{
  "type": "Domain",
  "indicator": "d2plus.com",
  "general": {
    "sections": [
      "general",
      "geo",
      "url_list",
      "passive_dns",
      "malware",
      "whois",
      "http_scans"
    ],
    "whois": "http://whois.domaintools.com/d2plus.com",
    "alexa": "http://www.alexa.com/siteinfo/d2plus.com",
    "indicator": "d2plus.com",
    "type": "domain",
    "type_title": "Domain",
    "validation": [],
    "base_indicator": {
      "id": 3905671724,
      "indicator": "d2plus.com",
      "type": "domain",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 6,
      "pulses": [
        {
          "id": "69458259401a612102d02679",
          "name": "NSO Group ( original pulse degraded by a delete service) ",
          "description": "",
          "modified": "2025-12-19T16:50:33.337000",
          "created": "2025-12-19T16:50:33.337000",
          "tags": [
            "iocs",
            "urls https",
            "generic malware",
            "analyzer threat",
            "url summary",
            "ip summary",
            "summary",
            "detection list",
            "luca stealer",
            "cisco umbrella",
            "site",
            "safe site",
            "heur",
            "malicious url",
            "alexa top",
            "malicious site",
            "malware site",
            "unsafe",
            "trojanx",
            "malware",
            "metastealer",
            "alexa",
            "dbatloader",
            "outbreak",
            "downloader",
            "blocker",
            "ransom",
            "autoit",
            "trojan",
            "irata",
            "allakore",
            "trojanspy",
            "hash",
            "ms windows",
            "pe32",
            "write c",
            "t1045",
            "show",
            "high",
            "search",
            "pe32 executable",
            "copy",
            "write",
            "win64",
            "scan endpoints",
            "all scoreblue",
            "filehash",
            "av detections",
            "ids detections",
            "yara detections",
            "alerts",
            "entries",
            "powershell",
            "mfc mfc",
            "united",
            "as54113",
            "as14061",
            "as9009 m247",
            "whitelisted",
            "status",
            "united kingdom",
            "name servers",
            "aaaa",
            "passive dns",
            "urls",
            "overview ip",
            "address",
            "related nids",
            "files location",
            "files domain",
            "files related",
            "pulses otx",
            "pulses",
            "as15133 verizon",
            "cname",
            "as16552 tiggee",
            "as20940",
            "domain",
            "as16625 akamai",
            "creation date",
            "body",
            "unknown",
            "ipv4",
            "softcnapp",
            "trojandropper",
            "epaeedpaer",
            "eoaee",
            "qaexedoae",
            "showing",
            "sha256",
            "strings",
            "august",
            "files",
            "main",
            "germany asn",
            "win32",
            "miner",
            "next",
            "asnone united",
            "moved",
            "as8987 amazon",
            "trojanproxy",
            "virtool",
            "yara rule",
            "formbook cnc",
            "checkin",
            "mtb aug",
            "a domains",
            "present sep",
            "twitter",
            "accept",
            "certificate",
            "record value",
            "dynamicloader",
            "medium",
            "dynamic",
            "network",
            "reads",
            "port",
            "anomaly",
            "overview domain",
            "tags",
            "related tags",
            "dns status",
            "hostname query",
            "type address",
            "first seen",
            "seen asn",
            "country unknown",
            "nxdomain",
            "a nxdomain",
            "as16276",
            "spain unknown",
            "meta name",
            "frame src",
            "ok set",
            "cookie",
            "gmt date",
            "encrypt",
            "hostname",
            "files ip",
            "address domain",
            "france",
            "emails",
            "aaaa fd00",
            "as16276 ovh",
            "poland",
            "contacted",
            "wine emulator",
            "ip address",
            "script urls",
            "date",
            "meta",
            "flag united",
            "url http",
            "pulse http",
            "http",
            "as8075",
            "robots content",
            "x ua",
            "ieedge chrome1",
            "incapsula",
            "servers",
            "expiration date",
            "sorry something",
            "gmt content",
            "canada unknown",
            "error",
            "backend",
            "france unknown",
            "alfper",
            "gmt contenttype",
            "apache",
            "exploit",
            "as15169 google",
            "wireless",
            "as23027 boingo",
            "pulse submit",
            "url analysis",
            "location united",
            "nso group",
            "pegasus spyware",
            "url indicator",
            "active created",
            "modified",
            "email",
            "nso",
            "germany",
            "pattern",
            "susp",
            "msil",
            "akamai",
            "gmt connection",
            "netherlands",
            "ovhfr",
            "ns nxdomain",
            "australia",
            "redacted for",
            "andariel group",
            "defense",
            "andariel",
            "check",
            "opera ua",
            "et trojan",
            "attempts",
            "april",
            "zbot",
            "possible zeus",
            "as140107 citis",
            "america asn",
            "as22612",
            "as397240",
            "as19527 google",
            "apple"
          ],
          "references": [
            "https://github.com/MSUDenverSystemsEngineering/Salt-Instructional-18/tree/master/AppDeployToolkit",
            "Andariel group \u00bb State-sponsored threat actor & Defense media",
            "IDS Detections: Possible Zbot Activity Common Download Struct Zbot Generic URI/Header Struct .bin",
            "Alerts: nids_malware_alert network_icmp dumped_buffer2 allocates_execute_remote_process",
            "Alerts: persistence_autorun creates_user_folder_exe injection_createremotethread",
            "Alerts: injection_modifies_memory injection_write_memory modifies_proxy_wpad packer_polymorphic self_delete_bat banker_zeus_p2p",
            "PWS:Win32/Zbot!CI: FileHash-SHA256 edfec48c5b9a18add8442f19cf8ecd8457af25a7251cb34fe2d20616dcf315ef",
            "Domains Contacted: crl.microsoft.com blackmarket.ogspy.net",
            "FileHash-SHA256 e5c584fdb2a3684a52edb41836436bb3d88221ffd3eb252516e1ca6dc879f8f9",
            "TrojanDownloader:Win32/Cutwail: IDS Detections: W32/Zbot.InfoStealer WindowsUpdate Connectivity Check With Opera UA Possible Zeus GameOver Connectivity Check 2",
            "NSO Group auto populated/relevant to research results. For several year we've seen evidence of Pegasus attacks on Americans.",
            "Apple:appleremotesupport.com | appleid.cdn-appme.com | appleid.cdn-aqple.com | www.ns1.bdn-apple.com",
            "Used as  Apple IP's : 160.153.62.66 | 162.255.119.21 | 192.64.119.254",
            "Apple: ns2.usm87.siteground.biz | ns2.usm87.siteground.biz | Hostnme www.appleremotesupport.com"
          ],
          "public": 1,
          "adversary": "NSO",
          "targeted_countries": [
            "United States of America",
            "Sweden",
            "Germany",
            "India",
            "United Kingdom of Great Britain and Northern Ireland",
            "France",
            "Spain",
            "Canada",
            "Singapore",
            "Japan",
            "Korea, Republic of",
            "Ireland",
            "Italy"
          ],
          "malware_families": [
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Trojan:Win64/CoinMiner.WE",
              "display_name": "Trojan:Win64/CoinMiner.WE",
              "target": "/malware/Trojan:Win64/CoinMiner.WE"
            },
            {
              "id": "Trojan:Win32/SmokeLoader",
              "display_name": "Trojan:Win32/SmokeLoader",
              "target": "/malware/Trojan:Win32/SmokeLoader"
            },
            {
              "id": "PWS:Win32/Zbot!CI",
              "display_name": "PWS:Win32/Zbot!CI",
              "target": "/malware/PWS:Win32/Zbot!CI"
            },
            {
              "id": "TrojanDownloader:Win32/Cutwail",
              "display_name": "TrojanDownloader:Win32/Cutwail",
              "target": "/malware/TrojanDownloader:Win32/Cutwail"
            }
          ],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1428",
              "name": "Exploit Enterprise Resources",
              "display_name": "T1428 - Exploit Enterprise Resources"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1016.001",
              "name": "Internet Connection Discovery",
              "display_name": "T1016.001 - Internet Connection Discovery"
            },
            {
              "id": "T1033",
              "name": "System Owner/User Discovery",
              "display_name": "T1033 - System Owner/User Discovery"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1059.001",
              "name": "PowerShell",
              "display_name": "T1059.001 - PowerShell"
            },
            {
              "id": "T1017",
              "name": "Application Deployment Software",
              "display_name": "T1017 - Application Deployment Software"
            },
            {
              "id": "T1138",
              "name": "Application Shimming",
              "display_name": "T1138 - Application Shimming"
            },
            {
              "id": "T1001.003",
              "name": "Protocol Impersonation",
              "display_name": "T1001.003 - Protocol Impersonation"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1459",
              "name": "Device Unlock Code Guessing or Brute Force",
              "display_name": "T1459 - Device Unlock Code Guessing or Brute Force"
            },
            {
              "id": "T1445",
              "name": "Abuse of iOS Enterprise App Signing Key",
              "display_name": "T1445 - Abuse of iOS Enterprise App Signing Key"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "66f55cdc8257c7fa223ed052",
          "export_count": 6,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2852,
            "FileHash-SHA1": 2194,
            "FileHash-SHA256": 6649,
            "domain": 1881,
            "hostname": 1706,
            "URL": 553,
            "CVE": 3,
            "email": 25
          },
          "indicator_count": 15863,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "121 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "66f55cdc8257c7fa223ed052",
          "name": "NSO Group attacks Uptown Denver Neighborhood",
          "description": "Stems from 'hushed' cyber attack that lasted for several days in surrounding neighborhoods near (MSU) Metro State University. Pegasus spyware detected. The attack affected devices, bypassed credentials , passwords and compromised networks. Remedy: reset network multiple times. \n\nI'm not implying attack disseminates from MSU. \nSpectrum.com and Quantum Fiber Cyber Folks .PL related / MSU\nSoftware used \n\n\n\n \n*Cyber Folks .pl *https://github.com/MSUDenverSystemsEngineering/Salt-Instructional-18/tree/master/AppDeployToolkit",
          "modified": "2024-10-26T12:05:43.885000",
          "created": "2024-09-26T13:08:44.341000",
          "tags": [
            "iocs",
            "urls https",
            "generic malware",
            "analyzer threat",
            "url summary",
            "ip summary",
            "summary",
            "detection list",
            "luca stealer",
            "cisco umbrella",
            "site",
            "safe site",
            "heur",
            "malicious url",
            "alexa top",
            "malicious site",
            "malware site",
            "unsafe",
            "trojanx",
