{
  "type": "Domain",
  "indicator": "createxto.com",
  "general": {
    "sections": [
      "general",
      "geo",
      "url_list",
      "passive_dns",
      "malware",
      "whois",
      "http_scans"
    ],
    "whois": "http://whois.domaintools.com/createxto.com",
    "alexa": "http://www.alexa.com/siteinfo/createxto.com",
    "indicator": "createxto.com",
    "type": "domain",
    "type_title": "Domain",
    "validation": [],
    "base_indicator": {
      "id": 4162419357,
      "indicator": "createxto.com",
      "type": "domain",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 6,
      "pulses": [
        {
          "id": "6946fdbb4a22dc28d60d6ca2",
          "name": "Expiro - DoomScroller \u2022 BrowseHappy | Part 2",
          "description": "Pulse: \u00c2\u00a31.1bn.io.com, a search engine for the most popular websites on the planet, is now available on Facebook, Twitter, Instagram and YouTube.",
          "modified": "2026-01-19T19:04:41.997000",
          "created": "2025-12-20T19:49:15.713000",
          "tags": [
            "doomscroller",
            "browsehappy",
            "xpirat",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "read c",
            "united",
            "tlsv1",
            "execution",
            "dock",
            "write",
            "persistence",
            "encrypt",
            "meta",
            "browse happy",
            "worry",
            "body doctype",
            "online",
            "gmt server",
            "a domains",
            "ipv4 add",
            "win32",
            "trojandropper",
            "title",
            "date",
            "unknown",
            "post http",
            "cryptexportkey",
            "cryptgenkey",
            "calgrc4",
            "expiro",
            "temple",
            "xserver",
            "adversaries",
            "worry wordpress"
          ],
          "references": [
            "Xpirat = doomscroller.io"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Xpirat",
              "display_name": "Xpirat",
              "target": null
            },
            {
              "id": "Expiro",
              "display_name": "Expiro",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1457",
              "name": "Malicious Media Content",
              "display_name": "T1457 - Malicious Media Content"
            },
            {
              "id": "T1036.004",
              "name": "Masquerade Task or Service",
              "display_name": "T1036.004 - Masquerade Task or Service"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1011",
              "name": "Exfiltration Over Other Network Medium",
              "display_name": "T1011 - Exfiltration Over Other Network Medium"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "TA0003",
              "name": "Persistence",
              "display_name": "TA0003 - Persistence"
            },
            {
              "id": "TA0037",
              "name": "Command and Control",
              "display_name": "TA0037 - Command and Control"
            },
            {
              "id": "T1595",
              "name": "Active Scanning",
              "display_name": "T1595 - Active Scanning"
            },
            {
              "id": "T1423",
              "name": "Network Service Scanning",
              "display_name": "T1423 - Network Service Scanning"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 5576,
            "domain": 1502,
            "FileHash-MD5": 116,
            "FileHash-SHA1": 73,
            "FileHash-SHA256": 1041,
            "SSLCertFingerprint": 1,
            "hostname": 1951
          },
          "indicator_count": 10260,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "89 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6946ef0ba069c6b92160f8f6",
          "name": "Doomscroller \u2022 BrowserHappy | Part 1",
          "description": "Comments reserved for Part 2.\nOTX I extraction keeps timing out for me. Possibly location/signal related.",
          "modified": "2026-01-19T17:03:32.999000",
          "created": "2025-12-20T18:46:35.660000",
          "tags": [
            "servers",
            "united states",
            "united",
            "script script",
            "cnc beacon",
            "x5drh",
            "ipv4",
            "urls",
            "twitter",
            "trojandropper",
            "ipv4 add",
            "reverse dns",
            "ransom",
            "mtb may",
            "backdoor",
            "trojanspy",
            "loee7oiy",
            "trojan",
            "win32",
            "susp",
            "mtb jul",
            "virtool",
            "mtb aug",
            "worm",
            "avast avg",
            "lowfi",
            "multiplug jun",
            "urls show",
            "url hostname",
            "server response",
            "ip address",
            "google safe",
            "results dec",
            "k dec",
            "read c",
            "process32nextw",
            "tls handshake",
            "search",
            "show",
            "et info",
            "failure",
            "unknown",
            "service",
            "malware",
            "tools",
            "win64",
            "write",
            "revil",
            "sodinokibi",
            "titan",
            "mtb trojan",
            "mtb alf",
            "win32dinwod may"
          ],
          "references": [
            "Xpirat = doomscroller.io",
            "IDS Detections: Hiloti Style GET to PHP with invalid terse MSIE headers",
            "Win32/Agent.BH PUP/PUA Downloader CnC Checkin",
            "Terse HTTP 1.0 Request Possible Nivdort Trojan-Banker.Win32.Agent.ree Checkin Net-Worm.Win32.Koobface.jxs Checkin AlphaCrypt CnC Beacon 4 AlphaCrypt CnC Beacon 3 WS/JS Downloader Mar 07 2017 M1 Koobface HTTP Request (2) Alphacrypt/TeslaCrypt Ransomware CnC Beacon",
            "Trojan-Banker.Win32.Agent.ree Checkin Net-Worm.Win32.Koobface.jxs Checkin AlphaCrypt CnC Beacon 4 AlphaCrypt CnC Beacon 3 WS/JS Downloader Mar 07 2017 M1 Koobface HTTP Request (2) Alphacrypt/TeslaCrypt Ransomware CnC Beacon"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "TrojanDownloader:Win32/Upatre.AA",
              "display_name": "TrojanDownloader:Win32/Upatre.AA",
              "target": "/malware/TrojanDownloader:Win32/Upatre.AA"
            },
            {
              "id": "Upatre",
              "display_name": "Upatre",
              "target": null
            },
            {
              "id": "Sodinoki",
              "display_name": "Sodinoki",
              "target": null
            },
            {
              "id": "Ransom:Win32/Revil.A",
              "display_name": "Ransom:Win32/Revil.A",
              "target": "/malware/Ransom:Win32/Revil.A"
            },
            {
              "id": "Cutwail",
              "display_name": "Cutwail",
              "target": null
            },
            {
              "id": "!#HSTR:SigGen0136cb6c",
              "display_name": "!#HSTR:SigGen0136cb6c",
              "target": null
            },
            {
              "id": "Bayrob",
              "display_name": "Bayrob",
              "target": null
            },
            {
              "id": "Win.Malware",
              "display_name": "Win.Malware",
              "target": null
            },
            {
              "id": "TrojanSpy:Win32/Nivdort.BG",
              "display_name": "TrojanSpy:Win32/Nivdort.BG",
              "target": "/malware/TrojanSpy:Win32/Nivdort.BG"
            },
            {
              "id": "#Lowfi:Lua:Mampa:99!ml",
              "display_name": "#Lowfi:Lua:Mampa:99!ml",
              "target": null
            },
            {
              "id": "TrojanDownloader:Win32/Cutwail",
              "display_name": "TrojanDownloader:Win32/Cutwail",
              "target": "/malware/TrojanDownloader:Win32/Cutwail"
            },
            {
              "id": "#Lowfi:HSTR:Installer:Multiplug",
              "display_name": "#Lowfi:HSTR:Installer:Multiplug",
              "target": null
            },
            {
              "id": "TrojanDropper:Win32/Dinwod",
              "display_name": "TrojanDropper:Win32/Dinwod",
              "target": "/malware/TrojanDropper:Win32/Dinwod"
            },
            {
              "id": "Win.Trojan.Barys-10005825-0",
              "display_name": "Win.Trojan.Barys-10005825-0",
              "target": null
            },
            {
              "id": "TrojanSpy:Win32/Nivdort.CB",
              "display_name": "TrojanSpy:Win32/Nivdort.CB",
