{
  "type": "Domain",
  "indicator": "certify.com",
  "general": {
    "sections": [
      "general",
      "geo",
      "url_list",
      "passive_dns",
      "malware",
      "whois",
      "http_scans"
    ],
    "whois": "http://whois.domaintools.com/certify.com",
    "alexa": "http://www.alexa.com/siteinfo/certify.com",
    "indicator": "certify.com",
    "type": "domain",
    "type_title": "Domain",
    "validation": [],
    "base_indicator": {
      "id": 2907458479,
      "indicator": "certify.com",
      "type": "domain",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 5,
      "pulses": [
        {
          "id": "688ef0516013ca78448bf4e5",
          "name": "Foundry \u2022 Reflected Networks Pornhub Malvertising Subsidiary",
          "description": "Foundry ?  Pornhub\nsanfoundry.com\ncompliance.fifoundry.net- Pornhub subsidiary. Targets networks, devices, routers, used for promoting pornography and her music. Producer revealed her hooks were used for Justin Bieber &  Tori Kelly songs that. A producer stated her songs had been grifted. Both Tsara Brashears & a studio were in Pegasus & attacked by \u2018Lazarus\u2019 Group. She was told in detail how her songs can be used by music insiders if they choose.  Target trolled by mocking hackers re: the JB and Kelly song.. Trojan:Win32/DisableUAC.A!bit\n, MSIL:Suspicious:ScreenCapture.S01\nIDS Detections\nLokiBot Checkin\nLokiBot User-Agent (Charon/Inferno)\nLokiBot Application/Credential Data Exfiltration Detected M1\nLokiBot Request for C2 Commands Detected M1\nLokiBot Application/Credential Data Exfiltration Detected M2\nLokiBot Request for C2 Commands Detected M2\nTrojan Generic - POST To gate.php with no referer\nSSL excessive fatal alerts (possible POODLE attack against server)\nI will revisit this. Gloryhole Foundation?",
          "modified": "2025-09-02T04:01:31.218000",
          "created": "2025-08-03T05:14:57.402000",
          "tags": [
            "united",
            "moved",
            "entries",
            "passive dns",
            "detected m1",
            "next associated",
            "mtb apr",
            "mtb aug",
            "server",
            "gmt content",
            "trojandropper",
            "trojan",
            "body",
            "lokibot request",
            "c2 commands",
            "detected m2",
            "otx telemetry",
            "historical otx",
            "twitter running",
            "open ports",
            "cves",
            "time",
            "dynamicloader",
            "port",
            "search",
            "show",
            "destination",
            "alerts",
            "copy",
            "dynamic",
            "medium",
            "write",
            "creation date",
            "hostmaster",
            "urls",
            "domain",
            "showing",
            "hostname add",
            "pulse pulses",
            "date",
            "flag",
            "falcon sandbox",
            "name server",
            "markmonitor",
            "analysis",
            "mitre att",
            "anonymous",
            "upgrade",
            "hybrid",
            "contact",
            "usa windows",
            "december",
            "input threat",
            "level analysis",
            "summary",
            "february",
            "hwp support",
            "january",
            "october",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "adversaries",
            "calls",
            "command",
            "javascript",
            "object model",
            "model",
            "windir",
            "json data",
            "localappdata",
            "ascii text",
            "temp",
            "getprocaddress",
            "script",
            "license",
            "runtime process",
            "copy md5",
            "facebook",
            "roboto",
            "error",
            "win64",
            "path",
            "blink",
            "meta",
            "factory",
            "general",
            "comspec",
            "click",
            "strings",
            "damage",
            "mini",
            "stop",
            "core",
            "expl",
            "win32",
            "gmt server",
            "ecacc saa83dd",
            "ipv4 add",
            "twitter",
            "cobalt strike",
            "mozilla"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1012",
              "name": "Query Registry",
              "display_name": "T1012 - Query Registry"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1546",
              "name": "Event Triggered Execution",
              "display_name": "T1546 - Event Triggered Execution"
            },
            {
              "id": "T1588",
              "name": "Obtain Capabilities",
              "display_name": "T1588 - Obtain Capabilities"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 18,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 263,
            "FileHash-SHA1": 256,
            "FileHash-SHA256": 837,
            "hostname": 4415,
            "URL": 1918,
            "domain": 1884,
            "email": 2,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 9577,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "229 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "68732864356c4353e0b1efe2",
          "name": "Denver Post - Custom Malware | Xord",
          "description": "YARA Detections:\n\u2022 xord_nopsled_in_jquery\ncompromised_site_redirector_fromcharcode\n\u2022 KnownMaliciousObfuscationPattern\n\u2022 WebExploit | \nAlerts:\n\u2022 ransomware_file_modifications\n\u2022 script_created_process\n\u2022 antivm_generic_disk\n\u2022 infostealer_cookies\n\u2022 suspicious_command\n\u2022 dead_host\n\u2022 suspicious_write_exe\n\u2022 network_icmp\n\u2022 modifies_certificates\n\u2022 process_martian\n* Malware IP - \n142.251.215.232",
          "modified": "2025-08-12T03:05:26.037000",
          "created": "2025-07-13T03:30:44.589000",
          "tags": [
            "url https",
            "indicator role",
            "title added",
            "active related",
            "pulses",
            "entries",
            "url http",
            "domain",
            "ipv4",
            "filehashsha256",
            "hostname",
            "types of",
            "united kingdom",
            "united",
            "germany",
            "france",
            "type indicator",
            "role title",
            "added active",
            "related pulses",
            "extraction",
            "data upload",
            "failed",
            "se extraction",
            "enter sc",
            "type",
            "extra data",
            "please",
            "include review",
            "exclude sugges",
            "type ol",
            "please sub",
            "langes",
            "include",