            "malware",
            "metastealer",
            "alexa",
            "dbatloader",
            "outbreak",
            "downloader",
            "blocker",
            "ransom",
            "autoit",
            "trojan",
            "irata",
            "allakore",
            "trojanspy",
            "hash",
            "ms windows",
            "pe32",
            "write c",
            "t1045",
            "show",
            "high",
            "search",
            "pe32 executable",
            "copy",
            "write",
            "win64",
            "scan endpoints",
            "all scoreblue",
            "filehash",
            "av detections",
            "ids detections",
            "yara detections",
            "alerts",
            "entries",
            "powershell",
            "mfc mfc",
            "united",
            "as54113",
            "as14061",
            "as9009 m247",
            "whitelisted",
            "status",
            "united kingdom",
            "name servers",
            "aaaa",
            "passive dns",
            "urls",
            "overview ip",
            "address",
            "related nids",
            "files location",
            "files domain",
            "files related",
            "pulses otx",
            "pulses",
            "as15133 verizon",
            "cname",
            "as16552 tiggee",
            "as20940",
            "domain",
            "as16625 akamai",
            "creation date",
            "body",
            "unknown",
            "ipv4",
            "softcnapp",
            "trojandropper",
            "epaeedpaer",
            "eoaee",
            "qaexedoae",
            "showing",
            "sha256",
            "strings",
            "august",
            "files",
            "main",
            "germany asn",
            "win32",
            "miner",
            "next",
            "asnone united",
            "moved",
            "as8987 amazon",
            "trojanproxy",
            "virtool",
            "yara rule",
            "formbook cnc",
            "checkin",
            "mtb aug",
            "a domains",
            "present sep",
            "twitter",
            "accept",
            "certificate",
            "record value",
            "dynamicloader",
            "medium",
            "dynamic",
            "network",
            "reads",
            "port",
            "anomaly",
            "overview domain",
            "tags",
            "related tags",
            "dns status",
            "hostname query",
            "type address",
            "first seen",
            "seen asn",
            "country unknown",
            "nxdomain",
            "a nxdomain",
            "as16276",
            "spain unknown",
            "meta name",
            "frame src",
            "ok set",
            "cookie",
            "gmt date",
            "encrypt",
            "hostname",
            "files ip",
            "address domain",
            "france",
            "emails",
            "aaaa fd00",
            "as16276 ovh",
            "poland",
            "contacted",
            "wine emulator",
            "ip address",
            "script urls",
            "date",
            "meta",
            "flag united",
            "url http",
            "pulse http",
            "http",
            "as8075",
            "robots content",
            "x ua",
            "ieedge chrome1",
            "incapsula",
            "servers",
            "expiration date",
            "sorry something",
            "gmt content",
            "canada unknown",
            "error",
            "backend",
            "france unknown",
            "alfper",
            "gmt contenttype",
            "apache",
            "exploit",
            "as15169 google",
            "wireless",
            "as23027 boingo",
            "pulse submit",
            "url analysis",
            "location united",
            "nso group",
            "pegasus spyware",
            "url indicator",
            "active created",
            "modified",
            "email",
            "nso",
            "germany",
            "pattern",
            "susp",
            "msil",
            "akamai",
            "gmt connection",
            "netherlands",
            "ovhfr",
            "ns nxdomain",
            "australia",
            "redacted for",
            "andariel group",
            "defense",
            "andariel",
            "check",
            "opera ua",
            "et trojan",
            "attempts",
            "april",
            "zbot",
            "possible zeus",
            "as140107 citis",
            "america asn",
            "as22612",
            "as397240",
            "as19527 google",
            "apple"
          ],
          "references": [
            "https://github.com/MSUDenverSystemsEngineering/Salt-Instructional-18/tree/master/AppDeployToolkit",
            "Andariel group \u00bb State-sponsored threat actor & Defense media",
            "IDS Detections: Possible Zbot Activity Common Download Struct Zbot Generic URI/Header Struct .bin",
            "Alerts: nids_malware_alert network_icmp dumped_buffer2 allocates_execute_remote_process",
            "Alerts: persistence_autorun creates_user_folder_exe injection_createremotethread",
            "Alerts: injection_modifies_memory injection_write_memory modifies_proxy_wpad packer_polymorphic self_delete_bat banker_zeus_p2p",
            "PWS:Win32/Zbot!CI: FileHash-SHA256 edfec48c5b9a18add8442f19cf8ecd8457af25a7251cb34fe2d20616dcf315ef",
            "Domains Contacted: crl.microsoft.com blackmarket.ogspy.net",
            "FileHash-SHA256 e5c584fdb2a3684a52edb41836436bb3d88221ffd3eb252516e1ca6dc879f8f9",
            "TrojanDownloader:Win32/Cutwail: IDS Detections: W32/Zbot.InfoStealer WindowsUpdate Connectivity Check With Opera UA Possible Zeus GameOver Connectivity Check 2",
            "NSO Group auto populated/relevant to research results. For several year we've seen evidence of Pegasus attacks on Americans.",
            "Apple:appleremotesupport.com | appleid.cdn-appme.com | appleid.cdn-aqple.com | www.ns1.bdn-apple.com",
            "Used as  Apple IP's : 160.153.62.66 | 162.255.119.21 | 192.64.119.254",
            "Apple: ns2.usm87.siteground.biz | ns2.usm87.siteground.biz | Hostnme www.appleremotesupport.com"
          ],
          "public": 1,
          "adversary": "NSO",
          "targeted_countries": [
            "United States of America",
            "Sweden",
            "Germany",
            "India",
            "United Kingdom of Great Britain and Northern Ireland",
            "France",
            "Spain",
            "Canada",
            "Singapore",
            "Japan",
            "Korea, Republic of",
            "Ireland",
            "Italy"
          ],
          "malware_families": [
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Trojan:Win64/CoinMiner.WE",
              "display_name": "Trojan:Win64/CoinMiner.WE",
              "target": "/malware/Trojan:Win64/CoinMiner.WE"
            },
            {
              "id": "Trojan:Win32/SmokeLoader",
              "display_name": "Trojan:Win32/SmokeLoader",
              "target": "/malware/Trojan:Win32/SmokeLoader"
            },
            {
              "id": "PWS:Win32/Zbot!CI",
              "display_name": "PWS:Win32/Zbot!CI",
              "target": "/malware/PWS:Win32/Zbot!CI"
            },
            {
              "id": "TrojanDownloader:Win32/Cutwail",
              "display_name": "TrojanDownloader:Win32/Cutwail",
              "target": "/malware/TrojanDownloader:Win32/Cutwail"
            }
          ],
          "attack_ids": [
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1053",
              "name": "Scheduled Task/Job",
              "display_name": "T1053 - Scheduled Task/Job"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1428",
              "name": "Exploit Enterprise Resources",
              "display_name": "T1428 - Exploit Enterprise Resources"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1016.001",
              "name": "Internet Connection Discovery",
              "display_name": "T1016.001 - Internet Connection Discovery"
            },
            {
              "id": "T1033",
              "name": "System Owner/User Discovery",
              "display_name": "T1033 - System Owner/User Discovery"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1031",
              "name": "Modify Existing Service",
              "display_name": "T1031 - Modify Existing Service"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1070",
              "name": "Indicator Removal on Host",
              "display_name": "T1070 - Indicator Removal on Host"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1059.001",
              "name": "PowerShell",
              "display_name": "T1059.001 - PowerShell"
            },
            {
              "id": "T1017",
              "name": "Application Deployment Software",
              "display_name": "T1017 - Application Deployment Software"
            },
            {
              "id": "T1138",
              "name": "Application Shimming",
              "display_name": "T1138 - Application Shimming"
            },
            {
              "id": "T1001.003",
              "name": "Protocol Impersonation",
              "display_name": "T1001.003 - Protocol Impersonation"
            },
            {
              "id": "T1449",
              "name": "Exploit SS7 to Redirect Phone Calls/SMS",
              "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1155",
              "name": "AppleScript",
              "display_name": "T1155 - AppleScript"
            },
            {
              "id": "T1459",
              "name": "Device Unlock Code Guessing or Brute Force",
              "display_name": "T1459 - Device Unlock Code Guessing or Brute Force"
            },
            {
              "id": "T1445",
              "name": "Abuse of iOS Enterprise App Signing Key",
              "display_name": "T1445 - Abuse of iOS Enterprise App Signing Key"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 40,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 1,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 2852,
            "FileHash-SHA1": 2194,
            "FileHash-SHA256": 6649,
            "domain": 1881,
            "hostname": 1706,
            "URL": 553,
            "CVE": 3,
            "email": 25
          },
          "indicator_count": 15863,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 230,
          "modified_text": "540 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "66eeef55e2c1ec3a4fa60ef4",
          "name": "Android",
          "description": "",
          "modified": "2024-10-25T00:05:34.912000",
          "created": "2024-09-21T16:07:49.763000",
          "tags": [
            "read c",
            "write c",
            "create c",
            "delete c",
            "process32nextw",
            "langchinese",
            "search",
            "regsetvalueexa",
            "medium",
            "show",
            "trojan",
            "malware",
            "copy",
            "write",
            "win32",
            "tools",
            "persistence",
            "execution",
            "local",
            "next",
            "count",
            "august",
            "scan endpoints",
            "all scoreblue",
            "url http",
            "pulse pulses",
            "http",
            "domain",
            "passive dns",
            "urls",
            "files related",
            "pulses otx",
            "unknown",
            "cname",
            "files",
            "ip address",
            "as16276",
            "spain unknown",
            "meta name",
            "frame src",
            "ok set",
            "cookie",
            "gmt date",
            "gmt content",
            "encrypt",
            "france",
            "nxdomain",
            "ns nxdomain",
            "aaaa nxdomain",
            "name servers",
            "soa nxdomain",
            "moved",
            "creation date",
            "date",
            "body",
            "aaaa",
            "asnone belgium",
            "united kingdom",
            "as16276 ovh",
            "sha256",
            "maltaterfb",
            "showing",
            "total",
            "read",
            "delete",
            "default",
            "systemroot",
