",
        "levelblue",
        "as20940",
        "as15169 google",
        "ave suite",
        "purpose p5",
        "country united",
        "code us",
        "as41231",
        "united kingdom",
        "ddos",
        "sha256",
        "filehash",
        "av detections",
        "location london",
        "great britain",
        "gnulinux apt",
        "yara rule",
        "ids detections",
        "top source",
        "address",
        "as23969",
        "thailand"
      ],
      "references": [
        "In this instance a senior citizen needing assisted living resources redirected & social engineered by addresses originated from: jefferson.co.us",
        "Noted: Calls redirected, call jumps ahead of 25+ callers in wait, keeps getting same agent, told approved for services never applied for or received",
        "Exploits: IPv4 20.99.186.246 | 52.109.0.140 | CVE CVE-2023-22518 | Trojans: AgentTesla.KM , Cobalt Strike , Ransom: WannaCrypt , Malware: Dxqo",
        "Domain Name: IUQERFSODP9IFJAPOSDFJHGOSURIJFAEWRWERGWEA.COM  Emails: BotnetSinkhole@gmail.com",
        "Emails: abuse@namecheap.com Name: Botnet Sinkhole  | Address: Botnet Sinkhole City: Los Angeles Country: USA",
        "Dnssec:Unsigned | Name Servers | BRUCE.NS.CLOUDFLARE.COM",
        "Notable: Mirai - 192.70.175.110 Security Operations (DORA?) oit_isocsecurity@state.co.us | state.co.us | Reverse DNS dns1.state.co.us",
        "Unix.Trojan.Mirai-6976991-0 : FileHash-SHA256 a282f250e59f8754335993293bfbfcc154cdb67ff0e234162f40a6cce5c4290c",
        "ELF:Mirai-AII\\ [Trj] | FileHash-SHA256 760a17dea7794ebbfb5c54e7e74d0b53fd9e079e43be0b9b6e3df7eb14a47be9",
        "Overlaps: 4 others mailed information email address.",
        "Ransom:Win32/WannaCrypt.H",
        "iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com | CVE-2017-0147",
        "AS36081 State of Colorado General Government Computer",
        "Yara Detections Mirai_Botnet_Malware Alerts: dead_host network_icmp osquery_detection nolookup_communication",
        "ELF:Mirai-AII\\ [Trj]  | FileHash-SHA256:  760a17dea7794ebbfb5c54e7e74d0b53fd9e079e43be0b9b6e3df7eb14a47be9",
        "Detections Executable and linking format (ELF) file download Over HTTP |",
        "FileHash-SHA256 : 256760a17dea7794ebbfb5c54e7e74d0b53fd9e079e43be0b9b6e3df7eb14a47be9",
        "Yara Detections: UPXProtectorv10x2 ,  UPX ,  ELFHighEntropy ,  elf_empty_sections Alerts: dead_host | ELF:Mirai-AII\\ [Trj]",
        "77882 IP\u2019s Contacted: 1.1.69.67  1.10.237.208  1.101.233.31  1.102.46.59  1.103.37.126  1.105.106.252  1.106.108.182  1.106.193.143  1.109.132.165  1.11.116.209",
        "Domains Contacted: ntp.ubuntu.com | IDS Detections GNU/Linux APT User-Agent Outbound likely related to package management | 91.189.89.198",
        "Yara Detections: gafgyt IP\u2019s Contacted:  91.189.89.198 Domains Contacted :ntp.ubuntu.com",
        "FileHash-SHA256:  a0f50a7b0f9717589000b3414017bdcfcb9d3f6a3e5e03fe49c4dc8035e0d25c",
        "Related Domains: townofignacio.com | coloradoagriculture.com | coloradoworkforce.com | coworkforce.com | coloradoccjj.com | dns1.state.co.us",
        "https://www.rapidinterviews.com/api/jobs/redirect/public-transit-bus-drivers-with-utah-transit-authority-in-stansbury-park-apc-1932",
        "https://us.thebigjobsite.com/redirectfeedjob?jobid=2A5F97A6BAE0AA90DC418C2119E1E0EB&source=onestepjobsxmlus&utm_source=onestepjobsxmlus&jobSiteK",
        "redirect.wuxs.icu",
        "https://a-a.redirector.navexglobal.com/navex_hosting/404.html",
        "https://engage.navexglobal.com/topclass1/login.do?redirectTo=/expand.do?template=JasperReports&view=library"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "ALF:Trojan:MSIL/AgentTesla.KM",
          "display_name": "ALF:Trojan:MSIL/AgentTesla.KM",
          "target": null
        },
        {
          "id": "Win.Trojan.CobaltStrike-9044898-1",
          "display_name": "Win.Trojan.CobaltStrike-9044898-1",
          "target": null
        },
        {
          "id": "Win.Malware.Dxqo-6984072-0",
          "display_name": "Win.Malware.Dxqo-6984072-0",
          "target": null
        },
        {
          "id": "Ransom:Win32/WannaCrypt",
          "display_name": "Ransom:Win32/WannaCrypt",
          "target": "/malware/Ransom:Win32/WannaCrypt"
        },
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "Backdoor:Win32/Fynloski",
          "display_name": "Backdoor:Win32/Fynloski",
          "target": "/malware/Backdoor:Win32/Fynloski"
        },
        {
          "id": "Worm:Win32/Mofksys",
          "display_name": "Worm:Win32/Mofksys",
          "target": "/malware/Worm:Win32/Mofksys"
        },
        {
          "id": "TELPER:DDoS:Linux/Lightaidra",
          "display_name": "TELPER:DDoS:Linux/Lightaidra",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1410",