            "review data",
            "extrad",
            "manually add",
            "indicator",
            "sc type",
            "included iocs",
            "se extr",
            "review exclude",
            "sugges",
            "extract data",
            "add indicator",
            "domain related",
            "showing",
            "tewdida data",
            "present jul",
            "script urls",
            "a domains",
            "present jun",
            "search",
            "accept encoding",
            "unknown aaaa",
            "present may",
            "date",
            "meta",
            "body",
            "ipv6",
            "role",
            "present jan",
            "next associated",
            "urls show",
            "date checked",
            "url hostname",
            "server response",
            "ip address",
            "regexp",
            "typeof e",
            "typeof t",
            "function",
            "width",
            "error",
            "object",
            "x20trnf",
            "pseudo",
            "child",
            "form",
            "class",
            "null",
            "write",
            "this",
            "void",
            "accept",
            "copy",
            "extr please",
            "typ data",
            "indicalok no",
            "gmt max",
            "reverse dns",
            "location united",
            "america flag",
            "ashburn",
            "america asn",
            "dns resolutions",
            "domains top",
            "extri please",
            "review",
            "sugges data",
            "find suxesteu",
            "typ indical",
            "on hos",
            "dynamicloader",
            "medium",
            "show",
            "high",
            "windows",
            "cmd c",
            "delete",
            "next",
            "unknown",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "read c",
            "as15169",
            "execution",
            "dock",
            "persistence",
            "malware",
            "roboto",
            "fwlink",
            "powershell",
            "delete c",
            "guard",
            "win32",
            "passive dns",
            "ransom",
            "trojan",
            "gmt cache",
            "sameorigin",
            "443 ma2592000",
            "pulse",
            "trojandropper",
            "worm",
            "ur extraction",
            "find",
            "types",
            "seard data",
            "source se",
            "url toi",
            "ela fer",
            "iocs",
            "search otx",
            "extr",
            "indicators h",
            "weall",
            "indica",
            "sc data",
            "data u",
            "extre",
            "find s",
            "onv incmde",
            "exclude data",
            "suggested",
            "typ no"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 13,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 3107,
            "domain": 526,
            "hostname": 940,
            "FileHash-SHA256": 2209,
            "email": 2,
            "FileHash-MD5": 80,
            "FileHash-SHA1": 31,
            "SSLCertFingerprint": 11
          },
          "indicator_count": 6906,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 139,
          "modified_text": "250 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "68732869bad70de69c45c1b3",
          "name": "Denver Post - Custom Malware | Xord",
          "description": "YARA Detections:\n\u2022 xord_nopsled_in_jquery\ncompromised_site_redirector_fromcharcode\n\u2022 KnownMaliciousObfuscationPattern\n\u2022 WebExploit | \nAlerts:\n\u2022 ransomware_file_modifications\n\u2022 script_created_process\n\u2022 antivm_generic_disk\n\u2022 infostealer_cookies\n\u2022 suspicious_command\n\u2022 dead_host\n\u2022 suspicious_write_exe\n\u2022 network_icmp\n\u2022 modifies_certificates\n\u2022 process_martian\n* Malware IP - \n142.251.215.232",
          "modified": "2025-08-12T03:05:26.037000",
          "created": "2025-07-13T03:30:49.347000",
          "tags": [
            "url https",
            "indicator role",
            "title added",
            "active related",
            "pulses",
            "entries",
            "url http",
            "domain",
            "ipv4",
            "filehashsha256",
            "hostname",
            "types of",
            "united kingdom",
            "united",
            "germany",
            "france",
            "type indicator",
            "role title",
            "added active",
            "related pulses",
            "extraction",
            "data upload",
            "failed",
            "se extraction",
            "enter sc",
            "type",
            "extra data",
            "please",
            "include review",
            "exclude sugges",
            "type ol",
            "please sub",
            "langes",
            "include",
            "review data",
            "extrad",
            "manually add",
            "indicator",
            "sc type",
            "included iocs",
            "se extr",
            "review exclude",
            "sugges",
            "extract data",
            "add indicator",
            "domain related",
            "showing",
            "tewdida data",
            "present jul",
            "script urls",
            "a domains",
            "present jun",
            "search",
            "accept encoding",
            "unknown aaaa",
            "present may",
            "date",
            "meta",
            "body",
            "ipv6",
            "role",
            "present jan",
            "next associated",
            "urls show",
            "date checked",
            "url hostname",
            "server response",
            "ip address",
            "regexp",
            "typeof e",
            "typeof t",
            "function",
            "width",
            "error",
            "object",
            "x20trnf",
            "pseudo",
            "child",
            "form",
            "class",
            "null",
            "write",
            "this",
            "void",
            "accept",
            "copy",
            "extr please",
            "typ data",
            "indicalok no",
            "gmt max",
            "reverse dns",
            "location united",
            "america flag",
            "ashburn",
            "america asn",
            "dns resolutions",
            "domains top",
            "extri please",
            "review",
            "sugges data",
            "find suxesteu",
            "typ indical",
            "on hos",
            "dynamicloader",
            "medium",
            "show",
            "high",
            "windows",
            "cmd c",