            "high",
            "virtool",
            "virustotal",
            "hacktool",
            "drweb",
            "vipre",
            "panda",
            "et trojan",
            "msie",
            "windows nt",
            "entries",
            "ascii text",
            "intel",
            "ms windows",
            "salicode",
            "emails",
            "expiration date",
            "france unknown",
            "taskmail",
            "task3dmail",
            "capspdf1",
            "mboxinbox",
            "actionshow",
            "twitter",
            "canada unknown",
            "error",
            "ipv4",
            "backend",
            "alfper",
            "gmt contenttype",
            "gmt server",
            "apache",
            "exploit",
            "hostname",
            "dynamicloader",
            "yara rule",
            "delivery",
            "alpha criteria",
            "inno setup",
            "format",
            "june",
            "stack",
            "dummy",
            "overview domain",
            "pulses",
            "tags",
            "related tags",
            "google safe",
            "browsing",
            "record type",
            "ttl value",
            "status",
            "united",
            "asnone united",
            "record value",
            "trojanproxy",
            "servers",
            "as15169 google",
            "for privacy",
            "domains ii",
            "ransom",
            "checks",
            "bios",
            "cpu name",
            "dynamic",
            "filehash",
            "related nids",
            "files location",
            "ddos",
            "activity",
            "checkin",
            "win64",
            "mirai",
            "technology",
            "dns replication",
            "system label",
            "cloudflarenet",
            "apnic",
            "south brisbane",
            "asia pacific",
            "apnic whois",
            "po box",
            "cordelia st",
            "comment",
            "apnic research",
            "nethandle",
            "arin",
            "andariel",
            "yara detections",
            "malware traffic",
            "nids",
            "icmp traffic",
            "dns query",
            "tcp syn",
            "resolverror",
            "externalport",
            "internalport",
            "http headers",
            "home network",
            "pulse submit",
            "url analysis",
            "mitre att",
            "ta0002 shared",
            "modules t1129",
            "windows",
            "ta0004 access",
            "t1134",
            "defense evasion",
            "xor encrypt",
            "rc4 prga",
            "catalog tree",
            "analysis ob0001",
            "analysis ob0002",
            "command",
            "control ob0004",
            "ob0005 defense",
            "evasion ob0006",
            "file system",
            "oc0001 process",
            "oc0003 data",
            "hashes c2ae",
            "capa",
            "cape sandbox",
            "lastline",
            "microsoft",
            "memory pattern",
            "dns resolutions",
            "ip traffic",
            "urls tcp",
            "tiger rat",
            "hi",
            "helping sabey"
          ],
          "references": [
            "Andariel Backdoor Activity (Checkin)",
            "IDS: WGET Command Specifying Output in HTTP Headers",
            "IDS: D-Link Devices Home Network Administration Protocol Command Execution",
            "Trojan.NukeSped./TigerRat | Trojan[APT]/Win32.Lazarus | Cited: Andariel group \u00bb state-sponsored threat actor & Defense media",
            "Mr. Telephone man. there js something wrong with her line when she tries to dial a number, she gets a freak every time..."
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Trojan:Win32/Tonmye",
              "display_name": "Trojan:Win32/Tonmye",
              "target": "/malware/Trojan:Win32/Tonmye"
            },
            {
              "id": "Win32:Kamso",
              "display_name": "Win32:Kamso",
              "target": null
            },
            {
              "id": "VirTool:Win32/CeeInject.GF",
              "display_name": "VirTool:Win32/CeeInject.GF",
              "target": "/malware/VirTool:Win32/CeeInject.GF"
            },
            {
              "id": "ALFPER:PUA:Win32/InstallCore",
              "display_name": "ALFPER:PUA:Win32/InstallCore",
              "target": null
            },
            {
              "id": "Trojan:Win32/Tonmye!rfn",
              "display_name": "Trojan:Win32/Tonmye!rfn",
              "target": "/malware/Trojan:Win32/Tonmye!rfn"
            },
            {
              "id": "Ransom:Win32/Ako",
              "display_name": "Ransom:Win32/Ako",
              "target": "/malware/Ransom:Win32/Ako"
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "ARIN",
              "display_name": "ARIN",
              "target": null
            },
            {
              "id": "APNIC",
              "display_name": "APNIC",
              "target": null
            },
            {
              "id": "ELF:DDoS-Y\\ [Trj]",
              "display_name": "ELF:DDoS-Y\\ [Trj]",
              "target": null
            },
            {
              "id": "Unix.Trojan.Mirai-6981169-0",
              "display_name": "Unix.Trojan.Mirai-6981169-0",
              "target": null
            },
            {
              "id": "Trojan[APT]/Win32.Lazarus",
              "display_name": "Trojan[APT]/Win32.Lazarus",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1023",
              "name": "Shortcut Modification",
              "display_name": "T1023 - Shortcut Modification"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1089",
              "name": "Disabling Security Tools",
              "display_name": "T1089 - Disabling Security Tools"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1134",
              "name": "Access Token Manipulation",
              "display_name": "T1134 - Access Token Manipulation"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "66ebda7ebbe759bb12cebd4a",
          "export_count": 43,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "MayDay23",
            "id": "292773",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 889,
            "FileHash-SHA1": 817,
            "FileHash-SHA256": 3623,
            "domain": 755,
            "SSLCertFingerprint": 1,
            "URL": 396,
            "hostname": 732,
            "email": 14,
            "CVE": 3,
            "CIDR": 2
          },
          "indicator_count": 7232,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 10,
          "modified_text": "542 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "67176428e4871c2726288178",
          "name": "Android",
          "description": "",
          "modified": "2024-10-25T00:05:34.912000",
          "created": "2024-10-22T08:36:56.514000",
          "tags": [
            "read c",
            "write c",
            "create c",
            "delete c",
            "process32nextw",
            "langchinese",
            "search",
            "regsetvalueexa",
            "medium",
            "show",
            "trojan",
            "malware",
            "copy",
            "write",
            "win32",
            "tools",
            "persistence",
            "execution",
            "local",
            "next",
            "count",
            "august",
            "scan endpoints",
            "all scoreblue",
            "url http",
            "pulse pulses",
            "http",
            "domain",
            "passive dns",
            "urls",
            "files related",
            "pulses otx",
            "unknown",
            "cname",
            "files",
            "ip address",
            "as16276",
            "spain unknown",
            "meta name",
            "frame src",
            "ok set",
            "cookie",
            "gmt date",
            "gmt content",
            "encrypt",
            "france",
            "nxdomain",
            "ns nxdomain",
            "aaaa nxdomain",
            "name servers",
            "soa nxdomain",
            "moved",
            "creation date",
            "date",
            "body",
            "aaaa",
            "asnone belgium",
            "united kingdom",
            "as16276 ovh",
            "sha256",
            "maltaterfb",
            "showing",
            "total",
            "read",
            "delete",
            "default",
            "systemroot",
            "high",
            "virtool",
            "virustotal",
            "hacktool",
            "drweb",
            "vipre",
            "panda",
            "et trojan",
            "msie",
            "windows nt",
            "entries",
            "ascii text",
            "intel",
            "ms windows",
            "salicode",
            "emails",
            "expiration date",
            "france unknown",
            "taskmail",
            "task3dmail",
            "capspdf1",
            "mboxinbox",
            "actionshow",
            "twitter",
            "canada unknown",
            "error",
            "ipv4",
            "backend",
            "alfper",
            "gmt contenttype",
            "gmt server",
            "apache",
            "exploit",
            "hostname",
            "dynamicloader",
            "yara rule",
            "delivery",
            "alpha criteria",
            "inno setup",
            "format",
            "june",
            "stack",
            "dummy",
            "overview domain",
            "pulses",
            "tags",
            "related tags",
            "google safe",
            "browsing",
            "record type",
            "ttl value",
            "status",
            "united",
            "asnone united",
            "record value",
            "trojanproxy",
            "servers",
            "as15169 google",
            "for privacy",
            "domains ii",
            "ransom",
            "checks",
            "bios",
            "cpu name",
            "dynamic",
            "filehash",
            "related nids",
            "files location",
            "ddos",
            "activity",
            "checkin",
            "win64",
            "mirai",
            "technology",
            "dns replication",
            "system label",
            "cloudflarenet",
            "apnic",
            "south brisbane",
            "asia pacific",
            "apnic whois",
            "po box",
            "cordelia st",
            "comment",
            "apnic research",
            "nethandle",
            "arin",
            "andariel",
            "yara detections",
            "malware traffic",
            "nids",
            "icmp traffic",
            "dns query",
            "tcp syn",
            "resolverror",
            "externalport",
            "internalport",
            "http headers",
            "home network",
            "pulse submit",
            "url analysis",
            "mitre att",
            "ta0002 shared",
            "modules t1129",
            "windows",
            "ta0004 access",
            "t1134",
            "defense evasion",
            "xor encrypt",
            "rc4 prga",
            "catalog tree",
            "analysis ob0001",
            "analysis ob0002",
            "command",
            "control ob0004",
            "ob0005 defense",
            "evasion ob0006",
            "file system",
            "oc0001 process",
            "oc0003 data",
            "hashes c2ae",
            "capa",
            "cape sandbox",
            "lastline",
            "microsoft",
            "memory pattern",
            "dns resolutions",
            "ip traffic",
            "urls tcp",
            "tiger rat",
            "hi",
            "helping sabey"
          ],
          "references": [
            "Andariel Backdoor Activity (Checkin)",
            "IDS: WGET Command Specifying Output in HTTP Headers",
            "IDS: D-Link Devices Home Network Administration Protocol Command Execution",
            "Trojan.NukeSped./TigerRat | Trojan[APT]/Win32.Lazarus | Cited: Andariel group \u00bb state-sponsored threat actor & Defense media",
            "Mr. Telephone man. there js something wrong with her line when she tries to dial a number, she gets a freak every time..."