          "name": "Network Traffic Capture or Redirection",
          "display_name": "T1410 - Network Traffic Capture or Redirection"
        },
        {
          "id": "T1036.004",
          "name": "Masquerade Task or Service",
          "display_name": "T1036.004 - Masquerade Task or Service"
        },
        {
          "id": "T1009",
          "name": "Binary Padding",
          "display_name": "T1009 - Binary Padding"
        },
        {
          "id": "T1499",
          "name": "Endpoint Denial of Service",
          "display_name": "T1499 - Endpoint Denial of Service"
        },
        {
          "id": "T1498",
          "name": "Network Denial of Service",
          "display_name": "T1498 - Network Denial of Service"
        },
        {
          "id": "T1464",
          "name": "Jamming or Denial of Service",
          "display_name": "T1464 - Jamming or Denial of Service"
        }
      ],
      "industries": [
        "Telecom"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 18,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CVE": 2,
        "FileHash-MD5": 675,
        "FileHash-SHA1": 664,
        "FileHash-SHA256": 3327,
        "URL": 2448,
        "domain": 656,
        "hostname": 1281,
        "email": 11
      },
      "indicator_count": 9064,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 229,
      "modified_text": "570 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "66b8fe985a7460e0ee01be8a",
      "name": "r3.o.lencr.org",
      "description": "",
      "modified": "2024-08-11T18:14:13.378000",
      "created": "2024-08-11T18:10:32.276000",
      "tags": [
        "as20940",
        "united",
        "trojan",
        "search",
        "passive dns",
        "urls",
        "entries",
        "dashboard",
        "browse scan",
        "endpoints all",
        "date",
        "a domains",
        "aaaa",
        "record value",
        "scan endpoints",
        "all search",
        "otx octoseek",
        "domain related",
        "showing"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1003",
          "name": "OS Credential Dumping",
          "display_name": "T1003 - OS Credential Dumping"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "64dc045f5344129c48c41826",
      "export_count": 9,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 664,
        "email": 13,
        "hostname": 1352,
        "FileHash-SHA256": 2550,
        "URL": 5422,
        "FileHash-MD5": 761,
        "FileHash-SHA1": 615
      },
      "indicator_count": 11377,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 224,
      "modified_text": "616 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "6671e5844c155814e69ba4dd",
      "name": "Mirai Botnet Injection  affecting Alienvault.",
      "description": "It's unclear if some users or service itself is injecting users or if service is under a Mirai attack. I found evidence of both outbound & inbound activities.  *Crowdsourced context: Activity related to MIRAI - according to source Cluster25 - \nThis IPV4 is used by MIRAI. Mirai is a malware that created a big botnet of networked devices running Linux making them remotely controlled bots that can be used for large-scale network attacks. It primarily targets online consumer devices such as IP cameras and home routers.\n#zbetcheckin tracker\nDownloaded on 2023-11-07 19:34:59 UTC\nSRC URL : http://171.228.209.167/x86_64\nIP : 171.228.209.167\nAS : AS7552 Viettel Group\nYARA : #contentis_base64 #debuggerpattern__rdtsc #ip #math_entropy_6 #is__elf #http #ft_elf #executable_elf64",
      "modified": "2024-07-18T19:02:50.386000",
      "created": "2024-06-18T19:52:36.849000",
      "tags": [
        "problems",
        "threat network",
        "infrastructure",
        "historical ssl",
        "microsoft stuff",
        "domain check",
        "referrer",
        "generic malware",
        "injector",
        "no data",
        "tag count",
        "fri mar",
        "analyzer threat",
        "ip summary",
        "url summary",
        "summary",
        "downloader",
        "generic",
        "united",
        "as14315",
        "passive dns",
        "scan endpoints",
        "all scoreblue",
        "ipv4",
        "pulse pulses",
        "urls",
        "files",
        "america asn",
        "unknown",
        "ransom",
        "body",
        "coinminer",
        "malware generic",
        "wed jan",
        "first",
        "status",
        "creation date",
        "search",
        "date",
        "expiration date",
        "name servers",
        "next",
        "mirai",
        "yara detections",
        "filehash",
        "av detections",
        "ids detections",
        "alerts",
        "analysis date",
        "file score",
        "reverse dns",
        "location lao",
        "viet nam",
        "domain",