            "delete",
            "next",
            "unknown",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "read c",
            "as15169",
            "execution",
            "dock",
            "persistence",
            "malware",
            "roboto",
            "fwlink",
            "powershell",
            "delete c",
            "guard",
            "win32",
            "passive dns",
            "ransom",
            "trojan",
            "gmt cache",
            "sameorigin",
            "443 ma2592000",
            "pulse",
            "trojandropper",
            "worm",
            "ur extraction",
            "find",
            "types",
            "seard data",
            "source se",
            "url toi",
            "ela fer",
            "iocs",
            "search otx",
            "extr",
            "indicators h",
            "weall",
            "indica",
            "sc data",
            "data u",
            "extre",
            "find s",
            "onv incmde",
            "exclude data",
            "suggested",
            "typ no"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 14,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 3107,
            "domain": 526,
            "hostname": 940,
            "FileHash-SHA256": 2209,
            "email": 2,
            "FileHash-MD5": 80,
            "FileHash-SHA1": 31,
            "SSLCertFingerprint": 11
          },
          "indicator_count": 6906,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "250 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708c1c5e2cc4dfe8d0ed97",
          "name": "CPANEL-TUCOWS \u2014malware hosting",
          "description": "",
          "modified": "2023-12-06T14:58:36.254000",
          "created": "2023-12-06T14:58:36.254000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 815,
            "hostname": 3487,
            "domain": 1182,
            "URL": 10194,
            "FileHash-MD5": 3,
            "FileHash-SHA1": 1
          },
          "indicator_count": 15682,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "625f6d2300f3002b1d0f8a68",
          "name": "CPANEL-TUCOWS \u2014malware hosting",
          "description": "FBEvents-PostalCodeType, a new type of phone number type, has been added to the list of \"signals\" that can be controlled by a specialised operator.",
          "modified": "2022-05-19T00:00:49.028000",
          "created": "2022-04-20T02:17:07.272000",
          "tags": [
            "tucows",
            "vimeo",
            "enter otp",
            "foruserlogin",
            "username",
            "email address",
            "phone number",
            "click",
            "null",
            "otpviamail",
            "otpviasms",
            "error",
            "regexp",
            "edge",
            "elem",
            "function",
            "handle",
            "return",
            "expando",
            "match",
            "selector",
            "android",
            "false",
            "date",
            "target",
            "class",
            "mark",
            "copy",
            "capture",
            "seed",
            "pass",
            "enough",
            "code",
            "never",
            "core",
            "local",
            "verify",
            "fall",
            "accept",
            "done",
            "find",
            "internal",
            "inject",
            "possible",
            "prop",
            "trigger",
            "qe",
            "number",
            "string",
            "copyright",
            "uint8array",
            "xhfunction",
            "yhfunction",
            "gtmwrdf3cb",
            "host",
            "path",
            "gaugescookie",
            "gaugesuniqueday",
            "gaugesgauges",
            "slice",
            "image",
            "gaugestracker",
            "gaugesunique",
            "script",
            "closure library",
            "typeerror",
            "symbol",
            "array int8array",
            "caregexp",
            "legacy",
            "extra",
            "bootstrap",
            "medium",
            "large",
            "segoe ui",
            "roboto",
            "oxygensans",
            "ubuntu",
            "cantarell",
            "helvetica neue",
            "dataalignleft",
            "figcaption",
            "video",
            "ff6c2c",
            "styles",
            "badges",
            "small",
            "woff2",
            "fontface",
            "sans",
            "u1c801c88",
            "u20b4",
            "u2de02dff",
            "ua640a69f",
            "ufe2efe2f",
            "u04b004b1",
            "u2116",
            "arial",
            "helvetica",
            "montserrat",
            "productnav",
            "secondarynav",
            "typecheckbox",
            "menlo",
            "monaco",
            "consolas",
            "twitter",
            "font awesome",
            "license",
            "brands",
            "duotone",
            "msie",
            "russia",
            "paypal",
            "enduser license",
            "agreement",
            "europe",
            "typeof t",
            "typeof e",
            "typeof",
            "version",
            "attr",
            "pseudo",
            "object",
            "array",
            "invalid attempt",
            "typeof symbol",
            "survey",
            "trident",
            "form",
            "fullscreen",
            "property",
            "311218982",
            "textjavascript",
            "piscriptnum",
            "hj",
            "hotjar",
            "email",
            "telefon",
            "meta",
            "cookie",
            "keypress",
            "live",
            "generic",
            "window",
            "widget",
            "ciudad",
            "adore",
            "experiment",
            "mutation",
            "udc66udc67",
            "ud83d",
            "ufe0f",
            "ud83e",
            "udc68udc69",
            "udfcbudfcc",
            "u2640u2642",
            "source",
            "ud83dudc6cud83c",
            "cookiebot",
            "iabv2",
            "jsonversion",
            "cookie script",
            "methodstrict",
            "ticket",
            "id attribute",
            "cookiebot setup",
            "cookieconsent",
            "project",
            "reduceright",
            "trackevent",
            "pageview",
            "gtmwb4lhq4",
            "void",
            "pfunction",
            "contenttype",
            "zfunction",
            "bfunction",
            "mvoid",
            "ofunction",
            "thank",
            "f39c11",
            "quick question",
            "difficult",
            "easy",
            "poll",
            "typeof window",