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Trojan:Win32/Tonmye",
              "display_name": "Trojan:Win32/Tonmye",
              "target": "/malware/Trojan:Win32/Tonmye"
            },
            {
              "id": "Win32:Kamso",
              "display_name": "Win32:Kamso",
              "target": null
            },
            {
              "id": "VirTool:Win32/CeeInject.GF",
              "display_name": "VirTool:Win32/CeeInject.GF",
              "target": "/malware/VirTool:Win32/CeeInject.GF"
            },
            {
              "id": "ALFPER:PUA:Win32/InstallCore",
              "display_name": "ALFPER:PUA:Win32/InstallCore",
              "target": null
            },
            {
              "id": "Trojan:Win32/Tonmye!rfn",
              "display_name": "Trojan:Win32/Tonmye!rfn",
              "target": "/malware/Trojan:Win32/Tonmye!rfn"
            },
            {
              "id": "Ransom:Win32/Ako",
              "display_name": "Ransom:Win32/Ako",
              "target": "/malware/Ransom:Win32/Ako"
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "ARIN",
              "display_name": "ARIN",
              "target": null
            },
            {
              "id": "APNIC",
              "display_name": "APNIC",
              "target": null
            },
            {
              "id": "ELF:DDoS-Y\\ [Trj]",
              "display_name": "ELF:DDoS-Y\\ [Trj]",
              "target": null
            },
            {
              "id": "Unix.Trojan.Mirai-6981169-0",
              "display_name": "Unix.Trojan.Mirai-6981169-0",
              "target": null
            },
            {
              "id": "Trojan[APT]/Win32.Lazarus",
              "display_name": "Trojan[APT]/Win32.Lazarus",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1023",
              "name": "Shortcut Modification",
              "display_name": "T1023 - Shortcut Modification"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1089",
              "name": "Disabling Security Tools",
              "display_name": "T1089 - Disabling Security Tools"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1134",
              "name": "Access Token Manipulation",
              "display_name": "T1134 - Access Token Manipulation"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "66eeef55e2c1ec3a4fa60ef4",
          "export_count": 33,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": true,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "jefivnguyen",
            "id": "293031",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 889,
            "FileHash-SHA1": 817,
            "FileHash-SHA256": 3623,
            "domain": 755,
            "SSLCertFingerprint": 1,
            "URL": 396,
            "hostname": 732,
            "email": 14,
            "CVE": 3,
            "CIDR": 2
          },
          "indicator_count": 7232,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 37,
          "modified_text": "542 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "66ebda7ebbe759bb12cebd4a",
          "name": "Andariel Backdoor Activity - Mirai found  in Android",
          "description": "Andariel Backdoor Activity: Cited as a state sponsored threat group, this ET malware Check in) can be accessed by decent hackers. Found in a targets android device. \n\nDevice being used to attack , manipulate accounts , files and every CnC  Botmaster task desired.\n\nNote:. Hack responsibly.. Stop attacking innocent civilians.",
          "modified": "2024-10-19T07:01:20.116000",
          "created": "2024-09-19T08:02:06.265000",
          "tags": [
            "read c",
            "write c",
            "create c",
            "delete c",
            "process32nextw",
            "langchinese",
            "search",
            "regsetvalueexa",
            "medium",
            "show",
            "trojan",
            "malware",
            "copy",
            "write",
            "win32",
            "tools",
            "persistence",
            "execution",
            "local",
            "next",
            "count",
            "august",
            "scan endpoints",
            "all scoreblue",
            "url http",
            "pulse pulses",
            "http",
            "domain",
            "passive dns",
            "urls",
            "files related",
            "pulses otx",
            "unknown",
            "cname",
            "files",
            "ip address",
            "as16276",
            "spain unknown",
            "meta name",
            "frame src",
            "ok set",
            "cookie",
            "gmt date",
            "gmt content",
            "encrypt",
            "france",
            "nxdomain",
            "ns nxdomain",
            "aaaa nxdomain",
            "name servers",
            "soa nxdomain",
            "moved",
            "creation date",
            "date",
            "body",
            "aaaa",
            "asnone belgium",
            "united kingdom",
            "as16276 ovh",
            "sha256",
            "maltaterfb",
            "showing",
            "total",
            "read",
            "delete",
            "default",
            "systemroot",
            "high",
            "virtool",
            "virustotal",
            "hacktool",
            "drweb",
            "vipre",
            "panda",
            "et trojan",
            "msie",
            "windows nt",
            "entries",
            "ascii text",
            "intel",
            "ms windows",
            "salicode",
            "emails",
            "expiration date",
            "france unknown",
            "taskmail",
            "task3dmail",
            "capspdf1",
            "mboxinbox",
            "actionshow",
            "twitter",
            "canada unknown",
            "error",
            "ipv4",
            "backend",
            "alfper",
            "gmt contenttype",
            "gmt server",
            "apache",
            "exploit",
            "hostname",
            "dynamicloader",
            "yara rule",
            "delivery",
            "alpha criteria",
            "inno setup",
            "format",
            "june",
            "stack",
            "dummy",
            "overview domain",
            "pulses",
            "tags",
            "related tags",
            "google safe",
            "browsing",
            "record type",
            "ttl value",
            "status",
            "united",
            "asnone united",
            "record value",
            "trojanproxy",
            "servers",
            "as15169 google",
            "for privacy",
            "domains ii",
            "ransom",
            "checks",
            "bios",
            "cpu name",
            "dynamic",
            "filehash",
            "related nids",
            "files location",
            "ddos",
            "activity",
            "checkin",
            "win64",
            "mirai",
            "technology",
            "dns replication",
            "system label",
            "cloudflarenet",
            "apnic",
            "south brisbane",
            "asia pacific",
            "apnic whois",
            "po box",
            "cordelia st",
            "comment",
            "apnic research",
            "nethandle",
            "arin",
            "andariel",
            "yara detections",
            "malware traffic",
            "nids",
            "icmp traffic",
            "dns query",
            "tcp syn",
            "resolverror",
            "externalport",
            "internalport",
            "http headers",
            "home network",
            "pulse submit",
            "url analysis",
            "mitre att",
            "ta0002 shared",
            "modules t1129",
            "windows",
            "ta0004 access",
            "t1134",
            "defense evasion",
            "xor encrypt",
            "rc4 prga",
            "catalog tree",
            "analysis ob0001",
            "analysis ob0002",
            "command",
            "control ob0004",
            "ob0005 defense",
            "evasion ob0006",
            "file system",
            "oc0001 process",
            "oc0003 data",
            "hashes c2ae",
            "capa",
            "cape sandbox",
            "lastline",
            "microsoft",
            "memory pattern",
            "dns resolutions",
            "ip traffic",
            "urls tcp",
            "tiger rat",
            "hi",
            "helping sabey"
          ],
          "references": [
            "Andariel Backdoor Activity (Checkin)",
            "IDS: WGET Command Specifying Output in HTTP Headers",
            "IDS: D-Link Devices Home Network Administration Protocol Command Execution",
            "Trojan.NukeSped./TigerRat | Trojan[APT]/Win32.Lazarus | Cited: Andariel group \u00bb state-sponsored threat actor & Defense media",
            "Mr. Telephone man. there js something wrong with her line when she tries to dial a number, she gets a freak every time..."