              "target": "/malware/TrojanSpy:Win32/Nivdort.CB"
            },
            {
              "id": "Zbot",
              "display_name": "Zbot",
              "target": null
            },
            {
              "id": "Trojan:Win32/Zbot.SIBB6!MTB",
              "display_name": "Trojan:Win32/Zbot.SIBB6!MTB",
              "target": "/malware/Trojan:Win32/Zbot.SIBB6!MTB"
            },
            {
              "id": "Ploprolo",
              "display_name": "Ploprolo",
              "target": null
            },
            {
              "id": "#Lowfi:HSTR:VirTool:Win32/Obfuscator!Diplugem.F",
              "display_name": "#Lowfi:HSTR:VirTool:Win32/Obfuscator!Diplugem.F",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1047",
              "name": "Windows Management Instrumentation",
              "display_name": "T1047 - Windows Management Instrumentation"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1083",
              "name": "File and Directory Discovery",
              "display_name": "T1083 - File and Directory Discovery"
            },
            {
              "id": "T1089",
              "name": "Disabling Security Tools",
              "display_name": "T1089 - Disabling Security Tools"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 692,
            "URL": 1666,
            "FileHash-SHA256": 630,
            "hostname": 804,
            "FileHash-MD5": 441,
            "FileHash-SHA1": 437,
            "SSLCertFingerprint": 1,
            "CVE": 1
          },
          "indicator_count": 4672,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "90 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "693f5674439d297728312967",
          "name": "BeenVerified.com | Malicious Information Doman |",
          "description": "34.232.241.155:443 (segment.prod.bidr.io)\t GET\tsegment.prod.bidr.io/associate-segment?buzz_key=tatari&segment_key=tatari-983&value=&uncacheplz=9327084282",
          "modified": "2026-01-14T00:04:33.341000",
          "created": "2025-12-15T00:29:40.025000",
          "tags": [
            "united",
            "as13335",
            "as14061",
            "cname",
            "as20940",
            "date",
            "name",
            "status",
            "present dec",
            "present nov",
            "unknown",
            "body",
            "cluster",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "tlsv1",
            "search",
            "read c",
            "show",
            "execution",
            "next",
            "dock",
            "write",
            "capture",
            "persistence",
            "local",
            "copy",
            "trojan",
            "win32",
            "mtb oct",
            "entries",
            "passive dns",
            "next associated",
            "msr feb",
            "gmt cache",
            "ipv4 add",
            "title",
            "urls",
            "url add",
            "pulse pulses",
            "http",
            "ip address",
            "related nids",
            "files location",
            "flag united",
            "name servers",
            "creation date",
            "emails",
            "domain name",
            "expiration date",
            "servers",
            "error",
            "flag",
            "prefetch8",
            "prefetch1",
            "win64",
            "khtml",
            "gecko",
            "pcap frame",
            "microsoft edge",
            "strings",
            "show process",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "sha1",
            "network traffic",
            "ogoogle trust",
            "pattern match",
            "path",
            "hybrid",
            "cookie",
            "general",
            "learn",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "initial access",
            "spawns",
            "ssl certificate",
            "click"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1764,
            "FileHash-SHA256": 1006,
            "URL": 5427,
            "domain": 442,
            "email": 3,
            "FileHash-MD5": 115,
            "FileHash-SHA1": 62,
            "SSLCertFingerprint": 21
          },
          "indicator_count": 8840,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "95 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "693f5675e3f12fa3229bdcb3",
          "name": "BeenVerified.com | Malicious Information Doman |",
          "description": "34.232.241.155:443 (segment.prod.bidr.io)\t GET\tsegment.prod.bidr.io/associate-segment?buzz_key=tatari&segment_key=tatari-983&value=&uncacheplz=9327084282",
          "modified": "2026-01-14T00:04:33.341000",
          "created": "2025-12-15T00:29:41.963000",
          "tags": [
            "united",
            "as13335",
            "as14061",
            "cname",
            "as20940",
            "date",
            "name",
            "status",
            "present dec",
            "present nov",
            "unknown",
            "body",
            "cluster",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "tlsv1",
            "search",
            "read c",
            "show",
            "execution",
            "next",
            "dock",
            "write",
            "capture",
            "persistence",
            "local",
            "copy",
            "trojan",
            "win32",
            "mtb oct",
            "entries",
            "passive dns",
            "next associated",
            "msr feb",
            "gmt cache",
            "ipv4 add",
            "title",
            "urls",
            "url add",
            "pulse pulses",
            "http",
            "ip address",
            "related nids",
            "files location",
            "flag united",
            "name servers",
            "creation date",
            "emails",
            "domain name",
            "expiration date",
            "servers",
            "error",
            "flag",
            "prefetch8",
            "prefetch1",
            "win64",
            "khtml",
            "gecko",
            "pcap frame",
            "microsoft edge",
            "strings",
            "show process",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "sha1",
            "network traffic",
            "ogoogle trust",
            "pattern match",
            "path",
            "hybrid",
            "cookie",
            "general",
            "learn",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "initial access",
            "spawns",
            "ssl certificate",
            "click"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1764,
            "FileHash-SHA256": 1006,
            "URL": 5427,
            "domain": 442,
            "email": 3,
            "FileHash-MD5": 115,
            "FileHash-SHA1": 62,
            "SSLCertFingerprint": 21
          },
          "indicator_count": 8840,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "95 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "693f57720ddcc1a02d19a78f",
          "name": "GameHack Malware | BeenVerified.com | Information Doman |",
          "description": "",
          "modified": "2026-01-14T00:04:33.341000",
          "created": "2025-12-15T00:33:54.304000",
          "tags": [
            "united",
            "as13335",
            "as14061",
            "cname",
            "as20940",
            "date",
            "name",
            "status",
            "present dec",
            "present nov",
            "unknown",
            "body",
            "cluster",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "tlsv1",
            "search",
            "read c",
            "show",
            "execution",
            "next",
            "dock",
            "write",
            "capture",
            "persistence",
            "local",
            "copy",
            "trojan",
            "win32",
            "mtb oct",
            "entries",
            "passive dns",
            "next associated",
            "msr feb",
            "gmt cache",
            "ipv4 add",
            "title",
            "urls",
            "url add",
            "pulse pulses",
            "http",
            "ip address",
            "related nids",
            "files location",
            "flag united",
            "name servers",
            "creation date",
            "emails",
            "domain name",
            "expiration date",
            "servers",
            "error",
            "flag",
            "prefetch8",
            "prefetch1",
            "win64",
            "khtml",
            "gecko",
            "pcap frame",