        "all search",
        "otx scoreblue",
        "hostname",
        "files ip",
        "lazarus",
        "as7552 viettel",
        "vietnam unknown",
        "win32",
        "worm",
        "win32sfone jul",
        "vietnam",
        "etag",
        "telecom",
        "as16625 akamai",
        "as20940",
        "germany",
        "united kingdom",
        "singapore",
        "as20546 soprado",
        "hong kong",
        "as45102 alibaba",
        "taobao network",
        "cname",
        "aaaa",
        "entries",
        "showing",
        "a domains",
        "as38731 vietel",
        "plesk",
        "a li",
        "default page",
        "plesk a",
        "mirai variant",
        "useragent",
        "apache",
        "accept",
        "hello",
        "create c",
        "read c",
        "delete",
        "write",
        "default",
        "create",
        "show",
        "medium",
        "dock",
        "execution",
        "copy",
        "xport",
        "address",
        "as131392",
        "cape",
        "orsam",
        "malware",
        "script urls",
        "moved",
        "record value",
        "cisco umbrella",
        "site",
        "heur",
        "alexa top",
        "safe site",
        "million",
        "malicious site",
        "phishing site",
        "malicious url",
        "opencandy",
        "exploit",
        "agent",
        "phishing",
        "acint",
        "iframe",
        "crack",
        "conduit",
        "artemis",
        "riskware",
        "mimikatz",
        "swrort",
        "downldr",
        "systweak",
        "behav",
        "tiggre",
        "genkryptik",
        "presenoker",
        "filetour",
        "cleaner",
        "wacatac",
        "outbreak",
        "installcore",
        "iobit",
        "rostpay",
        "dropper",
        "mediaget",
        "related pulses",
        "whois",
        "related",
        "msil",
        "zombie",
        "dridex",
        "location viet",
        "pulse submit",
        "url analysis",
        "content",
        "google tag",
        "utc gcfezl5ynvb",
        "utc na",
        "utc google",
        "analytics na",
        "utc linkedin",
        "insight tag",
        "deep malware",
        "iframes",
        "trackers",
        "external-resources",
        "text/html",
        "elf info",
        "header class",
        "elf64 data",
        "header version",
        "os abi",
        "unix",
        "v object",
        "file type",
        "exec",
        "executable file",
        "progbits",
        "type address",
        "offset size",
        "flags",
        "null",
        "nobits",
        "strtab",
        "ip detections",
        "country",
        "us bundled",
        "detections file",
        "name",
        "graph summary",
        "get hello",
        "jaws webserver",
        "outbound",
        "mvpower dvr",
        "shell uce",
        "inbound",
        "activity mirai",
        "mirai",
        "info",
        "performs dns",
        "mitre att",
        "access ta0006",
        "os credential",
        "dumping t1003",
        "enumerates",
        "command",
        "control ta0011",
        "protocol t1071",
        "protocol t1095",
        "relacionada",
        "mirai malware",
        "mirai 04022024",
        "nciipc",
        "ip reputaion",
        "msie",
        "windows nt",
        "slcc2",
        "media center",
        "china as37963",
        "simplified",
        "trojanspy",
        "virustotal",
        "panda",
        "detections type",
        "shell",
        "javascript",
        "dns replication",
        "files referring",
        "lookups",
        "as7552",
        "vhash",
        "ssdeep",
        "magic elf",
        "sysv",
        "trid elf",
        "executable",
        "linux",
        "elf executable",
        "loccel1",
        "echobot",
        "bashlite",
        "malwarebazaar",
        "echobot malware",
        "win32 exe",
        "magic msdos",
        "pe32 executable",
        "intel",
        "ms windows",
        "trid dos",
        "compiler",
        "delphi",
        "serial number",
        "algorithm",
        "thumbprint",
        "valid from",
        "code signing",
        "from",
        "microsoft root",
        "name microsoft",
        "verisign time",
        "stamping",
        "contained",
        "info sections",
        "name virtual",
        "address virtual",
        "size raw",
        "size entropy",
        "md5 chi2",
        "regsetvalueexa",
        "type rtrcdata",
        "sha256 file",
        "threat roundup",
        "october",
        "august",
        "june",
        "september",
        "highly targeted",
        "cyberstalking",
        "round",
        "december",
        "sneaky server",
        "facebook",
        "stealer",