            "invalid uuid",
            "functional",
            "member",
            "hnew regexp",
            "qfunction",
            "adview",
            "addbillinginfo",
            "addtocart",
            "addtolist",
            "contact",
            "download",
            "install",
            "signup",
            "addtowishlist",
            "lead",
            "custom",
            "typeof require",
            "sha256",
            "viewcontent",
            "search",
            "iterator",
            "boolean",
            "service",
            "phonenumber",
            "facebook",
            "javascript",
            "1cend"
          ],
          "references": [
            "xfe-URL-Cpanel.com-stix2-2.1-export.json",
            "https://pi.pardot.com/pd.js",
            "https://connect.facebook.net/signals/config/285857426541675?v=2.9.57&r=stable",
            "https://www.redditstatic.com/ads/pixel.js",
            "https://snap.licdn.com/li.lms-analytics/insight.min.js",
            "https://static.ads-twitter.com/uwt.js",
            "https://www.googleadservices.com/pagead/conversion_async.js",
            "https://static.hotjar.com/c/hotjar-1683409.js?sv=7",
            "https://www.google-analytics.com/analytics.js",
            "https://consent.cookiebot.com/da52fc49-8e48-42b7-9ad3-c219404f6f92/cc.js?renew=false&referer=cpanel.net&dnt=false",
            "https://consentcdn.cookiebot.com/consentconfig/da52fc49-8e48-42b7-9ad3-c219404f6f92/cpanel.net/configuration.js",
            "https://www.googletagmanager.com/gtm.js?id=GTM-WB4LHQ4",
            "https://www.bugherd.com/sidebarv2.js?apikey=kmu00qbvuigehexs5chefq",
            "https://consent.cookiebot.com/uc.js",
            "https://cpanel.net/wp-includes/js/wp-emoji-release.min.js?ver=5.6",
            "https://script.hotjar.com/modules.0076bf93c385ddf0ff58.js",
            "https://googleads.g.doubleclick.net/pagead/viewthroughconversion/728582492/?random=1650418372747&cv=9&fst=1650418372747&num=1&bg=ffffff&guid=ON&resp=GooglemKTybQhCsO&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=1&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&gtm=2wg4i1&sendb=1&ig=1&frm=0&url=https%3A%2F%2Fcpanel.net%2F&tiba=Hosting%20Platform%20of%20Choice&hn=www.googleadservices.com&us_privacy=1---&async=1&rfmt=3&fmt=4",
            "https://www.googleadservices.com/pagead/conversion/854235671/?random=1650418372749&cv=9&fst=1650418372749&num=1&value=0&label=PRNxCIWemu8BEJe0qpcD&bg=ffffff&guid=ON&resp=GooglemKTybQhCsO&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=1&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&gtm=2wg4i1&sendb=1&ig=1&data=ads_data_redaction%3Dfalse&frm=0&url=https%3A%2F%2Fcpanel.net%2F&tiba=Hosting%20Platform%20of%20Choice&gcs=G111&did=dMWZhNz&edid=dMWZhNz&auid=2050955691.1650418373&capi=2&hn=www.googleadservices.com&btty",
            "https://pi.pardot.com/analytics?ver=3&visitor_id=&visitor_id_sign=&pi_opt_in=&campaign_id=33566&account_id=872471&title=Hosting%20Platform%20of%20Choice&url=https%3A%2F%2Fcpanel.net%2F&referrer=",
            "https://www.1.cpanel.net/analytics?conly=true&visitor_id=311218274&visitor_id_sign=3e1116a56bfd91923fe15cac565b502779c6ec3fe7449557f3940ba04e77079951b9efb044c2275f4211d26742585a9d14544eae&pi_opt_in=&campaign_id=33566&account_id=872471&title=Hosting%20Platform%20of%20Choice&url=https://cpanel.net/&referrer=",
            "https://script.hotjar.com/survey-v2.3716506838f2208ab9e2.js",
            "https://cpanel.net/wp-content/themes/cPbase/assets/js/dist/script.js?ver=5.6",
            "https://cpanel.net/wp-content/themes/cPbase/assets/js/dist/cpbase.js?ver=5.6",
            "https://cpanel.net/wp-includes/js/wp-embed.min.js?ver=5.6",
            "https://pro.fontawesome.com/releases/v5.13.1/css/all.css",
            "https://vars.hotjar.com/box-4924254a9ce4dc9b959b6e4a9b662d60.html",
            "https://consentcdn.cookiebot.com/sdk/bc-v4.min.html",
            "https://cpanel.net/wp-content/themes/cPbase/style.css?ver=5.6",
            "https://cpanel.net/wp-includes/css/dist/block-library/style.min.css?ver=5.6",
            "https://fonts.googleapis.com/css?family=Open+Sans:100,200,300,400,500,600,700%7CMontserrat:100,200,300,400,500,600,700",
            "https://cpanel.net/wp-content/themes/cPbase/assets/css/version96.css",
            "https://cpanel.net/wp-content/themes/cPbase/assets/css/roadmap.css",
            "xfe-URL-pi.pardot.com-stix2-2.1-export.json",
            "xfe-URL-Cpanel.net-stix2-2.1-export.json",
            "https://secure.gaug.es/track.js",
            "https://www.googletagmanager.com/gtm.js?id=GTM-WRDF3CB",
            "https://149371662.v2.pressablecdn.com/wp-includes/js/jquery/jquery.js",
            "https://149371662.v2.pressablecdn.com/wp-content/plugins/user-verification/assets/front/js/scripts-otp.js",
            "https://player.vimeo.com/video/571271613",
            "https://bid.g.doubleclick.net/xbbe/pixel?d=KAE"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "Tunisia"
          ],
          "malware_families": [
            {
              "id": "Qe",
              "display_name": "Qe",
              "target": null
            },
            {
              "id": "hj",
              "display_name": "hj",
              "target": null
            },
            {
              "id": "ReduceRight",
              "display_name": "ReduceRight",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1218",
              "name": "Signed Binary Proxy Execution",
              "display_name": "T1218 - Signed Binary Proxy Execution"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 3487,
            "URL": 10195,
            "domain": 1182,
            "FileHash-SHA256": 815,
            "FileHash-MD5": 3,
            "FileHash-SHA1": 1
          },
          "indicator_count": 15683,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 73,
          "modified_text": "1431 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "https://www.google-analytics.com/analytics.js",
        "https://googleads.g.doubleclick.net/pagead/viewthroughconversion/728582492/?random=1650418372747&cv=9&fst=1650418372747&num=1&bg=ffffff&guid=ON&resp=GooglemKTybQhCsO&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=1&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&gtm=2wg4i1&sendb=1&ig=1&frm=0&url=https%3A%2F%2Fcpanel.net%2F&tiba=Hosting%20Platform%20of%20Choice&hn=www.googleadservices.com&us_privacy=1---&async=1&rfmt=3&fmt=4",
        "https://vars.hotjar.com/box-4924254a9ce4dc9b959b6e4a9b662d60.html",
        "https://www.googletagmanager.com/gtm.js?id=GTM-WB4LHQ4",
        "https://script.hotjar.com/survey-v2.3716506838f2208ab9e2.js",
        "https://www.googletagmanager.com/gtm.js?id=GTM-WRDF3CB",