            "microsoft edge",
            "strings",
            "show process",
            "mitre att",
            "ck id",
            "show technique",
            "ck matrix",
            "sha1",
            "network traffic",
            "ogoogle trust",
            "pattern match",
            "path",
            "hybrid",
            "cookie",
            "general",
            "learn",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "initial access",
            "spawns",
            "ssl certificate",
            "click"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1132",
              "name": "Data Encoding",
              "display_name": "T1132 - Data Encoding"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "693f5674439d297728312967",
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1764,
            "FileHash-SHA256": 1006,
            "URL": 5427,
            "domain": 442,
            "email": 3,
            "FileHash-MD5": 115,
            "FileHash-SHA1": 62,
            "SSLCertFingerprint": 21
          },
          "indicator_count": 8840,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "95 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "693f3ef3b05672ba47b903e3",
          "name": "Create Amazing Password Forms - Project Cicada",
          "description": "Huge pulse of multiple IoC\u2019 from Project Cicada URL\n(not the 3301 Mystery) | Monitored Target | Indont know if it\u2019s related to Havana Syndrome. Is related to State of Colorado , Christopher P. \u2018Buzz\u2019 Ahmann and Tesla Hackers, \n\u201cThe right of a man or woman to retreat into his/her own home and there be free is from UNREASONABLE government intrusion is at the \u201c very core\u201d of the Fourth Amendment.\u201d\nFlorida vs. Jardines 569 U.S. 1 (2013)",
          "modified": "2026-01-13T22:02:50.260000",
          "created": "2025-12-14T22:49:23.114000",
          "tags": [
            "cicada",
            "project cicada",
            "united states",
            "quasi government",
            "asnone country",
            "united",
            "moved",
            "agent",
            "meta",
            "title error",
            "reverse dns",
            "servers",
            "urls",
            "url analysis",
            "aaaa",
            "present dec",
            "ip address",
            "america flag",
            "unknown",
            "Christopher P. \u2018Buzz\u2019 Ahmann",
            "brian sabey.",
            "State of Colorado",
            "date checked",
            "url hostname",
            "server response",
            "google safe",
            "results mar",
            "avast avg",
            "qualified immunity",
            "address google",
            "freeman",
            "mathis",
            "special forces",
            "tailored access",
            "tao",
            "hacker force",
            "infiltrate",
            "manipulate",
            "sabotage",
            "tools",
            "show",
            "results nov",
            "9b",
            "tao operations",
            "root9b",
            "hunt operations",
            "error mar",
            "over watch",
            "overkill",
            "read c",
            "memcommit",
            "high",
            "checks",
            "windows",
            "delete",
            "execution",
            "dock",
            "write",
            "persistence",
            "capture",
            "next",
            "local",
            "msie",
            "windows nt",
            "wow64",
            "slcc2",
            "media center",
            "suspicious_write_exe",
            "network_icmp",
            "antisandbox_restart",
            "creates_largekey",
            "infostealer_keylogger",
            "proess_martian",
            "injection_resumethread",
            "allocates_rwx",
            "targeted intelligence",
            "js_eval",
            "network_http",
            "name servers",
            "value domain",
            "domain name",
            "expiration date",
            "safe browsing",
            "unknown ns",
            "record value",
            "vercel",
            "certificate",
            "domain add",
            "refresh",
            "encrypt",
            "x vercel",
            "k jun",
            "mtb jul",
            "next http",
            "scans record",
            "value",
            "deployment not",
            "ransom",
            "trojan",
            "a domains",
            "safari",
            "android",
            "webkit",
            "animation",
            "click",
            "title",
            "passive dns",
            "gmt content",
            "arial helvetica",
            "ipv4 add",
            "status",
            "search",
            "emails",
            "as15169 google",
            "virtool",
            "cryp",
            "as396982",
            "win32",
            "error",
            "code",
            "domain",
            "showing",
            "query",
            "hostile",
            "observed dns",
            "et dns",
            "et info",
            "dns query",
            "malware",
            "push",
            "gmt cache",
            "sameorigin",
            "files",
            "url add",
            "http",
            "related nids",
            "files location",
            "flag united",
            "as44273 host",
            "hostname add",
            "unknown aaaa",
            "win32upatre dec",
            "mtb dec",
            "trojandropper",
            "hstr",
            "next associated",
            "backdoor",
            "entity",
            "tempe",
            "present sep",
            "hostname",
            "verdict",
            "lowfi",
            "usesscrrun",
            "ipv4",
            "element",
            "password",
            "developers",
            "create",
            "forms web",
            "group",
            "make sure",
            "autocomplete",
            "currentpassword",
            "make",
            "extraction",
            "data upload",
            "search otx",
            "ider data",
            "asn na",
            "ag da",
            "source level",
            "url text",
            "general full",
            "url https",
            "protocol h2",
            "security tls",
            "asn16509",
            "amazon02",
            "resource",
            "hash",
            "as16509",
            "us note",
            "route",
            "redacted for",
            "script urls",
            "japan unknown",
            "present apr",
            "present mar",
            "accept",
            "cookie",
            "path",
            "sectigo https",
            "encrypt https",
            "log id",
            "trustasia https",
            "amazon",
            "search criteria",
            "22965417271",
            "summary leaf",
            "timestamp entry",
            "log operator",
            "https",
            "script script",
            "cname",
            "present jun",
            "coup",
            "files ip",
            "address",
            "location united",
            "asn as16509",
            "color value",
            "item tile",
            "gmt max",
            "primary text",
            "text color",
            "play button",
            "search bar",
            "dasher",
            "flag",
            "bad traffic",
            "tls handshake",
            "failure",
            "analysis tip",
            "windir",
            "openurl c",
            "ascii text",
            "ck id",
            "show technique",
            "mitre att",
            "ck matrix",
            "pattern match",
            "network traffic",
            "beginstring",
            "show process",
            "null",
            "span",
            "general",
            "strings",
            "look",
            "verify",
            "restart",
            "dynamicloader",
            "ee fc",
            "yara rule",
            "ff d5",
            "c1 e0",
            "f0 ff",
            "ff ff",
            "eb e2",
            "ed b8",
            "fe ff",
            "june",
            "polymorphic",
            "network cnc",
            "cnc",
            "dead connect",
            "present nov",
            "france unknown",
            "generic http",
            "exe upload",
            "uploading exe",
            "intel",
            "ms windows",
            "medium",
            "http traffic",
            "monitored target",