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Trojan:Win32/Tonmye",
              "display_name": "Trojan:Win32/Tonmye",
              "target": "/malware/Trojan:Win32/Tonmye"
            },
            {
              "id": "Win32:Kamso",
              "display_name": "Win32:Kamso",
              "target": null
            },
            {
              "id": "VirTool:Win32/CeeInject.GF",
              "display_name": "VirTool:Win32/CeeInject.GF",
              "target": "/malware/VirTool:Win32/CeeInject.GF"
            },
            {
              "id": "ALFPER:PUA:Win32/InstallCore",
              "display_name": "ALFPER:PUA:Win32/InstallCore",
              "target": null
            },
            {
              "id": "Trojan:Win32/Tonmye!rfn",
              "display_name": "Trojan:Win32/Tonmye!rfn",
              "target": "/malware/Trojan:Win32/Tonmye!rfn"
            },
            {
              "id": "Ransom:Win32/Ako",
              "display_name": "Ransom:Win32/Ako",
              "target": "/malware/Ransom:Win32/Ako"
            },
            {
              "id": "Mirai",
              "display_name": "Mirai",
              "target": null
            },
            {
              "id": "ARIN",
              "display_name": "ARIN",
              "target": null
            },
            {
              "id": "APNIC",
              "display_name": "APNIC",
              "target": null
            },
            {
              "id": "ELF:DDoS-Y\\ [Trj]",
              "display_name": "ELF:DDoS-Y\\ [Trj]",
              "target": null
            },
            {
              "id": "Unix.Trojan.Mirai-6981169-0",
              "display_name": "Unix.Trojan.Mirai-6981169-0",
              "target": null
            },
            {
              "id": "Trojan[APT]/Win32.Lazarus",
              "display_name": "Trojan[APT]/Win32.Lazarus",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1023",
              "name": "Shortcut Modification",
              "display_name": "T1023 - Shortcut Modification"
            },
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1089",
              "name": "Disabling Security Tools",
              "display_name": "T1089 - Disabling Security Tools"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1119",
              "name": "Automated Collection",
              "display_name": "T1119 - Automated Collection"
            },
            {
              "id": "T1129",
              "name": "Shared Modules",
              "display_name": "T1129 - Shared Modules"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1134",
              "name": "Access Token Manipulation",
              "display_name": "T1134 - Access Token Manipulation"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 25,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 889,
            "FileHash-SHA1": 817,
            "FileHash-SHA256": 3623,
            "domain": 755,
            "SSLCertFingerprint": 1,
            "URL": 396,
            "hostname": 732,
            "email": 14,
            "CVE": 3,
            "CIDR": 2
          },
          "indicator_count": 7232,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 234,
          "modified_text": "548 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "666d1488316880c73e04054e",
          "name": "Prorat.19.i | Backdoor:Win32/Tofsee.T - Amazon.com | iOS  | Denver",
          "description": "Targets family members device attacked while shopping on Amazon.com using an obviously device compromised, newer, fully updated iOS device. \nAmazon legal? [legal-choice.ru, youla.legal, https://www.effectv.com/legal/advertiser-terms-and-conditions]\n[applehealthcare.com apple-rehab.com: Backdoor:Win32/Tofsee.T]\nAdversarial CnC over devices and networks.\nRelentless attacks.",
          "modified": "2024-07-15T03:03:34.888000",
          "created": "2024-06-15T04:11:52.737000",
          "tags": [
            "server",
            "hostmaster",
            "amazon legal",
            "dept",
            "amazon",
            "street",
            "stateprovince",
            "postal code",
            "view whois",
            "whois record",
            "date",
            "contact",
            "threat roundup",
            "november",
            "march",
            "december",
            "february",
            "october",
            "january",
            "highly targeted",
            "data",
            "boost mobile",
            "formbook",
            "response final",
            "url https",
            "ip address",
            "status code",
            "body length",
            "kb body",
            "sha256",
            "headers",
            "ord52c2 via",
            "cloudfront",
            "sha1",
            "pattern match",
            "ascii text",
            "document file",
            "v2 document",
            "crlf line",
            "size",
            "unicode",
            "beginstring",
            "null",
            "hybrid",
            "refresh",
            "body",
            "span",
            "june",
            "click",
            "strings",
            "error",
            "tools",
            "look",
            "verify",
            "restart",
            "unknown",
            "embeddedwb",
            "windows",
            "search",
            "medium",
            "united",
            "show",
            "whitelisted",
            "shellexecuteexw",
            "msie",
            "tofsee",
            "service",
            "write",
            "win32",
            "malware",
            "copy",
            "a nxdomain",
            "passive dns",
            "domain",
            "scan endpoints",
            "all scoreblue",
            "pulse pulses",
            "urls",
            "files",
            "ip related",
            "process32nextw",
            "components",
            "writeconsolew",
            "copy c",
            "delete c",
            "query",
            "useruin",
            "delphi",
            "capture",
            "install",
            "prorat",
            "url http",
            "http",
            "related nids",
            "files location",
            "regsetvalueexa",
            "hx88x89",
            "regbinary",
            "x95xd3xa4",
            "x8dxb7xb7",
            "hx88x9ax1e",
            "mx81xd1r",
            "x92xac",
            "xc2x84",
            "x93xaf",
            "stream",
            "persistence",
            "execution",
            "creation date",
            "entries",
            "as44273 host",
            "record value",
            "status",
            "nxdomain",
            "content type",
            "accept",
            "gmt server",
            "gmt etag",
            "accept encoding",
            "ipv4",
            "path",
            "pragma",
            "name servers",
            "west domains",
            "hostname",
            "next",
            "asnone germany",
            "as21499 host",
            "singapore",
            "france",
            "object",
            "com cnt",
            "dem fin",
            "found",
            "as16276",
            "spain unknown",
            "meta name",
            "frame src",
            "ok set",
            "cookie",
            "gmt date",
            "gmt content",
            "encrypt",
            "levelblue",
            "open threat",
            "meta",
            "a div",
            "div div",
            "france unknown",
            "ok server",
            "type",
            "seychelles",
            "whitesky",
            "as29182 jsc",
            "showing",
            "as24940 hetzner",
            "moved",
            "expiration date",
            "aaaa",
            "russia",
            "as15169 google",
            "germany",
            "emails",
            "germany unknown",
            "a domains",
            "body doctype",
            "html public",
            "ietfdtd html",
            "finland",
            "asnone iran",
            "iran",
            "td tr",
            "td td",
            "tbody",
            "tr tr",
            "domains",
            "backdoor",
            "apple",
            "radio hacking",
            "voicestram",
            "listening",
            "trojan",
            "twitter",
            "servers",
            "vbs",
            "data center",
            "avg clamav",
            "msdefender sep",
            "vitro mar",
            "Win32:Vitro",
            "target: tsara brashears",
            "target: brashears personal devices",
            "target: whitesky communication network",
            "target: accounting firm devices",
            "targets: intellectual property",
            "redrum",
            "open",
            "tr tbody",
            "rsa ca",
            "apache",
            "as7922 comcast",
            "pulse submit",
            "url analysis",
            "epss",
            "impact",
            "cve cve20178977",
            "exploits",
            "targeted",
            "cve overview",
            "media"
          ],
          "references": [
            "Targets Apple iPad /iOS | www.amazon.com/ref=ap_frn_logo [embedded] | www.amazon.com  ns1.amzndns.co.uk , ns1.amzndns.com",
            "cory@whiteskycommunications.com IP: 137.83.95.132 targets victims associates Amazon account and all devices. CnC target Network",
            "High Priority Alerts: dead_host network_icmp nolookup_communication persistence_autorun bypass_firewall",
            "Win32/Tofsee.AX - https://otx.alienvault.com/indicator/file/47565f3a809e997530e8b0d1602a39cb9cc3dd9e1361db2f9dd5891dfd444383",
            "network_http suspicious_tld allocates_rwx antivm_disk_size creates_exe creates_service suspicious_process stealth_window packer_entropy uses_windows_utilities console_output pe_features",
            "Prorat.19.i: https://otx.alienvault.com/indicator/file/03f92e83f56ad2d687ee2fb7ab21b7fea0bebc1abc82d387a52510b61506e68f",
            "IDS: Prorat.19.i Checkin | DYNAMIC_DNS Query to a Suspicious no-ip Domain | CP Email Send via HTTP - Often Trojan Install Reports",
            "Domains Contacted: you.no-ip.com smtp.secureserver.net www.icq.com www.yoursite.com gmali.com",
            "message.htm.com | Ransomware",