        "https://www.1.cpanel.net/analytics?conly=true&visitor_id=311218274&visitor_id_sign=3e1116a56bfd91923fe15cac565b502779c6ec3fe7449557f3940ba04e77079951b9efb044c2275f4211d26742585a9d14544eae&pi_opt_in=&campaign_id=33566&account_id=872471&title=Hosting%20Platform%20of%20Choice&url=https://cpanel.net/&referrer=",
        "https://cpanel.net/wp-includes/js/wp-emoji-release.min.js?ver=5.6",
        "https://www.bugherd.com/sidebarv2.js?apikey=kmu00qbvuigehexs5chefq",
        "https://www.googleadservices.com/pagead/conversion_async.js",
        "https://cpanel.net/wp-includes/js/wp-embed.min.js?ver=5.6",
        "https://consentcdn.cookiebot.com/sdk/bc-v4.min.html",
        "https://149371662.v2.pressablecdn.com/wp-content/plugins/user-verification/assets/front/js/scripts-otp.js",
        "https://consentcdn.cookiebot.com/consentconfig/da52fc49-8e48-42b7-9ad3-c219404f6f92/cpanel.net/configuration.js",
        "https://cpanel.net/wp-content/themes/cPbase/style.css?ver=5.6",
        "xfe-URL-Cpanel.net-stix2-2.1-export.json",
        "https://fonts.googleapis.com/css?family=Open+Sans:100,200,300,400,500,600,700%7CMontserrat:100,200,300,400,500,600,700",
        "xfe-URL-Cpanel.com-stix2-2.1-export.json",
        "https://consent.cookiebot.com/uc.js",
        "https://bid.g.doubleclick.net/xbbe/pixel?d=KAE",
        "https://static.ads-twitter.com/uwt.js",
        "https://pi.pardot.com/analytics?ver=3&visitor_id=&visitor_id_sign=&pi_opt_in=&campaign_id=33566&account_id=872471&title=Hosting%20Platform%20of%20Choice&url=https%3A%2F%2Fcpanel.net%2F&referrer=",
        "https://consent.cookiebot.com/da52fc49-8e48-42b7-9ad3-c219404f6f92/cc.js?renew=false&referer=cpanel.net&dnt=false",
        "https://cpanel.net/wp-content/themes/cPbase/assets/css/roadmap.css",
        "https://cpanel.net/wp-content/themes/cPbase/assets/js/dist/script.js?ver=5.6",
        "https://www.googleadservices.com/pagead/conversion/854235671/?random=1650418372749&cv=9&fst=1650418372749&num=1&value=0&label=PRNxCIWemu8BEJe0qpcD&bg=ffffff&guid=ON&resp=GooglemKTybQhCsO&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=1&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&gtm=2wg4i1&sendb=1&ig=1&data=ads_data_redaction%3Dfalse&frm=0&url=https%3A%2F%2Fcpanel.net%2F&tiba=Hosting%20Platform%20of%20Choice&gcs=G111&did=dMWZhNz&edid=dMWZhNz&auid=2050955691.1650418373&capi=2&hn=www.googleadservices.com&btty",
        "https://player.vimeo.com/video/571271613",
        "https://pi.pardot.com/pd.js",
        "https://cpanel.net/wp-content/themes/cPbase/assets/css/version96.css",
        "https://cpanel.net/wp-includes/css/dist/block-library/style.min.css?ver=5.6",
        "https://static.hotjar.com/c/hotjar-1683409.js?sv=7",
        "https://script.hotjar.com/modules.0076bf93c385ddf0ff58.js",
        "https://snap.licdn.com/li.lms-analytics/insight.min.js",
        "xfe-URL-pi.pardot.com-stix2-2.1-export.json",
        "https://secure.gaug.es/track.js",
        "https://www.redditstatic.com/ads/pixel.js",
        "https://pro.fontawesome.com/releases/v5.13.1/css/all.css",
        "https://cpanel.net/wp-content/themes/cPbase/assets/js/dist/cpbase.js?ver=5.6",
        "https://connect.facebook.net/signals/config/285857426541675?v=2.9.57&r=stable",
        "https://149371662.v2.pressablecdn.com/wp-includes/js/jquery/jquery.js"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": []
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Qe",
            "Reduceright",
            "Hj"
          ],
          "industries": []
        }
      }
    },
    "false_positive": []
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 5,
  "pulses": [
    {
      "id": "688ef0516013ca78448bf4e5",
      "name": "Foundry \u2022 Reflected Networks Pornhub Malvertising Subsidiary",
      "description": "Foundry ?  Pornhub\nsanfoundry.com\ncompliance.fifoundry.net- Pornhub subsidiary. Targets networks, devices, routers, used for promoting pornography and her music. Producer revealed her hooks were used for Justin Bieber &  Tori Kelly songs that. A producer stated her songs had been grifted. Both Tsara Brashears & a studio were in Pegasus & attacked by \u2018Lazarus\u2019 Group. She was told in detail how her songs can be used by music insiders if they choose.  Target trolled by mocking hackers re: the JB and Kelly song.. Trojan:Win32/DisableUAC.A!bit\n, MSIL:Suspicious:ScreenCapture.S01\nIDS Detections\nLokiBot Checkin\nLokiBot User-Agent (Charon/Inferno)\nLokiBot Application/Credential Data Exfiltration Detected M1\nLokiBot Request for C2 Commands Detected M1\nLokiBot Application/Credential Data Exfiltration Detected M2\nLokiBot Request for C2 Commands Detected M2\nTrojan Generic - POST To gate.php with no referer\nSSL excessive fatal alerts (possible POODLE attack against server)\nI will revisit this. Gloryhole Foundation?",
      "modified": "2025-09-02T04:01:31.218000",
      "created": "2025-08-03T05:14:57.402000",
      "tags": [
        "united",
        "moved",
        "entries",
        "passive dns",
        "detected m1",
        "next associated",
        "mtb apr",
        "mtb aug",
        "server",
        "gmt content",
        "trojandropper",
        "trojan",
        "body",
        "lokibot request",
        "c2 commands",
        "detected m2",
        "otx telemetry",
        "historical otx",
        "twitter running",
        "open ports",
        "cves",
        "time",
        "dynamicloader",
        "port",
        "search",
        "show",
        "destination",
        "alerts",
        "copy",
        "dynamic",
        "medium",
        "write",
        "creation date",
        "hostmaster",
        "urls",
        "domain",
        "showing",
        "hostname add",
        "pulse pulses",
        "date",
        "flag",
        "falcon sandbox",
        "name server",
        "markmonitor",
        "analysis",
        "mitre att",
        "anonymous",
        "upgrade",
        "hybrid",
        "contact",
        "usa windows",
        "december",
        "input threat",
        "level analysis",
        "summary",
        "february",
        "hwp support",
        "january",
        "october",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "adversaries",
        "calls",
        "command",
        "javascript",
        "object model",
        "model",
        "windir",
        "json data",
        "localappdata",
        "ascii text",
        "temp",
        "getprocaddress",
        "script",
        "license",
        "runtime process",
        "copy md5",
        "facebook",
        "roboto",
        "error",
        "win64",
        "path",
        "blink",
        "meta",
        "factory",
        "general",
        "comspec",
        "click",
        "strings",
        "damage",
        "mini",
        "stop",
        "core",
        "expl",
        "win32",
        "gmt server",
        "ecacc saa83dd",
        "ipv4 add",
        "twitter",