            "prefetch2",
            "analysis",
            "tor analysis",
            "dns requests",
            "domain address",
            "contacted hosts",
            "learn",
            "command",
            "suspicious",
            "informative",
            "name tactics",
            "spawns",
            "t1480 execution",
            "file defense",
            "file discovery",
            "t1071",
            "t1057",
            "segoe ui",
            "script",
            "html",
            "body",
            "twitter",
            "formbook cnc",
            "checkin",
            "pegasus",
            "get updates",
            "p2p zeus",
            "downloader",
            "mpress",
            "win32upatre sep",
            "win32upatre oct",
            "win32upatre nov",
            "india unknown",
            "r61afin",
            "common upatre",
            "write c",
            "cts exe",
            "ids detections",
            "open",
            "present aug",
            "singapore",
            "date",
            "creation date",
            "pentest people",
            "tesla hackers",
            "vietnam unknown",
            "viet nam",
            "company limited",
            "pulse pulses"
          ],
          "references": [
            "http://dev-app.project-cicada.com \u2022 https://dev-app.project-cicada.com \u2022",
            "dev-app.project-cicada.com \u2022 project-cicada.com",
            "NAME project-cicada.com\tIdentity Protection Service\tOn behalf of project-cicada.com",
            "Files IP Address api.a 3.169.173.27,3.169.173.49, 3.169.173.87, 3.169.173.92",
            "Location United States ASN  Nameservers ns- \u2022 482.awsdns-60.com.",
            "api.acumatica.flex.redteam.com",
            "CICADA - Higurashi Analysis Agent [https://dev-app.project-cicada.com/ ]",
            "CICADA Contextual Inference & Comprehensive Analysis Data Agent",
            "https://urlscan.io/screenshots/019b1bba-5e12-709b-86eb-fcbbaa4e8375.png",
            "https://goo.gl/9p2vKq",
            "IDS Detections Win32/Snojan Variant Uploading EXE Generic HTTP EXE Upload Inbound Generic HTTP EXE Upload Outbound",
            "Yara: UPX ,  Nrv2x , UPX_OEP_place , UPX290LZMA ,UPXV200V290 ( all by MarkusOberhumerLaszloMolnarJohnReiser)",
            "Alerts: polymorphic procmem_yara suricata_alert dynamic_function_loading reads_self",
            "Alerts: network_cnc_http network_http packer_unknown_pe_section_name",
            "Alerts:  packer_entropy dead_connect queries_locale_api antidebug_setunhandledexceptionfilter",
            "IDS Detections : Downloader (P2P Zeus dropper UA) TLS Handshake",
            "IDS Detections Gh0stCringe CnC Activity M2",
            "Yara Detections: ConventionEngine_Term_Desktop ,  ConventionEngine_Term_Users ,  massminer_gh0st",
            "Alerts: infostealer_browser infostealer_cookies persistence_autorun persistence_autorun_tasks",
            "Alerts: alters_windows_utility procmem_yara static_pe_anomaly suricata_alert suspicious_command_tools mouse_movement_detect",
            "https://api-lsa.lenovosoftware.com/0/lsa/common/clever/generatedUrls",
            "googleusercontent.com | Win32:MalOb-BX\\ [Cryp] \u2022 Win.Trojan.Agent-755615 \u2022 VirTool:Win32/Obfuscator.K \u2022 Win32:MalOb-BX\\ [Cryp]\t\u2022 Win.Trojan.Agent-755615 \u2022 VirTool:Win32/Obfuscator.K",
            "teslathomas.xyz \u2022 https://teslathomas.xyz/ \u2022 teslaev.d36qivll26iymf.amplifyapp.com"
          ],
          "public": 1,
          "adversary": "State of Colorado \u2022Tesla Hackers \u2022 (Quasi Government)",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "TrojanDownloader:Win32/Cutwail.BS",
              "display_name": "TrojanDownloader:Win32/Cutwail.BS",
              "target": "/malware/TrojanDownloader:Win32/Cutwail.BS"
            },
            {
              "id": "Ransom:Win32/Crowti.A",
              "display_name": "Ransom:Win32/Crowti.A",
              "target": "/malware/Ransom:Win32/Crowti.A"
            },
            {
              "id": "Doc.Downloader.EmotetRed02220-9938909-0",
              "display_name": "Doc.Downloader.EmotetRed02220-9938909-0",
              "target": null
            },
            {
              "id": "TrojanDropper:Win32/VB.IL",
              "display_name": "TrojanDropper:Win32/VB.IL",
              "target": "/malware/TrojanDropper:Win32/VB.IL"
            },
            {
              "id": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
              "display_name": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
              "target": null
            },
            {
              "id": "ET",
              "display_name": "ET",
              "target": null
            },
            {
              "id": "Cymt",
              "display_name": "Cymt",
              "target": null
            },
            {
              "id": "TrojanDownloader:Win32/Upatre.AA",
              "display_name": "TrojanDownloader:Win32/Upatre.AA",
              "target": "/malware/TrojanDownloader:Win32/Upatre.AA"
            },
            {
              "id": "Win.Trojan.Gh0stRAT-9955419-1",
              "display_name": "Win.Trojan.Gh0stRAT-9955419-1",
              "target": null
            },
            {
              "id": "Win32:MalOb-BX",
              "display_name": "Win32:MalOb-BX",
              "target": null
            },
            {
              "id": "Win.Trojan.Agent",
              "display_name": "Win.Trojan.Agent",
              "target": null
            },
            {
              "id": "VirTool:Win32/Obfuscator.K",
              "display_name": "VirTool:Win32/Obfuscator.K",
              "target": "/malware/VirTool:Win32/Obfuscator.K"
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1143",
              "name": "Hidden Window",
              "display_name": "T1143 - Hidden Window"
            },
            {
              "id": "T1158",
              "name": "Hidden Files and Directories",
              "display_name": "T1158 - Hidden Files and Directories"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1069",
              "name": "Permission Groups Discovery",
              "display_name": "T1069 - Permission Groups Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1011",
              "name": "Exfiltration Over Other Network Medium",
              "display_name": "T1011 - Exfiltration Over Other Network Medium"
            },
            {
              "id": "TA0037",
              "name": "Command and Control",
              "display_name": "TA0037 - Command and Control"
            },
            {
              "id": "T1583.001",
              "name": "Domains",
              "display_name": "T1583.001 - Domains"
            },
            {
              "id": "T1583.005",
              "name": "Botnet",
              "display_name": "T1583.005 - Botnet"
            },
            {
              "id": "T1568.002",
              "name": "Domain Generation Algorithms",
              "display_name": "T1568.002 - Domain Generation Algorithms"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1069.002",
              "name": "Domain Groups",
              "display_name": "T1069.002 - Domain Groups"
            },
            {
              "id": "T1027.002",
              "name": "Software Packing",
              "display_name": "T1027.002 - Software Packing"
            },
            {
              "id": "T1115",
              "name": "Clipboard Data",
              "display_name": "T1115 - Clipboard Data"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 11102,
            "hostname": 4142,
            "domain": 4251,
            "email": 15,
            "FileHash-SHA256": 3108,
            "FileHash-MD5": 624,
            "FileHash-SHA1": 490,
            "CIDR": 1,
            "SSLCertFingerprint": 3
          },
          "indicator_count": 23736,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 140,
          "modified_text": "95 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "Yara: UPX ,  Nrv2x , UPX_OEP_place , UPX290LZMA ,UPXV200V290 ( all by MarkusOberhumerLaszloMolnarJohnReiser)",
        "IDS Detections : Downloader (P2P Zeus dropper UA) TLS Handshake",
        "teslathomas.xyz \u2022 https://teslathomas.xyz/ \u2022 teslaev.d36qivll26iymf.amplifyapp.com",
        "googleusercontent.com | Win32:MalOb-BX\\ [Cryp] \u2022 Win.Trojan.Agent-755615 \u2022 VirTool:Win32/Obfuscator.K \u2022 Win32:MalOb-BX\\ [Cryp]\t\u2022 Win.Trojan.Agent-755615 \u2022 VirTool:Win32/Obfuscator.K",
        "Xpirat = doomscroller.io",