            "www.test_ico355_subsequent_invoices.htm.com\tA NXDOMAIN",
            "htm.com: htm | prod.phx3.secureserver.net | unknown.ip.secureserver.net",
            "https://otx.alienvault.com/indicator/file/03f92e83f56ad2d687ee2fb7ab21b7fea0bebc1abc82d387a52510b61506e68f",
            "Win.Trojan.Tofsee-6840338-0 | https://otx.alienvault.com/indicator/domain/applehealthcare.com",
            "applegatecode.com, applehealthcare.com, nord-com.it, mail.apple-rehab.com, msa-smtp-mx1.hinet.net, https://itae-innova.com/wp-content/themes/itaeinnova/images/apple-touch-icon-114x114.png No Expiration\t0\t  Domain itae-innova.com No Expiration\t0\t  URL https://itae-innova.com/wp-content/themes/itaeinnova/images/apple-touch-icon-152x152.png, 50.205.3.1 2024-07-14T22:00:00\t0\t  Domain apple-rehab.com No Expiration\t0\t  Domain applegatecode.com",
            "Some items found relates to research exploited against or researched by target: disabled_duck",
            "Crypt_r.AWJ: FileHash-SHA256 cc83b186700b21e5c4cae0f8236ae3e50ab47c2c21a3987ea00463056cbd1c26",
            "Crypt_r.BCM: FileHash-SHA256 1e0449b5a573e08289ba8de12b70410abfb021f81819b462cd7659fbcb361b11",
            "Crypt_r.BCM: FileHash-SHA256 cc83b186700b21e5c4cae",
            "Crypt_r.BDI: FileHash-SHA256 1e0449b5a573e08289ba8de12b70410abfb021f81819b462cd7659fbcb361b11",
            "Crypt_r.BDI: FileHash-SHA256 71906e67e75f832dfbd2c63fde953d76b6502e48e78badd3ef6fe30d02390268",
            "3.33.152.147: Trojan:Win32/Dursg.K | Verdict External> IP Lookup Service Classification Cloud provider Reverse DNS a4ec4c6ea1c92e2e6.awsglobalaccelerator.com",
            "3.33.152.147: https://otx.alienvault.com/indicator/ip/3.33.152.147",
            "3.33.152.147 - High Priority IDS Detections: Worm.Win32/Chiviper.C Checkin Possible Fake AV Checkin Kazy/Kryptor/Cycbot",
            "3.33.152.147 - High Priority IDS Detections: Trojan Checkin Win32.Meredrop Checkin CryptoWall Check-in Net-Worm.Win32.Koobface.jxs",
            "3.33.152.147 - High Priority IDS Detections: Checkin Virut Counter/Check-in Backdoor.Win32.Polybot.A Checkin 3 Koobface HTTP Request (2) Win32.Sality-GR Checkin",
            "3.33.152.147 - ALF:HSTR:Trojan:Win32/StartPage.ZS!bit ,  ALF:HeraklezEval:PUA:Win32/InstallCore.R ,  ALF:HeraklezEval:Ransom:Win32/Tescrypt!rfn",
            "3.33.152.147 - Antivirus Detections: !#AddsCopyToStartup ,  !#HSTR:SigGen0136cb6c ,  ALF:AGGR:OpcCl:99!ml , ALF:Exploit:O97M/CVE-2017-8977",
            "3.33.152.147 - Antivirus Detections:  ALF:HeraklezEval:Trojan:Win32/Startpage!rfn ,  ALF:HeraklezEval:Trojan:Win32/Ymacco.AA47",
            "3.33.152.147 - Antivirus Detections:  ALF:HeraklezEval:Trojan:Win32/SpyNoon!rfn ,",
            "85.10.215.232 - Classification Datacenter / Hosting / VPS Reverse DNS dediextern.your-server.de Location: Munich,  Germany | konsoleH :: Login",
            "87.98.231.87 - Classification Datacenter / Hosting / VPS Reverse DNS cluster014.ovh.net Location;  Spain | AVD:: TrojanDownloader:JS/Nemucod.QJ",
            "87.98.231.87 - IDS Detections: MalDoc Request for Payload, Unsupported/Fake Windows NT Version 5.0",
            "CVE-2017-8977 - https://otx.alienvault.com/indicator/cve/CVE-2017-8977",
            "CVE-2017-11882 - https://otx.alienvault.com/indicator/cve/CVE-2017-11882"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "Seychelles",
            "Netherlands",
            "France",
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Backdoor:Win32/Tofsee.T",
              "display_name": "Backdoor:Win32/Tofsee.T",
              "target": "/malware/Backdoor:Win32/Tofsee.T"
            },
            {
              "id": "Win32:BackdoorX-gen\\ [Trj]",
              "display_name": "Win32:BackdoorX-gen\\ [Trj]",
              "target": null
            },
            {
              "id": "Win.Trojan.Tofsee-6840338-0",
              "display_name": "Win.Trojan.Tofsee-6840338-0",
              "target": null
            },
            {
              "id": "Win32:Trojan-gen",
              "display_name": "Win32:Trojan-gen",
              "target": null
            },
            {
              "id": "Trojan:Win32/Dursg.K",
              "display_name": "Trojan:Win32/Dursg.K",
              "target": "/malware/Trojan:Win32/Dursg.K"
            },
            {
              "id": "Win.Packer.pkr_ce1a-9980177-0",
              "display_name": "Win.Packer.pkr_ce1a-9980177-0",
              "target": null
            },
            {
              "id": "Win.Trojan.Downloader-42770",
              "display_name": "Win.Trojan.Downloader-42770",
              "target": null
            },
            {
              "id": "TrojanDownloader:JS/Nemucod.QJ",
              "display_name": "TrojanDownloader:JS/Nemucod.QJ",
              "target": "/malware/TrojanDownloader:JS/Nemucod.QJ"
            },
            {
              "id": "Win32:Trojan-gen",
              "display_name": "Win32:Trojan-gen",
              "target": null
            },
            {
              "id": "Win32:Kamso",
              "display_name": "Win32:Kamso",
              "target": null
            },
            {
              "id": "Win.Trojan.Magania-13720",
              "display_name": "Win.Trojan.Magania-13720",
              "target": null
            },
            {
              "id": "Win32:Sality",
              "display_name": "Win32:Sality",
              "target": null
            },
            {
              "id": "Win.Trojan.Swisyn-6819",
              "display_name": "Win.Trojan.Swisyn-6819",
              "target": null
            },
            {
              "id": "Win32:SaliCode",
              "display_name": "Win32:SaliCode",
              "target": null
            },
            {
              "id": "Win.Trojan.Agent-1313630",
              "display_name": "Win.Trojan.Agent-1313630",
              "target": null
            },
            {
              "id": "Crypt_r.BCM",
              "display_name": "Crypt_r.BCM",
              "target": null
            },
            {
              "id": "ALF:AGGR:Exploit:O97M/CVE-2017-11882",
              "display_name": "ALF:AGGR:Exploit:O97M/CVE-2017-11882",
              "target": null
            },
            {
              "id": "ALF:Exploit:O97M/CVE-2017-8977",
              "display_name": "ALF:Exploit:O97M/CVE-2017-8977",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1045",
              "name": "Software Packing",
              "display_name": "T1045 - Software Packing"
            },
            {
              "id": "T1060",
              "name": "Registry Run Keys / Startup Folder",
              "display_name": "T1060 - Registry Run Keys / Startup Folder"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1096",
              "name": "NTFS File Attributes",
              "display_name": "T1096 - NTFS File Attributes"
            },
            {
              "id": "T1112",
              "name": "Modify Registry",
              "display_name": "T1112 - Modify Registry"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            },
            {
              "id": "T1415",
              "name": "URL Scheme Hijacking",
              "display_name": "T1415 - URL Scheme Hijacking"
            },
            {
              "id": "T1416",
              "name": "URI Hijacking",
              "display_name": "T1416 - URI Hijacking"
            },
            {
              "id": "T1210",
              "name": "Exploitation of Remote Services",
              "display_name": "T1210 - Exploitation of Remote Services"
            },
            {
              "id": "T1114",
              "name": "Email Collection",
              "display_name": "T1114 - Email Collection"
            },
            {
              "id": "T1003.005",
              "name": "Cached Domain Credentials",
              "display_name": "T1003.005 - Cached Domain Credentials"
            },
            {
              "id": "T1212",
              "name": "Exploitation for Credential Access",
              "display_name": "T1212 - Exploitation for Credential Access"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1059.002",
              "name": "AppleScript",
              "display_name": "T1059.002 - AppleScript"
            }
          ],
          "industries": [
            "Retail",
            "Technology",
            "Telecommunications",
            "Civil Society",
            "Online Shopping",
            "Legal"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 25,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 2,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1965,
            "hostname": 1378,
            "domain": 1922,
            "FileHash-SHA256": 2639,
            "FileHash-MD5": 386,
            "FileHash-SHA1": 377,
            "email": 11,
            "CVE": 2
          },
          "indicator_count": 8680,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "644 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "Trojan.NukeSped./TigerRat | Trojan[APT]/Win32.Lazarus | Cited: Andariel group \u00bb state-sponsored threat actor & Defense media",
        "IDS: WGET Command Specifying Output in HTTP Headers",
        "www.test_ico355_subsequent_invoices.htm.com\tA NXDOMAIN",
        "network_http suspicious_tld allocates_rwx antivm_disk_size creates_exe creates_service suspicious_process stealth_window packer_entropy uses_windows_utilities console_output pe_features",
        "Targets Apple iPad /iOS | www.amazon.com/ref=ap_frn_logo [embedded] | www.amazon.com  ns1.amzndns.co.uk , ns1.amzndns.com",
        "3.33.152.147: https://otx.alienvault.com/indicator/ip/3.33.152.147",
        "Domains Contacted: crl.microsoft.com blackmarket.ogspy.net",
        "3.33.152.147 - Antivirus Detections:  ALF:HeraklezEval:Trojan:Win32/SpyNoon!rfn ,",
        "3.33.152.147: Trojan:Win32/Dursg.K | Verdict External> IP Lookup Service Classification Cloud provider Reverse DNS a4ec4c6ea1c92e2e6.awsglobalaccelerator.com",
        "85.10.215.232 - Classification Datacenter / Hosting / VPS Reverse DNS dediextern.your-server.de Location: Munich,  Germany | konsoleH :: Login",
        "Crypt_r.BDI: FileHash-SHA256 71906e67e75f832dfbd2c63fde953d76b6502e48e78badd3ef6fe30d02390268",
        "htm.com: htm | prod.phx3.secureserver.net | unknown.ip.secureserver.net",