        "agent tesla",
        "pony",
        "april",
        "whitelisted",
        "encrypt",
        "targeting",
        "tsara brashears",
        "otx",
        "alienvault",
        "memcommit",
        "regsz",
        "regopenkeyexw",
        "english",
        "module load",
        "t1129",
        "t1082",
        "windows module",
        "dlls",
        "redline stealer",
        "updater",
        "v3 serial",
        "number",
        "subject public",
        "key info",
        "key algorithm",
        "key identifier",
        "subject key",
        "identifier",
        "x509v3 key",
        "data redacted",
        "cloudflare",
        "redacted",
        "for privacy",
        "code",
        "server",
        "registrar abuse",
        "redacted for",
        "postal code",
        "registrant name",
        "red team",
        "shit",
        "logistics",
        "cyber defense",
        "gootloader",
        "march",
        "sinkhole",
        "just",
        "ramnit",
        "netsupport rat",
        "microsoft",
        "vault",
        "karen",
        "gifts",
        "hidden privacy",
        "threats",
        "malicious",
        "darkgate",
        "core",
        "hacktool",
        "emotet"
      ],
      "references": [
        "https://botnet.ngocronglau.xyz > link discovered by an Alienvault user who notified me they found it researching message from am active user.",
        "https://otx.alienvault.com/indicator/file/02b19639ad1efa59e77f45d130447c05bd2466e26a657cb9cc6ac2e8b30a0026",
        "https://otx.alienvault.com/indicator/file/001546d210a35b7c4c072b6c265f621cf4a9abdd152741d9b58deae2be204355",
        "https://otx.alienvault.com/indicator/hostname/botnet.ngocronglau.xyz",
        "Unix.Mirai Botnet: https://otx.alienvault.com/indicator/hostname/botnet.ngocronglau.xyz",
        "CnC IP: https://otx.alienvault.com/indicator/ip/142.202.242.45",
        "https://otx.alienvault.com/indicator/domain/bunny.net",
        "https://otx.alienvault.com/indicator/ip/210.211.117.205",
        "https://otx.alienvault.com/indicator/ip/143.244.50.212",
        "https://otx.alienvault.com/indicator/ip/125.235.4.59",
        "AV Detection: ELF:Mirai-GH\\ [Trj]",
        "IDS Detections:  MVPower DVR Shell UCE Mirai  | Variant User-Agent (Outbound) JAWS Webserver Unauthenticated Shell Command Execution",
        "IDS Detections: Huawei Remote Command Execution (CVE-2017-17215) Huawei Remote Command Execution - Outbound (CVE-2017-17215) Huawei HG532 RCE Vulnerability (CVE-2017-17215) Mirai Variant User-Agent (Inbound) HackingTrio UA (Hello, World) 401TRG Generic Webshell Request - POST with wget in body HTTP traffic on port 443 (POST",
        "IDS Detections: Mirai Variant User-Agent (Inbound) HackingTrio UA (Hello, World)",
        "IDS Detections: 401TRG Generic Webshell Request - POST with wget in body HTTP traffic on port 443 (POST) ...",
        "Alerts: dead_host network_icmp tcp_syn_scan nolookup_communication network_cnc_http network_http p2p_cnc writes_to_stdout",
        "Matches rule Linux_Trojan_Mirai_6a77af0f from ruleset Linux_Trojan_Mirai by Elastic Security | botnet.ngocronglau.xyz",
        "https://otx.alienvault.com/indicator/file/2b5deac6176124ee1f7d237f070c39b03c964fce9a9fba0aaa1bce102710d2e0",
        "cu-payment-porch.pdv-3.ap-southeast-2.production.jet-external.com | qa.proxy.cognito.tigomoney.io | https://trackon.fr/track/clique",
        "Crowdsourced YARA rules Matches:  rule INDICATOR_EXE_Packed_MEW from ruleset indicator_packed by ditekSHen",
        "Crowdsourced YARA rules Matches: INDICATOR_EXE_Packed_MEW from ruleset indicator_packed by ditekSHen",
        "Crowdsourced YARA rules Matches: SUSP_Unsigned_OSPPSVC from ruleset gen_sign_anomalies by Florian Roth (Nextron Systems",
        "Crowdsourced YARA rules Matches: IMPLANT_4_v3_AlternativeRule from ruleset apt_grizzlybear_uscert by Florian Roth (Nextron Systems)",
        "Crowdsourced YARA rules Matches: Matches rule IMPLANT_4_v3_AlternativeRule from ruleset apt_grizzlybear_uscert by Florian Roth (Nextron Systems",
        "https://wallpapers-nature.com/tsara-brashears/tse1-mm-bing-net",
        "wallpapers-nature.com",
        "Was anyone else notified? I'm not sure why I was.",
        "Through research I did notice many references to target I'm researching for. Phishing/Injection attempt? I didn't click on links.",
        "CS Sigma: Matches rule Python Initiated Connection by frack113"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Generic",
          "display_name": "Generic",
          "target": null
        },
        {
          "id": "Unix.Trojan.Mirai-9441505-0",
          "display_name": "Unix.Trojan.Mirai-9441505-0",
          "target": null
        },
        {
          "id": "ALF:E5.SpikeAex.rhh_mcv",
          "display_name": "ALF:E5.SpikeAex.rhh_mcv",