        "IDS Detections Win32/Snojan Variant Uploading EXE Generic HTTP EXE Upload Inbound Generic HTTP EXE Upload Outbound",
        "Location United States ASN  Nameservers ns- \u2022 482.awsdns-60.com.",
        "http://dev-app.project-cicada.com \u2022 https://dev-app.project-cicada.com \u2022",
        "CICADA Contextual Inference & Comprehensive Analysis Data Agent",
        "https://urlscan.io/screenshots/019b1bba-5e12-709b-86eb-fcbbaa4e8375.png",
        "https://goo.gl/9p2vKq",
        "Alerts: alters_windows_utility procmem_yara static_pe_anomaly suricata_alert suspicious_command_tools mouse_movement_detect",
        "NAME project-cicada.com\tIdentity Protection Service\tOn behalf of project-cicada.com",
        "Terse HTTP 1.0 Request Possible Nivdort Trojan-Banker.Win32.Agent.ree Checkin Net-Worm.Win32.Koobface.jxs Checkin AlphaCrypt CnC Beacon 4 AlphaCrypt CnC Beacon 3 WS/JS Downloader Mar 07 2017 M1 Koobface HTTP Request (2) Alphacrypt/TeslaCrypt Ransomware CnC Beacon",
        "IDS Detections Gh0stCringe CnC Activity M2",
        "dev-app.project-cicada.com \u2022 project-cicada.com",
        "Files IP Address api.a 3.169.173.27,3.169.173.49, 3.169.173.87, 3.169.173.92",
        "Alerts: infostealer_browser infostealer_cookies persistence_autorun persistence_autorun_tasks",
        "api.acumatica.flex.redteam.com",
        "Win32/Agent.BH PUP/PUA Downloader CnC Checkin",
        "Trojan-Banker.Win32.Agent.ree Checkin Net-Worm.Win32.Koobface.jxs Checkin AlphaCrypt CnC Beacon 4 AlphaCrypt CnC Beacon 3 WS/JS Downloader Mar 07 2017 M1 Koobface HTTP Request (2) Alphacrypt/TeslaCrypt Ransomware CnC Beacon",
        "IDS Detections: Hiloti Style GET to PHP with invalid terse MSIE headers",
        "Alerts: network_cnc_http network_http packer_unknown_pe_section_name",
        "Alerts:  packer_entropy dead_connect queries_locale_api antidebug_setunhandledexceptionfilter",
        "Yara Detections: ConventionEngine_Term_Desktop ,  ConventionEngine_Term_Users ,  massminer_gh0st",
        "Alerts: polymorphic procmem_yara suricata_alert dynamic_function_loading reads_self",
        "https://api-lsa.lenovosoftware.com/0/lsa/common/clever/generatedUrls",
        "CICADA - Higurashi Analysis Agent [https://dev-app.project-cicada.com/ ]"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": []
        },
        "other": {
          "adversary": [
            "State of Colorado \u2022Tesla Hackers \u2022 (Quasi Government)"
          ],
          "malware_families": [
            "#lowfi:hstr:virtool:win32/obfuscator!diplugem.f",
            "Trojanspy:win32/nivdort.bg",
            "Sodinoki",
            "Bayrob",
            "Expiro",
            "Trojanspy:win32/nivdort.cb",
            "Cutwail",
            "Xpirat",
            "Upatre",
            "Trojandropper:win32/dinwod",
            "Win32:malob-bx",
            "Win.trojan.gh0strat-9955419-1",
            "Win.malware",
            "Win.trojan.agent",
            "Virtool:win32/obfuscator.k",
            "Trojandownloader:win32/cutwail.bs",
            "Et",
            "Ransom:win32/revil.a",
            "#lowfi:lua:mampa:99!ml",
            "Zbot",
            "!#hstr:siggen0136cb6c",
            "Trojan:win32/zbot.sibb6!mtb",
            "Trojandownloader:win32/upatre.aa",
            "Ransom:win32/crowti.a",
            "Ploprolo",
            "Cymt",
            "Win.trojan.barys-10005825-0",
            "Trojandropper:win32/vb.il",
            "Trojandownloader:win32/cutwail",
            "Doc.downloader.emotetred02220-9938909-0",
            "#lowfi:hstr:installer:multiplug",
            "Alf:heraklezeval:trojan:win32/clipbanker"
          ],
          "industries": []
        }
      }
    },
    "false_positive": []
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 6,
  "pulses": [
    {
      "id": "6946fdbb4a22dc28d60d6ca2",
      "name": "Expiro - DoomScroller \u2022 BrowseHappy | Part 2",
      "description": "Pulse: \u00c2\u00a31.1bn.io.com, a search engine for the most popular websites on the planet, is now available on Facebook, Twitter, Instagram and YouTube.",
      "modified": "2026-01-19T19:04:41.997000",
      "created": "2025-12-20T19:49:15.713000",
      "tags": [
        "doomscroller",
        "browsehappy",
        "xpirat",
        "msie",
        "windows nt",
        "wow64",
        "slcc2",
        "media center",
        "read c",
        "united",
        "tlsv1",
        "execution",
        "dock",
        "write",
        "persistence",
        "encrypt",
        "meta",
        "browse happy",
        "worry",
        "body doctype",
        "online",
        "gmt server",
        "a domains",
        "ipv4 add",
        "win32",
        "trojandropper",
        "title",
        "date",
        "unknown",
        "post http",
        "cryptexportkey",
        "cryptgenkey",
        "calgrc4",
        "expiro",
        "temple",
        "xserver",
        "adversaries",
        "worry wordpress"
      ],
      "references": [
        "Xpirat = doomscroller.io"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Xpirat",
          "display_name": "Xpirat",
          "target": null
        },
        {
          "id": "Expiro",
          "display_name": "Expiro",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1457",
          "name": "Malicious Media Content",
          "display_name": "T1457 - Malicious Media Content"
        },
        {
          "id": "T1036.004",
          "name": "Masquerade Task or Service",
          "display_name": "T1036.004 - Masquerade Task or Service"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        },
        {
          "id": "T1011",
          "name": "Exfiltration Over Other Network Medium",
          "display_name": "T1011 - Exfiltration Over Other Network Medium"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "TA0003",
          "name": "Persistence",
          "display_name": "TA0003 - Persistence"
        },
        {
          "id": "TA0037",
          "name": "Command and Control",
          "display_name": "TA0037 - Command and Control"
        },
        {
          "id": "T1595",
          "name": "Active Scanning",
          "display_name": "T1595 - Active Scanning"
        },
        {
          "id": "T1423",
          "name": "Network Service Scanning",
          "display_name": "T1423 - Network Service Scanning"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 5576,
        "domain": 1502,
        "FileHash-MD5": 116,
        "FileHash-SHA1": 73,
        "FileHash-SHA256": 1041,
        "SSLCertFingerprint": 1,
        "hostname": 1951
      },
      "indicator_count": 10260,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "89 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "6946ef0ba069c6b92160f8f6",
      "name": "Doomscroller \u2022 BrowserHappy | Part 1",
      "description": "Comments reserved for Part 2.\nOTX I extraction keeps timing out for me. Possibly location/signal related.",
      "modified": "2026-01-19T17:03:32.999000",
      "created": "2025-12-20T18:46:35.660000",
      "tags": [
        "servers",
        "united states",
        "united",
        "script script",
        "cnc beacon",
        "x5drh",
        "ipv4",
        "urls",
        "twitter",
        "trojandropper",
        "ipv4 add",
        "reverse dns",
        "ransom",
        "mtb may",
        "backdoor",
        "trojanspy",
        "loee7oiy",
        "trojan",
        "win32",
        "susp",
        "mtb jul",
        "virtool",
        "mtb aug",
        "worm",
        "avast avg",
        "lowfi",
        "multiplug jun",
        "urls show",
        "url hostname",
        "server response",
        "ip address",
        "google safe",
        "results dec",
        "k dec",
        "read c",
        "process32nextw",
        "tls handshake",
        "search",
        "show",
        "et info",
        "failure",
        "unknown",
        "service",
        "malware",
        "tools",
        "win64",
        "write",
        "revil",
        "sodinokibi",
        "titan",
        "mtb trojan",
        "mtb alf",
        "win32dinwod may"
      ],
      "references": [
        "Xpirat = doomscroller.io",
        "IDS Detections: Hiloti Style GET to PHP with invalid terse MSIE headers",
        "Win32/Agent.BH PUP/PUA Downloader CnC Checkin",
        "Terse HTTP 1.0 Request Possible Nivdort Trojan-Banker.Win32.Agent.ree Checkin Net-Worm.Win32.Koobface.jxs Checkin AlphaCrypt CnC Beacon 4 AlphaCrypt CnC Beacon 3 WS/JS Downloader Mar 07 2017 M1 Koobface HTTP Request (2) Alphacrypt/TeslaCrypt Ransomware CnC Beacon",