        "cobalt strike",
        "mozilla"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1012",
          "name": "Query Registry",
          "display_name": "T1012 - Query Registry"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1132",
          "name": "Data Encoding",
          "display_name": "T1132 - Data Encoding"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1546",
          "name": "Event Triggered Execution",
          "display_name": "T1546 - Event Triggered Execution"
        },
        {
          "id": "T1588",
          "name": "Obtain Capabilities",
          "display_name": "T1588 - Obtain Capabilities"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 18,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 263,
        "FileHash-SHA1": 256,
        "FileHash-SHA256": 837,
        "hostname": 4415,
        "URL": 1918,
        "domain": 1884,
        "email": 2,
        "SSLCertFingerprint": 2
      },
      "indicator_count": 9577,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "229 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "68732864356c4353e0b1efe2",
      "name": "Denver Post - Custom Malware | Xord",
      "description": "YARA Detections:\n\u2022 xord_nopsled_in_jquery\ncompromised_site_redirector_fromcharcode\n\u2022 KnownMaliciousObfuscationPattern\n\u2022 WebExploit | \nAlerts:\n\u2022 ransomware_file_modifications\n\u2022 script_created_process\n\u2022 antivm_generic_disk\n\u2022 infostealer_cookies\n\u2022 suspicious_command\n\u2022 dead_host\n\u2022 suspicious_write_exe\n\u2022 network_icmp\n\u2022 modifies_certificates\n\u2022 process_martian\n* Malware IP - \n142.251.215.232",
      "modified": "2025-08-12T03:05:26.037000",
      "created": "2025-07-13T03:30:44.589000",
      "tags": [
        "url https",
        "indicator role",
        "title added",
        "active related",
        "pulses",
        "entries",
        "url http",
        "domain",
        "ipv4",
        "filehashsha256",
        "hostname",
        "types of",
        "united kingdom",
        "united",
        "germany",
        "france",
        "type indicator",
        "role title",
        "added active",
        "related pulses",
        "extraction",
        "data upload",
        "failed",
        "se extraction",
        "enter sc",
        "type",
        "extra data",
        "please",
        "include review",
        "exclude sugges",
        "type ol",
        "please sub",
        "langes",
        "include",
        "review data",
        "extrad",
        "manually add",
        "indicator",
        "sc type",
        "included iocs",
        "se extr",
        "review exclude",
        "sugges",
        "extract data",
        "add indicator",
        "domain related",
        "showing",
        "tewdida data",
        "present jul",
        "script urls",
        "a domains",
        "present jun",
        "search",
        "accept encoding",
        "unknown aaaa",
        "present may",
        "date",
        "meta",
        "body",
        "ipv6",
        "role",
        "present jan",
        "next associated",
        "urls show",
        "date checked",
        "url hostname",
        "server response",
        "ip address",
        "regexp",
        "typeof e",
        "typeof t",
        "function",
        "width",
        "error",
        "object",
        "x20trnf",
        "pseudo",
        "child",
        "form",
        "class",
        "null",
        "write",
        "this",
        "void",
        "accept",
        "copy",
        "extr please",
        "typ data",
        "indicalok no",
        "gmt max",
        "reverse dns",
        "location united",
        "america flag",
        "ashburn",
        "america asn",
        "dns resolutions",
        "domains top",
        "extri please",
        "review",
        "sugges data",
        "find suxesteu",
        "typ indical",
        "on hos",
        "dynamicloader",
        "medium",
        "show",
        "high",
        "windows",
        "cmd c",
        "delete",
        "next",
        "unknown",
        "msie",
        "windows nt",
        "wow64",
        "slcc2",
        "media center",
        "read c",
        "as15169",
        "execution",
        "dock",
        "persistence",
        "malware",
        "roboto",
        "fwlink",
        "powershell",
        "delete c",
        "guard",
        "win32",
        "passive dns",
        "ransom",
        "trojan",
        "gmt cache",
        "sameorigin",
        "443 ma2592000",
        "pulse",
        "trojandropper",
        "worm",
        "ur extraction",
        "find",
        "types",
        "seard data",
        "source se",
        "url toi",
        "ela fer",
        "iocs",
        "search otx",
        "extr",
        "indicators h",
        "weall",
        "indica",
        "sc data",
        "data u",
        "extre",
        "find s",
        "onv incmde",
        "exclude data",
        "suggested",
        "typ no"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 13,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 3107,
        "domain": 526,
        "hostname": 940,
        "FileHash-SHA256": 2209,
        "email": 2,
        "FileHash-MD5": 80,
        "FileHash-SHA1": 31,
        "SSLCertFingerprint": 11
      },
      "indicator_count": 6906,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 139,
      "modified_text": "250 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "68732869bad70de69c45c1b3",
      "name": "Denver Post - Custom Malware | Xord",
      "description": "YARA Detections:\n\u2022 xord_nopsled_in_jquery\ncompromised_site_redirector_fromcharcode\n\u2022 KnownMaliciousObfuscationPattern\n\u2022 WebExploit | \nAlerts:\n\u2022 ransomware_file_modifications\n\u2022 script_created_process\n\u2022 antivm_generic_disk\n\u2022 infostealer_cookies\n\u2022 suspicious_command\n\u2022 dead_host\n\u2022 suspicious_write_exe\n\u2022 network_icmp\n\u2022 modifies_certificates\n\u2022 process_martian\n* Malware IP - \n142.251.215.232",
      "modified": "2025-08-12T03:05:26.037000",
      "created": "2025-07-13T03:30:49.347000",
      "tags": [
        "url https",
        "indicator role",
        "title added",
        "active related",
        "pulses",
        "entries",
        "url http",
        "domain",
        "ipv4",
        "filehashsha256",
        "hostname",
        "types of",
        "united kingdom",
        "united",
        "germany",
        "france",
        "type indicator",
        "role title",
        "added active",
        "related pulses",
        "extraction",
        "data upload",
        "failed",
        "se extraction",
        "enter sc",
        "type",
        "extra data",
        "please",
        "include review",
        "exclude sugges",
        "type ol",
        "please sub",