        "Andariel group \u00bb State-sponsored threat actor & Defense media",
        "IDS Detections: Possible Zbot Activity Common Download Struct Zbot Generic URI/Header Struct .bin",
        "High Priority Alerts: dead_host network_icmp nolookup_communication persistence_autorun bypass_firewall",
        "Crypt_r.BCM: FileHash-SHA256 1e0449b5a573e08289ba8de12b70410abfb021f81819b462cd7659fbcb361b11",
        "3.33.152.147 - High Priority IDS Detections: Trojan Checkin Win32.Meredrop Checkin CryptoWall Check-in Net-Worm.Win32.Koobface.jxs",
        "Used as  Apple IP's : 160.153.62.66 | 162.255.119.21 | 192.64.119.254",
        "Alerts: nids_malware_alert network_icmp dumped_buffer2 allocates_execute_remote_process",
        "Andariel Backdoor Activity (Checkin)",
        "IDS: Prorat.19.i Checkin | DYNAMIC_DNS Query to a Suspicious no-ip Domain | CP Email Send via HTTP - Often Trojan Install Reports",
        "Domains Contacted: you.no-ip.com smtp.secureserver.net www.icq.com www.yoursite.com gmali.com",
        "FileHash-SHA256 e5c584fdb2a3684a52edb41836436bb3d88221ffd3eb252516e1ca6dc879f8f9",
        "CVE-2017-11882 - https://otx.alienvault.com/indicator/cve/CVE-2017-11882",
        "cory@whiteskycommunications.com IP: 137.83.95.132 targets victims associates Amazon account and all devices. CnC target Network",
        "message.htm.com | Ransomware",
        "3.33.152.147 - Antivirus Detections: !#AddsCopyToStartup ,  !#HSTR:SigGen0136cb6c ,  ALF:AGGR:OpcCl:99!ml , ALF:Exploit:O97M/CVE-2017-8977",
        "Win32/Tofsee.AX - https://otx.alienvault.com/indicator/file/47565f3a809e997530e8b0d1602a39cb9cc3dd9e1361db2f9dd5891dfd444383",
        "Crypt_r.BDI: FileHash-SHA256 1e0449b5a573e08289ba8de12b70410abfb021f81819b462cd7659fbcb361b11",
        "applegatecode.com, applehealthcare.com, nord-com.it, mail.apple-rehab.com, msa-smtp-mx1.hinet.net, https://itae-innova.com/wp-content/themes/itaeinnova/images/apple-touch-icon-114x114.png No Expiration\t0\t  Domain itae-innova.com No Expiration\t0\t  URL https://itae-innova.com/wp-content/themes/itaeinnova/images/apple-touch-icon-152x152.png, 50.205.3.1 2024-07-14T22:00:00\t0\t  Domain apple-rehab.com No Expiration\t0\t  Domain applegatecode.com",
        "Prorat.19.i: https://otx.alienvault.com/indicator/file/03f92e83f56ad2d687ee2fb7ab21b7fea0bebc1abc82d387a52510b61506e68f",
        "IDS: D-Link Devices Home Network Administration Protocol Command Execution",
        "Alerts: persistence_autorun creates_user_folder_exe injection_createremotethread",
        "https://github.com/MSUDenverSystemsEngineering/Salt-Instructional-18/tree/master/AppDeployToolkit",
        "Apple: ns2.usm87.siteground.biz | ns2.usm87.siteground.biz | Hostnme www.appleremotesupport.com",
        "3.33.152.147 - ALF:HSTR:Trojan:Win32/StartPage.ZS!bit ,  ALF:HeraklezEval:PUA:Win32/InstallCore.R ,  ALF:HeraklezEval:Ransom:Win32/Tescrypt!rfn",
        "Apple:appleremotesupport.com | appleid.cdn-appme.com | appleid.cdn-aqple.com | www.ns1.bdn-apple.com",
        "3.33.152.147 - Antivirus Detections:  ALF:HeraklezEval:Trojan:Win32/Startpage!rfn ,  ALF:HeraklezEval:Trojan:Win32/Ymacco.AA47",
        "Alerts: injection_modifies_memory injection_write_memory modifies_proxy_wpad packer_polymorphic self_delete_bat banker_zeus_p2p",
        "Crypt_r.BCM: FileHash-SHA256 cc83b186700b21e5c4cae",
        "CVE-2017-8977 - https://otx.alienvault.com/indicator/cve/CVE-2017-8977",
        "3.33.152.147 - High Priority IDS Detections: Checkin Virut Counter/Check-in Backdoor.Win32.Polybot.A Checkin 3 Koobface HTTP Request (2) Win32.Sality-GR Checkin",
        "https://otx.alienvault.com/indicator/file/03f92e83f56ad2d687ee2fb7ab21b7fea0bebc1abc82d387a52510b61506e68f",
        "Win.Trojan.Tofsee-6840338-0 | https://otx.alienvault.com/indicator/domain/applehealthcare.com",
        "3.33.152.147 - High Priority IDS Detections: Worm.Win32/Chiviper.C Checkin Possible Fake AV Checkin Kazy/Kryptor/Cycbot",
        "TrojanDownloader:Win32/Cutwail: IDS Detections: W32/Zbot.InfoStealer WindowsUpdate Connectivity Check With Opera UA Possible Zeus GameOver Connectivity Check 2",
        "87.98.231.87 - Classification Datacenter / Hosting / VPS Reverse DNS cluster014.ovh.net Location;  Spain | AVD:: TrojanDownloader:JS/Nemucod.QJ",
        "NSO Group auto populated/relevant to research results. For several year we've seen evidence of Pegasus attacks on Americans.",
        "87.98.231.87 - IDS Detections: MalDoc Request for Payload, Unsupported/Fake Windows NT Version 5.0",
        "Some items found relates to research exploited against or researched by target: disabled_duck",
        "Crypt_r.AWJ: FileHash-SHA256 cc83b186700b21e5c4cae0f8236ae3e50ab47c2c21a3987ea00463056cbd1c26",
        "Mr. Telephone man. there js something wrong with her line when she tries to dial a number, she gets a freak every time...",
        "PWS:Win32/Zbot!CI: FileHash-SHA256 edfec48c5b9a18add8442f19cf8ecd8457af25a7251cb34fe2d20616dcf315ef"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": []
        },
        "other": {
          "adversary": [
            "NSO"
          ],
          "malware_families": [
            "Trojan:win32/smokeloader",
            "Win.packer.pkr_ce1a-9980177-0",
            "Win.trojan.downloader-42770",
            "Backdoor:win32/tofsee.t",
            "Elf:ddos-y\\ [trj]",
            "Win.trojan.magania-13720",
            "Trojan[apt]/win32.lazarus",
            "Win.trojan.agent-1313630",
            "Win32:backdoorx-gen\\ [trj]",
            "Win32:kamso",
            "Ransom:win32/ako",
            "Win32:sality",
            "Arin",
            "Apnic",
            "Win.trojan.tofsee-6840338-0",
            "Trojan:win64/coinminer.we",
            "Win32:salicode",
            "Win32:trojan-gen",
            "Unix.trojan.mirai-6981169-0",
            "Trojanspy",
            "Trojandownloader:win32/cutwail",
            "Mirai",
            "Trojan:win32/tonmye!rfn",
            "Virtool:win32/ceeinject.gf",
            "Trojan:win32/dursg.k",
            "Win.trojan.swisyn-6819",
            "Alf:aggr:exploit:o97m/cve-2017-11882",
            "Pws:win32/zbot!ci",
            "Alf:exploit:o97m/cve-2017-8977",
            "Alfper:pua:win32/installcore",
            "Trojandownloader:js/nemucod.qj",
            "Trojan:win32/tonmye",
            "Crypt_r.bcm"
          ],
          "industries": [
            "Online shopping",
            "Civil society",
            "Technology",
            "Legal",
            "Retail",
            "Telecommunications"
          ]
        }
      }
    },
    "false_positive": []
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 6,
  "pulses": [
    {
      "id": "69458259401a612102d02679",
      "name": "NSO Group ( original pulse degraded by a delete service) ",
      "description": "",
      "modified": "2025-12-19T16:50:33.337000",
      "created": "2025-12-19T16:50:33.337000",
      "tags": [
        "iocs",
        "urls https",
        "generic malware",
        "analyzer threat",
        "url summary",
        "ip summary",
        "summary",
        "detection list",
        "luca stealer",
        "cisco umbrella",
        "site",
        "safe site",
        "heur",
        "malicious url",
        "alexa top",
        "malicious site",
        "malware site",
        "unsafe",
        "trojanx",
        "malware",
        "metastealer",
        "alexa",
        "dbatloader",
        "outbreak",
        "downloader",
        "blocker",
        "ransom",
        "autoit",
        "trojan",
        "irata",
        "allakore",
        "trojanspy",
        "hash",
        "ms windows",
        "pe32",
        "write c",
        "t1045",
        "show",
        "high",
        "search",
        "pe32 executable",
        "copy",
        "write",
        "win64",
        "scan endpoints",
        "all scoreblue",
        "filehash",
        "av detections",
        "ids detections",
        "yara detections",
        "alerts",
        "entries",
        "powershell",
        "mfc mfc",
        "united",
        "as54113",
        "as14061",
        "as9009 m247",
        "whitelisted",
        "status",
        "united kingdom",
        "name servers",
        "aaaa",
        "passive dns",
        "urls",
        "overview ip",
        "address",
        "related nids",
        "files location",
        "files domain",
        "files related",
        "pulses otx",
        "pulses",
        "as15133 verizon",
        "cname",
        "as16552 tiggee",
        "as20940",
        "domain",
        "as16625 akamai",
        "creation date",
        "body",
        "unknown",
        "ipv4",
        "softcnapp",
        "trojandropper",
        "epaeedpaer",
        "eoaee",
        "qaexedoae",
        "showing",
        "sha256",
        "strings",
        "august",
        "files",
        "main",
        "germany asn",
        "win32",
        "miner",
        "next",
        "asnone united",
        "moved",
        "as8987 amazon",
        "trojanproxy",
        "virtool",
        "yara rule",
        "formbook cnc",
        "checkin",
        "mtb aug",
        "a domains",
        "present sep",
        "twitter",
        "accept",
        "certificate",
        "record value",
        "dynamicloader",
        "medium",
        "dynamic",
        "network",
        "reads",
        "port",
        "anomaly",
        "overview domain",
        "tags",
        "related tags",
        "dns status",
        "hostname query",
        "type address",
        "first seen",
        "seen asn",
        "country unknown",
        "nxdomain",
        "a nxdomain",
        "as16276",
        "spain unknown",
        "meta name",
        "frame src",
        "ok set",
        "cookie",
        "gmt date",
        "encrypt",
        "hostname",
        "files ip",
        "address domain",
        "france",
        "emails",
        "aaaa fd00",
        "as16276 ovh",
        "poland",
        "contacted",
        "wine emulator",
        "ip address",
        "script urls",
        "date",
        "meta",
        "flag united",
        "url http",
        "pulse http",
        "http",
        "as8075",
        "robots content",
        "x ua",
        "ieedge chrome1",
        "incapsula",
        "servers",
        "expiration date",
        "sorry something",