        "Trojan-Banker.Win32.Agent.ree Checkin Net-Worm.Win32.Koobface.jxs Checkin AlphaCrypt CnC Beacon 4 AlphaCrypt CnC Beacon 3 WS/JS Downloader Mar 07 2017 M1 Koobface HTTP Request (2) Alphacrypt/TeslaCrypt Ransomware CnC Beacon"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "TrojanDownloader:Win32/Upatre.AA",
          "display_name": "TrojanDownloader:Win32/Upatre.AA",
          "target": "/malware/TrojanDownloader:Win32/Upatre.AA"
        },
        {
          "id": "Upatre",
          "display_name": "Upatre",
          "target": null
        },
        {
          "id": "Sodinoki",
          "display_name": "Sodinoki",
          "target": null
        },
        {
          "id": "Ransom:Win32/Revil.A",
          "display_name": "Ransom:Win32/Revil.A",
          "target": "/malware/Ransom:Win32/Revil.A"
        },
        {
          "id": "Cutwail",
          "display_name": "Cutwail",
          "target": null
        },
        {
          "id": "!#HSTR:SigGen0136cb6c",
          "display_name": "!#HSTR:SigGen0136cb6c",
          "target": null
        },
        {
          "id": "Bayrob",
          "display_name": "Bayrob",
          "target": null
        },
        {
          "id": "Win.Malware",
          "display_name": "Win.Malware",
          "target": null
        },
        {
          "id": "TrojanSpy:Win32/Nivdort.BG",
          "display_name": "TrojanSpy:Win32/Nivdort.BG",
          "target": "/malware/TrojanSpy:Win32/Nivdort.BG"
        },
        {
          "id": "#Lowfi:Lua:Mampa:99!ml",
          "display_name": "#Lowfi:Lua:Mampa:99!ml",
          "target": null
        },
        {
          "id": "TrojanDownloader:Win32/Cutwail",
          "display_name": "TrojanDownloader:Win32/Cutwail",
          "target": "/malware/TrojanDownloader:Win32/Cutwail"
        },
        {
          "id": "#Lowfi:HSTR:Installer:Multiplug",
          "display_name": "#Lowfi:HSTR:Installer:Multiplug",
          "target": null
        },
        {
          "id": "TrojanDropper:Win32/Dinwod",
          "display_name": "TrojanDropper:Win32/Dinwod",
          "target": "/malware/TrojanDropper:Win32/Dinwod"
        },
        {
          "id": "Win.Trojan.Barys-10005825-0",
          "display_name": "Win.Trojan.Barys-10005825-0",
          "target": null
        },
        {
          "id": "TrojanSpy:Win32/Nivdort.CB",
          "display_name": "TrojanSpy:Win32/Nivdort.CB",
          "target": "/malware/TrojanSpy:Win32/Nivdort.CB"
        },
        {
          "id": "Zbot",
          "display_name": "Zbot",
          "target": null
        },
        {
          "id": "Trojan:Win32/Zbot.SIBB6!MTB",
          "display_name": "Trojan:Win32/Zbot.SIBB6!MTB",
          "target": "/malware/Trojan:Win32/Zbot.SIBB6!MTB"
        },
        {
          "id": "Ploprolo",
          "display_name": "Ploprolo",
          "target": null
        },
        {
          "id": "#Lowfi:HSTR:VirTool:Win32/Obfuscator!Diplugem.F",
          "display_name": "#Lowfi:HSTR:VirTool:Win32/Obfuscator!Diplugem.F",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1047",
          "name": "Windows Management Instrumentation",
          "display_name": "T1047 - Windows Management Instrumentation"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1083",
          "name": "File and Directory Discovery",
          "display_name": "T1083 - File and Directory Discovery"
        },
        {
          "id": "T1089",
          "name": "Disabling Security Tools",
          "display_name": "T1089 - Disabling Security Tools"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 5,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 692,
        "URL": 1666,
        "FileHash-SHA256": 630,
        "hostname": 804,
        "FileHash-MD5": 441,
        "FileHash-SHA1": 437,
        "SSLCertFingerprint": 1,
        "CVE": 1
      },
      "indicator_count": 4672,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "90 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "693f5674439d297728312967",
      "name": "BeenVerified.com | Malicious Information Doman |",
      "description": "34.232.241.155:443 (segment.prod.bidr.io)\t GET\tsegment.prod.bidr.io/associate-segment?buzz_key=tatari&segment_key=tatari-983&value=&uncacheplz=9327084282",
      "modified": "2026-01-14T00:04:33.341000",
      "created": "2025-12-15T00:29:40.025000",
      "tags": [
        "united",
        "as13335",
        "as14061",
        "cname",
        "as20940",
        "date",
        "name",
        "status",
        "present dec",
        "present nov",
        "unknown",
        "body",
        "cluster",
        "msie",
        "windows nt",
        "wow64",
        "slcc2",
        "media center",
        "tlsv1",
        "search",
        "read c",
        "show",
        "execution",
        "next",
        "dock",
        "write",
        "capture",
        "persistence",
        "local",
        "copy",
        "trojan",
        "win32",
        "mtb oct",
        "entries",
        "passive dns",
        "next associated",
        "msr feb",
        "gmt cache",
        "ipv4 add",
        "title",
        "urls",
        "url add",
        "pulse pulses",
        "http",
        "ip address",
        "related nids",
        "files location",
        "flag united",
        "name servers",
        "creation date",
        "emails",
        "domain name",
        "expiration date",
        "servers",
        "error",
        "flag",
        "prefetch8",
        "prefetch1",
        "win64",
        "khtml",
        "gecko",
        "pcap frame",
        "microsoft edge",
        "strings",
        "show process",
        "mitre att",
        "ck id",
        "show technique",
        "ck matrix",
        "sha1",
        "network traffic",
        "ogoogle trust",
        "pattern match",
        "path",
        "hybrid",
        "cookie",
        "general",
        "learn",
        "name tactics",
        "suspicious",
        "informative",
        "command",
        "adversaries",
        "initial access",
        "spawns",
        "ssl certificate",
        "click"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1132",
          "name": "Data Encoding",
          "display_name": "T1132 - Data Encoding"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 1764,
        "FileHash-SHA256": 1006,
        "URL": 5427,
        "domain": 442,
        "email": 3,
        "FileHash-MD5": 115,
        "FileHash-SHA1": 62,
        "SSLCertFingerprint": 21
      },
      "indicator_count": 8840,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 137,
      "modified_text": "95 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "693f5675e3f12fa3229bdcb3",
      "name": "BeenVerified.com | Malicious Information Doman |",
      "description": "34.232.241.155:443 (segment.prod.bidr.io)\t GET\tsegment.prod.bidr.io/associate-segment?buzz_key=tatari&segment_key=tatari-983&value=&uncacheplz=9327084282",
      "modified": "2026-01-14T00:04:33.341000",
      "created": "2025-12-15T00:29:41.963000",
      "tags": [
        "united",
        "as13335",
        "as14061",
        "cname",
        "as20940",
        "date",
        "name",
        "status",
        "present dec",
        "present nov",
        "unknown",
        "body",
        "cluster",
        "msie",
        "windows nt",
        "wow64",
        "slcc2",
        "media center",
        "tlsv1",
        "search",
        "read c",
        "show",
        "execution",
        "next",
        "dock",
        "write",
        "capture",
        "persistence",
        "local",
        "copy",
        "trojan",
        "win32",
        "mtb oct",
        "entries",
        "passive dns",
        "next associated",
        "msr feb",
        "gmt cache",
        "ipv4 add",
        "title",
        "urls",
        "url add",
        "pulse pulses",
        "http",
        "ip address",
        "related nids",
        "files location",
        "flag united",
        "name servers",
        "creation date",
        "emails",
        "domain name",
        "expiration date",
        "servers",
        "error",
        "flag",
        "prefetch8",
        "prefetch1",
        "win64",
        "khtml",
        "gecko",
        "pcap frame",
        "microsoft edge",
        "strings",
        "show process",
        "mitre att",
        "ck id",
        "show technique",
        "ck matrix",
        "sha1",
        "network traffic",
        "ogoogle trust",
        "pattern match",
        "path",
        "hybrid",
        "cookie",
        "general",
        "learn",
        "name tactics",
        "suspicious",
        "informative",