        "langes",
        "include",
        "review data",
        "extrad",
        "manually add",
        "indicator",
        "sc type",
        "included iocs",
        "se extr",
        "review exclude",
        "sugges",
        "extract data",
        "add indicator",
        "domain related",
        "showing",
        "tewdida data",
        "present jul",
        "script urls",
        "a domains",
        "present jun",
        "search",
        "accept encoding",
        "unknown aaaa",
        "present may",
        "date",
        "meta",
        "body",
        "ipv6",
        "role",
        "present jan",
        "next associated",
        "urls show",
        "date checked",
        "url hostname",
        "server response",
        "ip address",
        "regexp",
        "typeof e",
        "typeof t",
        "function",
        "width",
        "error",
        "object",
        "x20trnf",
        "pseudo",
        "child",
        "form",
        "class",
        "null",
        "write",
        "this",
        "void",
        "accept",
        "copy",
        "extr please",
        "typ data",
        "indicalok no",
        "gmt max",
        "reverse dns",
        "location united",
        "america flag",
        "ashburn",
        "america asn",
        "dns resolutions",
        "domains top",
        "extri please",
        "review",
        "sugges data",
        "find suxesteu",
        "typ indical",
        "on hos",
        "dynamicloader",
        "medium",
        "show",
        "high",
        "windows",
        "cmd c",
        "delete",
        "next",
        "unknown",
        "msie",
        "windows nt",
        "wow64",
        "slcc2",
        "media center",
        "read c",
        "as15169",
        "execution",
        "dock",
        "persistence",
        "malware",
        "roboto",
        "fwlink",
        "powershell",
        "delete c",
        "guard",
        "win32",
        "passive dns",
        "ransom",
        "trojan",
        "gmt cache",
        "sameorigin",
        "443 ma2592000",
        "pulse",
        "trojandropper",
        "worm",
        "ur extraction",
        "find",
        "types",
        "seard data",
        "source se",
        "url toi",
        "ela fer",
        "iocs",
        "search otx",
        "extr",
        "indicators h",
        "weall",
        "indica",
        "sc data",
        "data u",
        "extre",
        "find s",
        "onv incmde",
        "exclude data",
        "suggested",
        "typ no"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 14,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 3107,
        "domain": 526,
        "hostname": 940,
        "FileHash-SHA256": 2209,
        "email": 2,
        "FileHash-MD5": 80,
        "FileHash-SHA1": 31,
        "SSLCertFingerprint": 11
      },
      "indicator_count": 6906,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "250 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "65708c1c5e2cc4dfe8d0ed97",
      "name": "CPANEL-TUCOWS \u2014malware hosting",
      "description": "",
      "modified": "2023-12-06T14:58:36.254000",
      "created": "2023-12-06T14:58:36.254000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 815,
        "hostname": 3487,
        "domain": 1182,
        "URL": 10194,
        "FileHash-MD5": 3,
        "FileHash-SHA1": 1
      },
      "indicator_count": 15682,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 111,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "625f6d2300f3002b1d0f8a68",
      "name": "CPANEL-TUCOWS \u2014malware hosting",
      "description": "FBEvents-PostalCodeType, a new type of phone number type, has been added to the list of \"signals\" that can be controlled by a specialised operator.",
      "modified": "2022-05-19T00:00:49.028000",
      "created": "2022-04-20T02:17:07.272000",
      "tags": [
        "tucows",
        "vimeo",
        "enter otp",
        "foruserlogin",
        "username",
        "email address",
        "phone number",
        "click",
        "null",
        "otpviamail",
        "otpviasms",
        "error",
        "regexp",
        "edge",
        "elem",
        "function",
        "handle",
        "return",
        "expando",
        "match",
        "selector",
        "android",
        "false",
        "date",
        "target",
        "class",
        "mark",
        "copy",
        "capture",
        "seed",
        "pass",
        "enough",
        "code",
        "never",
        "core",
        "local",
        "verify",
        "fall",
        "accept",
        "done",
        "find",
        "internal",
        "inject",
        "possible",
        "prop",
        "trigger",
        "qe",
        "number",
        "string",
        "copyright",
        "uint8array",
        "xhfunction",
        "yhfunction",
        "gtmwrdf3cb",
        "host",
        "path",
        "gaugescookie",
        "gaugesuniqueday",
        "gaugesgauges",
        "slice",
        "image",
        "gaugestracker",
        "gaugesunique",
        "script",
        "closure library",
        "typeerror",
        "symbol",
        "array int8array",
        "caregexp",
        "legacy",
        "extra",
        "bootstrap",
        "medium",
        "large",
        "segoe ui",
        "roboto",
        "oxygensans",
        "ubuntu",
        "cantarell",
        "helvetica neue",
        "dataalignleft",
        "figcaption",
        "video",
        "ff6c2c",
        "styles",
        "badges",
        "small",
        "woff2",
        "fontface",
        "sans",
        "u1c801c88",
        "u20b4",
        "u2de02dff",
        "ua640a69f",
        "ufe2efe2f",
        "u04b004b1",
        "u2116",
        "arial",
        "helvetica",
        "montserrat",
        "productnav",
        "secondarynav",
        "typecheckbox",
        "menlo",
        "monaco",
        "consolas",
        "twitter",
        "font awesome",
        "license",
        "brands",
        "duotone",
        "msie",
        "russia",
        "paypal",
        "enduser license",
        "agreement",
        "europe",
        "typeof t",
        "typeof e",
        "typeof",
        "version",
        "attr",
        "pseudo",
        "object",
        "array",
        "invalid attempt",
        "typeof symbol",
        "survey",
        "trident",
        "form",
        "fullscreen",
        "property",
        "311218982",
        "textjavascript",
        "piscriptnum",
        "hj",
        "hotjar",
        "email",
        "telefon",
        "meta",
        "cookie",
        "keypress",
        "live",
        "generic",
        "window",
        "widget",
        "ciudad",
        "adore",
        "experiment",
        "mutation",
        "udc66udc67",
        "ud83d",
        "ufe0f",
        "ud83e",
        "udc68udc69",