          "target": null
        },
        {
          "id": "Win.Dropper.Bulz-9910065-0",
          "display_name": "Win.Dropper.Bulz-9910065-0",
          "target": null
        },
        {
          "id": "Win32:Malware-gen",
          "display_name": "Win32:Malware-gen",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
          "display_name": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
          "target": null
        },
        {
          "id": "Win.Dropper.Autoit-6688751-0",
          "display_name": "Win.Dropper.Autoit-6688751-0",
          "target": null
        },
        {
          "id": "ELF:Mirai-GH\\ [Trj]",
          "display_name": "ELF:Mirai-GH\\ [Trj]",
          "target": null
        },
        {
          "id": "Win.Dropper.Dridex-9986041-0",
          "display_name": "Win.Dropper.Dridex-9986041-0",
          "target": null
        },
        {
          "id": "ALF:HeraklezEval:Trojan:Win32/Zombie",
          "display_name": "ALF:HeraklezEval:Trojan:Win32/Zombie",
          "target": null
        },
        {
          "id": "Win.Packer.pkr_ce1a-9980177-0",
          "display_name": "Win.Packer.pkr_ce1a-9980177-0",
          "target": null
        },
        {
          "id": "Worm:Win32/Sfone.A",
          "display_name": "Worm:Win32/Sfone.A",
          "target": "/malware/Worm:Win32/Sfone.A"
        },
        {
          "id": "Worm:Win32/Sfone",
          "display_name": "Worm:Win32/Sfone",
          "target": "/malware/Worm:Win32/Sfone"
        },
        {
          "id": "Win.Malware.Bbabdcdc-7358312-0",
          "display_name": "Win.Malware.Bbabdcdc-7358312-0",
          "target": null
        },
        {
          "id": "Win32:Trojan-gen",
          "display_name": "Win32:Trojan-gen",
          "target": null
        },
        {
          "id": "trojan.mirai/fszhh",
          "display_name": "trojan.mirai/fszhh",
          "target": null
        },
        {
          "id": "DDOS:Linux/Mirai",
          "display_name": "DDOS:Linux/Mirai",
          "target": "/malware/DDOS:Linux/Mirai"
        },
        {
          "id": "ANDROID/AVE.Mirai.fszhh",
          "display_name": "ANDROID/AVE.Mirai.fszhh",
          "target": null
        },
        {
          "id": "Flyagent L",
          "display_name": "Flyagent L",
          "target": null
        },
        {
          "id": "Win-Trojan/Malpacked5.Gen",
          "display_name": "Win-Trojan/Malpacked5.Gen",
          "target": null
        },
        {
          "id": "Atros3.LDJ",
          "display_name": "Atros3.LDJ",
          "target": null
        },
        {
          "id": "a variant of Win32/FlyStudio.Packed.AD potentially unwanted",
          "display_name": "a variant of Win32/FlyStudio.Packed.AD potentially unwanted",
          "target": null
        },
        {
          "id": "TrojanSpy:Win32/Gucotut.A",
          "display_name": "TrojanSpy:Win32/Gucotut.A",
          "target": "/malware/TrojanSpy:Win32/Gucotut.A"
        },
        {
          "id": "W32/Pidgeon-A",
          "display_name": "W32/Pidgeon-A",
          "target": null
        },
        {
          "id": "Variant.Zusy.151902",
          "display_name": "Variant.Zusy.151902",
          "target": null
        },
        {
          "id": "trojan.mirai/fedr",
          "display_name": "trojan.mirai/fedr",
          "target": null
        },
        {
          "id": "Win.Malware.Trojanx-9862538-0",
          "display_name": "Win.Malware.Trojanx-9862538-0",
          "target": null
        },
        {
          "id": "Win32:PWSX-gen\\ [Trj]",
          "display_name": "Win32:PWSX-gen\\ [Trj]",
          "target": null
        },
        {
          "id": "virus.ramnit/nimnul",
          "display_name": "virus.ramnit/nimnul",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1003",
          "name": "OS Credential Dumping",
          "display_name": "T1003 - OS Credential Dumping"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1095",
          "name": "Non-Application Layer Protocol",
          "display_name": "T1095 - Non-Application Layer Protocol"
        },
        {
          "id": "T1571",
          "name": "Non-Standard Port",
          "display_name": "T1571 - Non-Standard Port"
        },
        {
          "id": "TA0006",
          "name": "Credential Access",
          "display_name": "TA0006 - Credential Access"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1005",
          "name": "Data from Local System",
          "display_name": "T1005 - Data from Local System"
        },
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1047",
          "name": "Windows Management Instrumentation",
          "display_name": "T1047 - Windows Management Instrumentation"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1081",
          "name": "Credentials in Files",