        "command",
        "adversaries",
        "initial access",
        "spawns",
        "ssl certificate",
        "click"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1132",
          "name": "Data Encoding",
          "display_name": "T1132 - Data Encoding"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 1764,
        "FileHash-SHA256": 1006,
        "URL": 5427,
        "domain": 442,
        "email": 3,
        "FileHash-MD5": 115,
        "FileHash-SHA1": 62,
        "SSLCertFingerprint": 21
      },
      "indicator_count": 8840,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 137,
      "modified_text": "95 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "693f57720ddcc1a02d19a78f",
      "name": "GameHack Malware | BeenVerified.com | Information Doman |",
      "description": "",
      "modified": "2026-01-14T00:04:33.341000",
      "created": "2025-12-15T00:33:54.304000",
      "tags": [
        "united",
        "as13335",
        "as14061",
        "cname",
        "as20940",
        "date",
        "name",
        "status",
        "present dec",
        "present nov",
        "unknown",
        "body",
        "cluster",
        "msie",
        "windows nt",
        "wow64",
        "slcc2",
        "media center",
        "tlsv1",
        "search",
        "read c",
        "show",
        "execution",
        "next",
        "dock",
        "write",
        "capture",
        "persistence",
        "local",
        "copy",
        "trojan",
        "win32",
        "mtb oct",
        "entries",
        "passive dns",
        "next associated",
        "msr feb",
        "gmt cache",
        "ipv4 add",
        "title",
        "urls",
        "url add",
        "pulse pulses",
        "http",
        "ip address",
        "related nids",
        "files location",
        "flag united",
        "name servers",
        "creation date",
        "emails",
        "domain name",
        "expiration date",
        "servers",
        "error",
        "flag",
        "prefetch8",
        "prefetch1",
        "win64",
        "khtml",
        "gecko",
        "pcap frame",
        "microsoft edge",
        "strings",
        "show process",
        "mitre att",
        "ck id",
        "show technique",
        "ck matrix",
        "sha1",
        "network traffic",
        "ogoogle trust",
        "pattern match",
        "path",
        "hybrid",
        "cookie",
        "general",
        "learn",
        "name tactics",
        "suspicious",
        "informative",
        "command",
        "adversaries",
        "initial access",
        "spawns",
        "ssl certificate",
        "click"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1132",
          "name": "Data Encoding",
          "display_name": "T1132 - Data Encoding"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "693f5674439d297728312967",
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 1764,
        "FileHash-SHA256": 1006,
        "URL": 5427,
        "domain": 442,
        "email": 3,
        "FileHash-MD5": 115,
        "FileHash-SHA1": 62,
        "SSLCertFingerprint": 21
      },
      "indicator_count": 8840,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "95 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "693f3ef3b05672ba47b903e3",
      "name": "Create Amazing Password Forms - Project Cicada",
      "description": "Huge pulse of multiple IoC\u2019 from Project Cicada URL\n(not the 3301 Mystery) | Monitored Target | Indont know if it\u2019s related to Havana Syndrome. Is related to State of Colorado , Christopher P. \u2018Buzz\u2019 Ahmann and Tesla Hackers, \n\u201cThe right of a man or woman to retreat into his/her own home and there be free is from UNREASONABLE government intrusion is at the \u201c very core\u201d of the Fourth Amendment.\u201d\nFlorida vs. Jardines 569 U.S. 1 (2013)",
      "modified": "2026-01-13T22:02:50.260000",
      "created": "2025-12-14T22:49:23.114000",
      "tags": [
        "cicada",
        "project cicada",
        "united states",
        "quasi government",
        "asnone country",
        "united",
        "moved",
        "agent",
        "meta",
        "title error",
        "reverse dns",
        "servers",
        "urls",
        "url analysis",
        "aaaa",
        "present dec",
        "ip address",
        "america flag",
        "unknown",
        "Christopher P. \u2018Buzz\u2019 Ahmann",
        "brian sabey.",
        "State of Colorado",
        "date checked",
        "url hostname",
        "server response",
        "google safe",
        "results mar",
        "avast avg",
        "qualified immunity",
        "address google",
        "freeman",
        "mathis",
        "special forces",
        "tailored access",
        "tao",
        "hacker force",
        "infiltrate",
        "manipulate",
        "sabotage",
        "tools",
        "show",
        "results nov",
        "9b",
        "tao operations",
        "root9b",
        "hunt operations",
        "error mar",
        "over watch",
        "overkill",
        "read c",
        "memcommit",
        "high",
        "checks",
        "windows",
        "delete",
        "execution",
        "dock",
        "write",
        "persistence",
        "capture",
        "next",
        "local",
        "msie",
        "windows nt",
        "wow64",
        "slcc2",
        "media center",
        "suspicious_write_exe",
        "network_icmp",
        "antisandbox_restart",
        "creates_largekey",
        "infostealer_keylogger",
        "proess_martian",
        "injection_resumethread",
        "allocates_rwx",
        "targeted intelligence",
        "js_eval",
        "network_http",
        "name servers",
        "value domain",
        "domain name",
        "expiration date",
        "safe browsing",
        "unknown ns",
        "record value",
        "vercel",
        "certificate",
        "domain add",
        "refresh",
        "encrypt",
        "x vercel",
        "k jun",
        "mtb jul",
        "next http",
        "scans record",
        "value",
        "deployment not",
        "ransom",
        "trojan",
        "a domains",
        "safari",
        "android",
        "webkit",
        "animation",
        "click",
        "title",
        "passive dns",
        "gmt content",
        "arial helvetica",
        "ipv4 add",
        "status",
        "search",
        "emails",
        "as15169 google",
        "virtool",
        "cryp",
        "as396982",
        "win32",
        "error",
        "code",
        "domain",
        "showing",
        "query",
        "hostile",
        "observed dns",
        "et dns",
        "et info",
        "dns query",
        "malware",
        "push",
        "gmt cache",
        "sameorigin",
        "files",
        "url add",
        "http",
        "related nids",
        "files location",
        "flag united",
        "as44273 host",
        "hostname add",
        "unknown aaaa",
        "win32upatre dec",
        "mtb dec",
        "trojandropper",
        "hstr",
        "next associated",
        "backdoor",
        "entity",
        "tempe",
        "present sep",
        "hostname",
        "verdict",
        "lowfi",
        "usesscrrun",
        "ipv4",
        "element",
        "password",
        "developers",
        "create",
        "forms web",
        "group",
        "make sure",
        "autocomplete",
        "currentpassword",
        "make",
        "extraction",
        "data upload",
        "search otx",
        "ider data",
        "asn na",
        "ag da",
        "source level",
        "url text",
        "general full",
        "url https",
        "protocol h2",
        "security tls",
        "asn16509",
        "amazon02",
        "resource",
        "hash",
        "as16509",
        "us note",
        "route",
        "redacted for",
        "script urls",
        "japan unknown",
        "present apr",
        "present mar",
        "accept",
        "cookie",
        "path",
        "sectigo https",
        "encrypt https",
        "log id",
        "trustasia https",
        "amazon",
        "search criteria",
        "22965417271",
        "summary leaf",
        "timestamp entry",
        "log operator",
        "https",
        "script script",
        "cname",
        "present jun",
        "coup",
        "files ip",
        "address",
        "location united",
        "asn as16509",
        "color value",
        "item tile",
        "gmt max",
        "primary text",
        "text color",
        "play button",
        "search bar",