        "udfcbudfcc",
        "u2640u2642",
        "source",
        "ud83dudc6cud83c",
        "cookiebot",
        "iabv2",
        "jsonversion",
        "cookie script",
        "methodstrict",
        "ticket",
        "id attribute",
        "cookiebot setup",
        "cookieconsent",
        "project",
        "reduceright",
        "trackevent",
        "pageview",
        "gtmwb4lhq4",
        "void",
        "pfunction",
        "contenttype",
        "zfunction",
        "bfunction",
        "mvoid",
        "ofunction",
        "thank",
        "f39c11",
        "quick question",
        "difficult",
        "easy",
        "poll",
        "typeof window",
        "invalid uuid",
        "functional",
        "member",
        "hnew regexp",
        "qfunction",
        "adview",
        "addbillinginfo",
        "addtocart",
        "addtolist",
        "contact",
        "download",
        "install",
        "signup",
        "addtowishlist",
        "lead",
        "custom",
        "typeof require",
        "sha256",
        "viewcontent",
        "search",
        "iterator",
        "boolean",
        "service",
        "phonenumber",
        "facebook",
        "javascript",
        "1cend"
      ],
      "references": [
        "xfe-URL-Cpanel.com-stix2-2.1-export.json",
        "https://pi.pardot.com/pd.js",
        "https://connect.facebook.net/signals/config/285857426541675?v=2.9.57&r=stable",
        "https://www.redditstatic.com/ads/pixel.js",
        "https://snap.licdn.com/li.lms-analytics/insight.min.js",
        "https://static.ads-twitter.com/uwt.js",
        "https://www.googleadservices.com/pagead/conversion_async.js",
        "https://static.hotjar.com/c/hotjar-1683409.js?sv=7",
        "https://www.google-analytics.com/analytics.js",
        "https://consent.cookiebot.com/da52fc49-8e48-42b7-9ad3-c219404f6f92/cc.js?renew=false&referer=cpanel.net&dnt=false",
        "https://consentcdn.cookiebot.com/consentconfig/da52fc49-8e48-42b7-9ad3-c219404f6f92/cpanel.net/configuration.js",
        "https://www.googletagmanager.com/gtm.js?id=GTM-WB4LHQ4",
        "https://www.bugherd.com/sidebarv2.js?apikey=kmu00qbvuigehexs5chefq",
        "https://consent.cookiebot.com/uc.js",
        "https://cpanel.net/wp-includes/js/wp-emoji-release.min.js?ver=5.6",
        "https://script.hotjar.com/modules.0076bf93c385ddf0ff58.js",
        "https://googleads.g.doubleclick.net/pagead/viewthroughconversion/728582492/?random=1650418372747&cv=9&fst=1650418372747&num=1&bg=ffffff&guid=ON&resp=GooglemKTybQhCsO&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=1&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&gtm=2wg4i1&sendb=1&ig=1&frm=0&url=https%3A%2F%2Fcpanel.net%2F&tiba=Hosting%20Platform%20of%20Choice&hn=www.googleadservices.com&us_privacy=1---&async=1&rfmt=3&fmt=4",
        "https://www.googleadservices.com/pagead/conversion/854235671/?random=1650418372749&cv=9&fst=1650418372749&num=1&value=0&label=PRNxCIWemu8BEJe0qpcD&bg=ffffff&guid=ON&resp=GooglemKTybQhCsO&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=1&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&gtm=2wg4i1&sendb=1&ig=1&data=ads_data_redaction%3Dfalse&frm=0&url=https%3A%2F%2Fcpanel.net%2F&tiba=Hosting%20Platform%20of%20Choice&gcs=G111&did=dMWZhNz&edid=dMWZhNz&auid=2050955691.1650418373&capi=2&hn=www.googleadservices.com&btty",
        "https://pi.pardot.com/analytics?ver=3&visitor_id=&visitor_id_sign=&pi_opt_in=&campaign_id=33566&account_id=872471&title=Hosting%20Platform%20of%20Choice&url=https%3A%2F%2Fcpanel.net%2F&referrer=",
        "https://www.1.cpanel.net/analytics?conly=true&visitor_id=311218274&visitor_id_sign=3e1116a56bfd91923fe15cac565b502779c6ec3fe7449557f3940ba04e77079951b9efb044c2275f4211d26742585a9d14544eae&pi_opt_in=&campaign_id=33566&account_id=872471&title=Hosting%20Platform%20of%20Choice&url=https://cpanel.net/&referrer=",
        "https://script.hotjar.com/survey-v2.3716506838f2208ab9e2.js",
        "https://cpanel.net/wp-content/themes/cPbase/assets/js/dist/script.js?ver=5.6",
        "https://cpanel.net/wp-content/themes/cPbase/assets/js/dist/cpbase.js?ver=5.6",
        "https://cpanel.net/wp-includes/js/wp-embed.min.js?ver=5.6",
        "https://pro.fontawesome.com/releases/v5.13.1/css/all.css",
        "https://vars.hotjar.com/box-4924254a9ce4dc9b959b6e4a9b662d60.html",
        "https://consentcdn.cookiebot.com/sdk/bc-v4.min.html",
        "https://cpanel.net/wp-content/themes/cPbase/style.css?ver=5.6",
        "https://cpanel.net/wp-includes/css/dist/block-library/style.min.css?ver=5.6",
        "https://fonts.googleapis.com/css?family=Open+Sans:100,200,300,400,500,600,700%7CMontserrat:100,200,300,400,500,600,700",
        "https://cpanel.net/wp-content/themes/cPbase/assets/css/version96.css",
        "https://cpanel.net/wp-content/themes/cPbase/assets/css/roadmap.css",
        "xfe-URL-pi.pardot.com-stix2-2.1-export.json",
        "xfe-URL-Cpanel.net-stix2-2.1-export.json",
        "https://secure.gaug.es/track.js",
        "https://www.googletagmanager.com/gtm.js?id=GTM-WRDF3CB",
        "https://149371662.v2.pressablecdn.com/wp-includes/js/jquery/jquery.js",
        "https://149371662.v2.pressablecdn.com/wp-content/plugins/user-verification/assets/front/js/scripts-otp.js",
        "https://player.vimeo.com/video/571271613",
        "https://bid.g.doubleclick.net/xbbe/pixel?d=KAE"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "Tunisia"
      ],
      "malware_families": [
        {
          "id": "Qe",
          "display_name": "Qe",
          "target": null
        },
        {
          "id": "hj",
          "display_name": "hj",
          "target": null
        },
        {
          "id": "ReduceRight",
          "display_name": "ReduceRight",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1218",
          "name": "Signed Binary Proxy Execution",
          "display_name": "T1218 - Signed Binary Proxy Execution"
        },
        {
          "id": "T1547",
          "name": "Boot or Logon Autostart Execution",
          "display_name": "T1547 - Boot or Logon Autostart Execution"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 10,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "adjadex1@gmail.com",
        "id": "187163",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 3487,
        "URL": 10195,
        "domain": 1182,
        "FileHash-SHA256": 815,
        "FileHash-MD5": 3,
        "FileHash-SHA1": 1
      },
      "indicator_count": 15683,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 73,
      "modified_text": "1431 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "certify.com",
    "type": "Domain"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "certify.com",
    "found": false,
    "verdict": "clean",
    "urls": [],
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776615713.137776
}