          "display_name": "T1081 - Credentials in Files"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 51,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 2,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 351,
        "FileHash-SHA1": 349,
        "FileHash-SHA256": 3715,
        "domain": 3326,
        "hostname": 5200,
        "URL": 13151,
        "email": 9,
        "CVE": 7,
        "CIDR": 2
      },
      "indicator_count": 26110,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 243,
      "modified_text": "640 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65d8c371cc0957afd9195ae0",
      "name": ":MalwareX-gen\\ [Trj]",
      "description": "",
      "modified": "2024-03-24T08:04:17.098000",
      "created": "2024-02-23T16:10:26",
      "tags": [
        "united",
        "command decode",
        "segoe ui",
        "emoji",
        "meta",
        "script",
        "alienvault",
        "open threat",
        "exchange",
        "learn",
        "date",
        "roboto",
        "path",
        "iframe",
        "body",
        "virustotal",
        "february",
        "hybrid",
        "general",
        "click",
        "strings",
        "span",
        "contact",
        "ssl certificate",
        "whois record",
        "threat roundup",
        "june",
        "october",
        "pe resource",
        "september",
        "referrer",
        "historical ssl",
        "march",
        "august",
        "formbook",
        "suspicious"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "65d85bc3164cd519bc4a282d",
      "export_count": 15,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Enqrypted",
        "id": "272105",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_272105/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 151,
        "FileHash-SHA1": 151,
        "FileHash-SHA256": 2254,
        "domain": 693,
        "hostname": 974,
        "URL": 3461,
        "CVE": 1
      },
      "indicator_count": 7685,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 62,
      "modified_text": "756 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65d85bc3164cd519bc4a282d",
      "name": "Win32:RansomX-gen\\ [Ransom] \u2022 Win32:MalwareX-gen\\ [Trj]",
      "description": "https://otx.alienvault.com/indicator/ doesn't finish loading. Unable to analyze  detections.\nnetwork_icmp\nallocates_rwx\npacker_entropy\nhas_pdb\npe_unknown_resource_name\nsysinternals_tools_usage\nallocates_rwx\nsuspicious_process",
      "modified": "2024-03-24T08:04:17.098000",
      "created": "2024-02-23T08:48:03.696000",
      "tags": [
        "united",
        "command decode",
        "segoe ui",
        "emoji",
        "meta",
        "script",
        "alienvault",
        "open threat",
        "exchange",
        "learn",
        "date",
        "roboto",
        "path",
        "iframe",
        "body",
        "virustotal",
        "february",
        "hybrid",
        "general",
        "click",
        "strings",
        "span",
        "contact",
        "ssl certificate",
        "whois record",
        "threat roundup",
        "june",
        "october",
        "pe resource",
        "september",
        "referrer",
        "historical ssl",
        "march",
        "august",
        "formbook",
        "suspicious"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 19,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 151,
        "FileHash-SHA1": 151,
        "FileHash-SHA256": 2254,
        "domain": 693,
        "hostname": 974,
        "URL": 3461,
        "CVE": 1
      },
      "indicator_count": 7685,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 222,
      "modified_text": "756 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65cab616bb5869335d184ae7",
      "name": "Malware Infection | Pseudonym 'Kevin Harden' Malvertizing RedTube Subsidiary",
      "description": "",
      "modified": "2024-03-11T02:01:13.710000",
      "created": "2024-02-13T00:21:42.183000",
      "tags": [
        "trojan",
        "show",
        "scan endpoints",
        "all scoreblue",
        "filehash",
        "av detections",
        "ids detections",
        "yara detections",
        "alerts",
        "april",
        "win32",
        "copy",
        "push",
        "malware infection",
        "threat roundup",
        "whois record",
        "contacted",
        "october",
        "execution",
        "january",
        "attack",
        "suspicious",
        "hacktool",
        "emotet",
        "injection",
        "http response",
        "final url",
        "ip address",
        "status code",
        "body length",
        "kb body",
        "sha256",
        "headers",
        "http",
        "resource path",
        "size",
        "type mimetype",
        "primary request",
        "servicelogin",