        "dasher",
        "flag",
        "bad traffic",
        "tls handshake",
        "failure",
        "analysis tip",
        "windir",
        "openurl c",
        "ascii text",
        "ck id",
        "show technique",
        "mitre att",
        "ck matrix",
        "pattern match",
        "network traffic",
        "beginstring",
        "show process",
        "null",
        "span",
        "general",
        "strings",
        "look",
        "verify",
        "restart",
        "dynamicloader",
        "ee fc",
        "yara rule",
        "ff d5",
        "c1 e0",
        "f0 ff",
        "ff ff",
        "eb e2",
        "ed b8",
        "fe ff",
        "june",
        "polymorphic",
        "network cnc",
        "cnc",
        "dead connect",
        "present nov",
        "france unknown",
        "generic http",
        "exe upload",
        "uploading exe",
        "intel",
        "ms windows",
        "medium",
        "http traffic",
        "monitored target",
        "prefetch2",
        "analysis",
        "tor analysis",
        "dns requests",
        "domain address",
        "contacted hosts",
        "learn",
        "command",
        "suspicious",
        "informative",
        "name tactics",
        "spawns",
        "t1480 execution",
        "file defense",
        "file discovery",
        "t1071",
        "t1057",
        "segoe ui",
        "script",
        "html",
        "body",
        "twitter",
        "formbook cnc",
        "checkin",
        "pegasus",
        "get updates",
        "p2p zeus",
        "downloader",
        "mpress",
        "win32upatre sep",
        "win32upatre oct",
        "win32upatre nov",
        "india unknown",
        "r61afin",
        "common upatre",
        "write c",
        "cts exe",
        "ids detections",
        "open",
        "present aug",
        "singapore",
        "date",
        "creation date",
        "pentest people",
        "tesla hackers",
        "vietnam unknown",
        "viet nam",
        "company limited",
        "pulse pulses"
      ],
      "references": [
        "http://dev-app.project-cicada.com \u2022 https://dev-app.project-cicada.com \u2022",
        "dev-app.project-cicada.com \u2022 project-cicada.com",
        "NAME project-cicada.com\tIdentity Protection Service\tOn behalf of project-cicada.com",
        "Files IP Address api.a 3.169.173.27,3.169.173.49, 3.169.173.87, 3.169.173.92",
        "Location United States ASN  Nameservers ns- \u2022 482.awsdns-60.com.",
        "api.acumatica.flex.redteam.com",
        "CICADA - Higurashi Analysis Agent [https://dev-app.project-cicada.com/ ]",
        "CICADA Contextual Inference & Comprehensive Analysis Data Agent",
        "https://urlscan.io/screenshots/019b1bba-5e12-709b-86eb-fcbbaa4e8375.png",
        "https://goo.gl/9p2vKq",
        "IDS Detections Win32/Snojan Variant Uploading EXE Generic HTTP EXE Upload Inbound Generic HTTP EXE Upload Outbound",
        "Yara: UPX ,  Nrv2x , UPX_OEP_place , UPX290LZMA ,UPXV200V290 ( all by MarkusOberhumerLaszloMolnarJohnReiser)",
        "Alerts: polymorphic procmem_yara suricata_alert dynamic_function_loading reads_self",
        "Alerts: network_cnc_http network_http packer_unknown_pe_section_name",
        "Alerts:  packer_entropy dead_connect queries_locale_api antidebug_setunhandledexceptionfilter",
        "IDS Detections : Downloader (P2P Zeus dropper UA) TLS Handshake",
        "IDS Detections Gh0stCringe CnC Activity M2",
        "Yara Detections: ConventionEngine_Term_Desktop ,  ConventionEngine_Term_Users ,  massminer_gh0st",
        "Alerts: infostealer_browser infostealer_cookies persistence_autorun persistence_autorun_tasks",
        "Alerts: alters_windows_utility procmem_yara static_pe_anomaly suricata_alert suspicious_command_tools mouse_movement_detect",
        "https://api-lsa.lenovosoftware.com/0/lsa/common/clever/generatedUrls",
        "googleusercontent.com | Win32:MalOb-BX\\ [Cryp] \u2022 Win.Trojan.Agent-755615 \u2022 VirTool:Win32/Obfuscator.K \u2022 Win32:MalOb-BX\\ [Cryp]\t\u2022 Win.Trojan.Agent-755615 \u2022 VirTool:Win32/Obfuscator.K",
        "teslathomas.xyz \u2022 https://teslathomas.xyz/ \u2022 teslaev.d36qivll26iymf.amplifyapp.com"
      ],
      "public": 1,
      "adversary": "State of Colorado \u2022Tesla Hackers \u2022 (Quasi Government)",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "TrojanDownloader:Win32/Cutwail.BS",
          "display_name": "TrojanDownloader:Win32/Cutwail.BS",
          "target": "/malware/TrojanDownloader:Win32/Cutwail.BS"
        },
        {
          "id": "Ransom:Win32/Crowti.A",
          "display_name": "Ransom:Win32/Crowti.A",
          "target": "/malware/Ransom:Win32/Crowti.A"
        },
        {
          "id": "Doc.Downloader.EmotetRed02220-9938909-0",
          "display_name": "Doc.Downloader.EmotetRed02220-9938909-0",
          "target": null
        },
        {
          "id": "TrojanDropper:Win32/VB.IL",
          "display_name": "TrojanDropper:Win32/VB.IL",
          "target": "/malware/TrojanDropper:Win32/VB.IL"
        },
        {
          "id": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
          "display_name": "ALF:HeraklezEval:Trojan:Win32/ClipBanker",
          "target": null
        },
        {
          "id": "ET",
          "display_name": "ET",
          "target": null
        },
        {
          "id": "Cymt",
          "display_name": "Cymt",
          "target": null
        },
        {
          "id": "TrojanDownloader:Win32/Upatre.AA",
          "display_name": "TrojanDownloader:Win32/Upatre.AA",
          "target": "/malware/TrojanDownloader:Win32/Upatre.AA"
        },
        {
          "id": "Win.Trojan.Gh0stRAT-9955419-1",
          "display_name": "Win.Trojan.Gh0stRAT-9955419-1",
          "target": null
        },
        {
          "id": "Win32:MalOb-BX",
          "display_name": "Win32:MalOb-BX",
          "target": null
        },
        {
          "id": "Win.Trojan.Agent",
          "display_name": "Win.Trojan.Agent",
          "target": null
        },
        {
          "id": "VirTool:Win32/Obfuscator.K",
          "display_name": "VirTool:Win32/Obfuscator.K",
          "target": "/malware/VirTool:Win32/Obfuscator.K"
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1143",
          "name": "Hidden Window",
          "display_name": "T1143 - Hidden Window"
        },
        {
          "id": "T1158",
          "name": "Hidden Files and Directories",
          "display_name": "T1158 - Hidden Files and Directories"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1069",
          "name": "Permission Groups Discovery",
          "display_name": "T1069 - Permission Groups Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1011",
          "name": "Exfiltration Over Other Network Medium",
          "display_name": "T1011 - Exfiltration Over Other Network Medium"
        },
        {
          "id": "TA0037",
          "name": "Command and Control",
          "display_name": "TA0037 - Command and Control"
        },
        {
          "id": "T1583.001",
          "name": "Domains",
          "display_name": "T1583.001 - Domains"
        },
        {
          "id": "T1583.005",
          "name": "Botnet",
          "display_name": "T1583.005 - Botnet"
        },
        {
          "id": "T1568.002",
          "name": "Domain Generation Algorithms",
          "display_name": "T1568.002 - Domain Generation Algorithms"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1069.002",
          "name": "Domain Groups",
          "display_name": "T1069.002 - Domain Groups"
        },
        {
          "id": "T1027.002",
          "name": "Software Packing",
          "display_name": "T1027.002 - Software Packing"
        },
        {
          "id": "T1115",
          "name": "Clipboard Data",
          "display_name": "T1115 - Clipboard Data"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 4,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 11102,
        "hostname": 4142,
        "domain": 4251,
        "email": 15,
        "FileHash-SHA256": 3108,
        "FileHash-MD5": 624,
        "FileHash-SHA1": 490,
        "CIDR": 1,
        "SSLCertFingerprint": 3
      },
      "indicator_count": 23736,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 140,
      "modified_text": "95 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "createxto.com",
    "type": "Domain"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "createxto.com",
    "found": false,
    "verdict": "clean",
    "urls": [],
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776618518.026862
}