        "kb document",
        "general full",
        "url https"
      ],
      "references": [
        "https://www.redtube.com/ServiceLogin?hl=de&passive=true&continue=https://www.redtube.ccom/%3Fdata%3Dkevinharden1978%2540gmail.com%252Fkevinharden1978%2B.search",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Win32:Trojan-gen",
          "display_name": "Win32:Trojan-gen",
          "target": null
        },
        {
          "id": "Trojan:Win32/CryptInject.SD!MTB",
          "display_name": "Trojan:Win32/CryptInject.SD!MTB",
          "target": "/malware/Trojan:Win32/CryptInject.SD!MTB"
        },
        {
          "id": "Win.Malware.Fileinfector-9834127-0",
          "display_name": "Win.Malware.Fileinfector-9834127-0",
          "target": null
        },
        {
          "id": "Emotet b",
          "display_name": "Emotet b",
          "target": null
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 15,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 276,
        "FileHash-SHA1": 274,
        "FileHash-SHA256": 3301,
        "URL": 2268,
        "hostname": 744,
        "CVE": 2,
        "domain": 340
      },
      "indicator_count": 7205,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 227,
      "modified_text": "770 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65cab60667f8205c19d6b67b",
      "name": "Malware Infection | Pseudonym 'Kevin Harden' Malvertizing RedTube Subsidiary",
      "description": "",
      "modified": "2024-03-11T02:01:13.710000",
      "created": "2024-02-13T00:21:26.244000",
      "tags": [
        "trojan",
        "show",
        "scan endpoints",
        "all scoreblue",
        "filehash",
        "av detections",
        "ids detections",
        "yara detections",
        "alerts",
        "april",
        "win32",
        "copy",
        "push",
        "malware infection",
        "threat roundup",
        "whois record",
        "contacted",
        "october",
        "execution",
        "january",
        "attack",
        "suspicious",
        "hacktool",
        "emotet",
        "injection",
        "http response",
        "final url",
        "ip address",
        "status code",
        "body length",
        "kb body",
        "sha256",
        "headers",
        "http",
        "resource path",
        "size",
        "type mimetype",
        "primary request",
        "servicelogin",
        "kb document",
        "general full",
        "url https"
      ],
      "references": [
        "https://www.redtube.com/ServiceLogin?hl=de&passive=true&continue=https://www.redtube.ccom/%3Fdata%3Dkevinharden1978%2540gmail.com%252Fkevinharden1978%2B.search",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Win32:Trojan-gen",
          "display_name": "Win32:Trojan-gen",
          "target": null
        },
        {
          "id": "Trojan:Win32/CryptInject.SD!MTB",
          "display_name": "Trojan:Win32/CryptInject.SD!MTB",
          "target": "/malware/Trojan:Win32/CryptInject.SD!MTB"
        },
        {
          "id": "Win.Malware.Fileinfector-9834127-0",
          "display_name": "Win.Malware.Fileinfector-9834127-0",
          "target": null
        },
        {
          "id": "Emotet b",
          "display_name": "Emotet b",
          "target": null
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 14,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 276,
        "FileHash-SHA1": 274,
        "FileHash-SHA256": 3301,
        "URL": 2268,
        "hostname": 744,
        "CVE": 2,
        "domain": 340
      },
      "indicator_count": 7205,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 227,
      "modified_text": "770 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65cab601f0d674294b603758",
      "name": "Malware Infection | Pseudonym 'Kevin Harden' Malvertizing RedTube Subsidiary",
      "description": "",
      "modified": "2024-03-11T02:01:13.710000",
      "created": "2024-02-13T00:21:21.869000",
      "tags": [
        "trojan",
        "show",
        "scan endpoints",
        "all scoreblue",
        "filehash",
        "av detections",
        "ids detections",
        "yara detections",
        "alerts",
        "april",
        "win32",
        "copy",
        "push",
        "malware infection",
        "threat roundup",
        "whois record",
        "contacted",
        "october",
        "execution",
        "january",
        "attack",
        "suspicious",
        "hacktool",
        "emotet",
        "injection",
        "http response",
        "final url",
        "ip address",
        "status code",
        "body length",
        "kb body",
        "sha256",
        "headers",
        "http",
        "resource path",
        "size",
        "type mimetype",
        "primary request",
        "servicelogin",
        "kb document",
        "general full",
        "url https"
      ],
      "references": [
        "https://www.redtube.com/ServiceLogin?hl=de&passive=true&continue=https://www.redtube.ccom/%3Fdata%3Dkevinharden1978%2540gmail.com%252Fkevinharden1978%2B.search",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Win32:Trojan-gen",
          "display_name": "Win32:Trojan-gen",
          "target": null
        },
        {
          "id": "Trojan:Win32/CryptInject.SD!MTB",
          "display_name": "Trojan:Win32/CryptInject.SD!MTB",
          "target": "/malware/Trojan:Win32/CryptInject.SD!MTB"
        },
        {
          "id": "Win.Malware.Fileinfector-9834127-0",
          "display_name": "Win.Malware.Fileinfector-9834127-0",
          "target": null
        },
        {
          "id": "Emotet b",
          "display_name": "Emotet b",
          "target": null
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 14,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 276,
        "FileHash-SHA1": 274,
        "FileHash-SHA256": 3301,
        "URL": 2268,
        "hostname": 744,
        "CVE": 2,
        "domain": 340
      },
      "indicator_count": 7205,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 226,
      "modified_text": "770 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65cab5eb4d0a233bf6f32edb",
      "name": "Malware Infection | Pseudonym 'Kevin Harden' Malvertizing RedTube Subsidiary",
      "description": "",
      "modified": "2024-03-11T02:01:13.710000",
      "created": "2024-02-13T00:20:59.154000",
      "tags": [
        "trojan",
        "show",
        "scan endpoints",
        "all scoreblue",
        "filehash",
        "av detections",
        "ids detections",
        "yara detections",
        "alerts",
        "april",
        "win32",
        "copy",
        "push",
        "malware infection",
        "threat roundup",
        "whois record",
        "contacted",
        "october",
        "execution",
        "january",
        "attack",
        "suspicious",
        "hacktool",
        "emotet",
        "injection",
        "http response",
        "final url",
        "ip address",
        "status code",
        "body length",
        "kb body",
        "sha256",
        "headers",
        "http",
        "resource path",
        "size",
        "type mimetype",
        "primary request",
        "servicelogin",
        "kb document",
        "general full",
        "url https"
      ],
      "references": [
        "https://www.redtube.com/ServiceLogin?hl=de&passive=true&continue=https://www.redtube.ccom/%3Fdata%3Dkevinharden1978%2540gmail.com%252Fkevinharden1978%2B.search",
        "https://www.anyxxxtube.net/search-porn/tsara-brashears/",
        "https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Win32:Trojan-gen",
          "display_name": "Win32:Trojan-gen",
          "target": null
        },
        {
          "id": "Trojan:Win32/CryptInject.SD!MTB",
          "display_name": "Trojan:Win32/CryptInject.SD!MTB",
          "target": "/malware/Trojan:Win32/CryptInject.SD!MTB"
        },
        {
          "id": "Win.Malware.Fileinfector-9834127-0",
          "display_name": "Win.Malware.Fileinfector-9834127-0",
          "target": null
        },
        {
          "id": "Emotet b",
          "display_name": "Emotet b",
          "target": null
        },
        {
          "id": "HackTool",
          "display_name": "HackTool",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 14,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 276,
        "FileHash-SHA1": 274,
        "FileHash-SHA256": 3301,
        "URL": 2268,
        "hostname": 744,
        "CVE": 2,
        "domain": 340
      },
      "indicator_count": 7205,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 226,
      "modified_text": "770 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570a989843b7acf6d0a79ac",
      "name": "Qakbot. Again. Today. Pulled from own device. Quasar RAT, Malvertizing",
      "description": "",
      "modified": "2023-12-06T17:04:09.133000",
      "created": "2023-12-06T17:04:09.133000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 15,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CVE": 2,
        "domain": 290,
        "FileHash-SHA256": 1478,
        "hostname": 1047,
        "URL": 4055,
        "FileHash-MD5": 89,
        "FileHash-SHA1": 85,
        "email": 1,
        "FilePath": 2,
        "Mutex": 1,
        "CIDR": 1
      },
      "indicator_count": 7051,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 110,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "cachesdata.com",
    "type": "Domain"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "cachesdata.com",
    "found": false,
    "verdict": "clean",
    "urls": [],
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776672207.9739583
}