        "gmt content",
        "canada unknown",
        "error",
        "backend",
        "france unknown",
        "alfper",
        "gmt contenttype",
        "apache",
        "exploit",
        "as15169 google",
        "wireless",
        "as23027 boingo",
        "pulse submit",
        "url analysis",
        "location united",
        "nso group",
        "pegasus spyware",
        "url indicator",
        "active created",
        "modified",
        "email",
        "nso",
        "germany",
        "pattern",
        "susp",
        "msil",
        "akamai",
        "gmt connection",
        "netherlands",
        "ovhfr",
        "ns nxdomain",
        "australia",
        "redacted for",
        "andariel group",
        "defense",
        "andariel",
        "check",
        "opera ua",
        "et trojan",
        "attempts",
        "april",
        "zbot",
        "possible zeus",
        "as140107 citis",
        "america asn",
        "as22612",
        "as397240",
        "as19527 google",
        "apple"
      ],
      "references": [
        "https://github.com/MSUDenverSystemsEngineering/Salt-Instructional-18/tree/master/AppDeployToolkit",
        "Andariel group \u00bb State-sponsored threat actor & Defense media",
        "IDS Detections: Possible Zbot Activity Common Download Struct Zbot Generic URI/Header Struct .bin",
        "Alerts: nids_malware_alert network_icmp dumped_buffer2 allocates_execute_remote_process",
        "Alerts: persistence_autorun creates_user_folder_exe injection_createremotethread",
        "Alerts: injection_modifies_memory injection_write_memory modifies_proxy_wpad packer_polymorphic self_delete_bat banker_zeus_p2p",
        "PWS:Win32/Zbot!CI: FileHash-SHA256 edfec48c5b9a18add8442f19cf8ecd8457af25a7251cb34fe2d20616dcf315ef",
        "Domains Contacted: crl.microsoft.com blackmarket.ogspy.net",
        "FileHash-SHA256 e5c584fdb2a3684a52edb41836436bb3d88221ffd3eb252516e1ca6dc879f8f9",
        "TrojanDownloader:Win32/Cutwail: IDS Detections: W32/Zbot.InfoStealer WindowsUpdate Connectivity Check With Opera UA Possible Zeus GameOver Connectivity Check 2",
        "NSO Group auto populated/relevant to research results. For several year we've seen evidence of Pegasus attacks on Americans.",
        "Apple:appleremotesupport.com | appleid.cdn-appme.com | appleid.cdn-aqple.com | www.ns1.bdn-apple.com",
        "Used as  Apple IP's : 160.153.62.66 | 162.255.119.21 | 192.64.119.254",
        "Apple: ns2.usm87.siteground.biz | ns2.usm87.siteground.biz | Hostnme www.appleremotesupport.com"
      ],
      "public": 1,
      "adversary": "NSO",
      "targeted_countries": [
        "United States of America",
        "Sweden",
        "Germany",
        "India",
        "United Kingdom of Great Britain and Northern Ireland",
        "France",
        "Spain",
        "Canada",
        "Singapore",
        "Japan",
        "Korea, Republic of",
        "Ireland",
        "Italy"
      ],
      "malware_families": [
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "Trojan:Win64/CoinMiner.WE",
          "display_name": "Trojan:Win64/CoinMiner.WE",
          "target": "/malware/Trojan:Win64/CoinMiner.WE"
        },
        {
          "id": "Trojan:Win32/SmokeLoader",
          "display_name": "Trojan:Win32/SmokeLoader",
          "target": "/malware/Trojan:Win32/SmokeLoader"
        },
        {
          "id": "PWS:Win32/Zbot!CI",
          "display_name": "PWS:Win32/Zbot!CI",
          "target": "/malware/PWS:Win32/Zbot!CI"
        },
        {
          "id": "TrojanDownloader:Win32/Cutwail",
          "display_name": "TrojanDownloader:Win32/Cutwail",
          "target": "/malware/TrojanDownloader:Win32/Cutwail"
        }
      ],
      "attack_ids": [
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1428",
          "name": "Exploit Enterprise Resources",
          "display_name": "T1428 - Exploit Enterprise Resources"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1016.001",
          "name": "Internet Connection Discovery",
          "display_name": "T1016.001 - Internet Connection Discovery"
        },
        {
          "id": "T1033",
          "name": "System Owner/User Discovery",
          "display_name": "T1033 - System Owner/User Discovery"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1059.001",
          "name": "PowerShell",
          "display_name": "T1059.001 - PowerShell"
        },
        {
          "id": "T1017",
          "name": "Application Deployment Software",
          "display_name": "T1017 - Application Deployment Software"
        },
        {
          "id": "T1138",
          "name": "Application Shimming",
          "display_name": "T1138 - Application Shimming"
        },
        {
          "id": "T1001.003",
          "name": "Protocol Impersonation",
          "display_name": "T1001.003 - Protocol Impersonation"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1155",
          "name": "AppleScript",
          "display_name": "T1155 - AppleScript"
        },
        {
          "id": "T1459",
          "name": "Device Unlock Code Guessing or Brute Force",
          "display_name": "T1459 - Device Unlock Code Guessing or Brute Force"
        },
        {
          "id": "T1445",
          "name": "Abuse of iOS Enterprise App Signing Key",
          "display_name": "T1445 - Abuse of iOS Enterprise App Signing Key"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "66f55cdc8257c7fa223ed052",
      "export_count": 6,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 2852,
        "FileHash-SHA1": 2194,
        "FileHash-SHA256": 6649,
        "domain": 1881,
        "hostname": 1706,
        "URL": 553,
        "CVE": 3,
        "email": 25
      },
      "indicator_count": 15863,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "121 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "66f55cdc8257c7fa223ed052",
      "name": "NSO Group attacks Uptown Denver Neighborhood",
      "description": "Stems from 'hushed' cyber attack that lasted for several days in surrounding neighborhoods near (MSU) Metro State University. Pegasus spyware detected. The attack affected devices, bypassed credentials , passwords and compromised networks. Remedy: reset network multiple times. \n\nI'm not implying attack disseminates from MSU. \nSpectrum.com and Quantum Fiber Cyber Folks .PL related / MSU\nSoftware used \n\n\n\n \n*Cyber Folks .pl *https://github.com/MSUDenverSystemsEngineering/Salt-Instructional-18/tree/master/AppDeployToolkit",
      "modified": "2024-10-26T12:05:43.885000",
      "created": "2024-09-26T13:08:44.341000",
      "tags": [
        "iocs",
        "urls https",
        "generic malware",
        "analyzer threat",
        "url summary",
        "ip summary",
        "summary",
        "detection list",
        "luca stealer",
        "cisco umbrella",
        "site",
        "safe site",
        "heur",
        "malicious url",
        "alexa top",
        "malicious site",
        "malware site",
        "unsafe",
        "trojanx",
        "malware",
        "metastealer",
        "alexa",
        "dbatloader",
        "outbreak",
        "downloader",
        "blocker",
        "ransom",
        "autoit",
        "trojan",
        "irata",
        "allakore",
        "trojanspy",
        "hash",
        "ms windows",
        "pe32",
        "write c",
        "t1045",
        "show",
        "high",
        "search",
        "pe32 executable",
        "copy",
        "write",
        "win64",
        "scan endpoints",
        "all scoreblue",
        "filehash",
        "av detections",
        "ids detections",
        "yara detections",
        "alerts",
        "entries",
        "powershell",
        "mfc mfc",
        "united",
        "as54113",
        "as14061",
        "as9009 m247",
        "whitelisted",
        "status",
        "united kingdom",
        "name servers",
        "aaaa",
        "passive dns",
        "urls",
        "overview ip",
        "address",
        "related nids",
        "files location",
        "files domain",
        "files related",
        "pulses otx",
        "pulses",
        "as15133 verizon",
        "cname",
        "as16552 tiggee",
        "as20940",
        "domain",
        "as16625 akamai",
        "creation date",
        "body",
        "unknown",
        "ipv4",
        "softcnapp",
        "trojandropper",
        "epaeedpaer",
        "eoaee",
        "qaexedoae",
        "showing",
        "sha256",
        "strings",
        "august",
        "files",
        "main",
        "germany asn",
        "win32",
        "miner",
        "next",
        "asnone united",
        "moved",
        "as8987 amazon",
        "trojanproxy",
        "virtool",
        "yara rule",
        "formbook cnc",
        "checkin",
        "mtb aug",
        "a domains",
        "present sep",
        "twitter",
        "accept",
        "certificate",
        "record value",
        "dynamicloader",
        "medium",
        "dynamic",
        "network",
        "reads",
        "port",
        "anomaly",
        "overview domain",
        "tags",
        "related tags",
        "dns status",
        "hostname query",
        "type address",
        "first seen",
        "seen asn",
        "country unknown",
        "nxdomain",
        "a nxdomain",
        "as16276",
        "spain unknown",
        "meta name",
        "frame src",
        "ok set",
        "cookie",
        "gmt date",
        "encrypt",
        "hostname",
        "files ip",
        "address domain",
        "france",
        "emails",
        "aaaa fd00",
        "as16276 ovh",
        "poland",
        "contacted",
        "wine emulator",
        "ip address",
        "script urls",
        "date",
        "meta",
        "flag united",
        "url http",
        "pulse http",
        "http",
        "as8075",
        "robots content",
        "x ua",
        "ieedge chrome1",
        "incapsula",
        "servers",
        "expiration date",
        "sorry something",
        "gmt content",
        "canada unknown",
        "error",
        "backend",
        "france unknown",
        "alfper",
        "gmt contenttype",
        "apache",
        "exploit",
        "as15169 google",
        "wireless",
        "as23027 boingo",
        "pulse submit",
        "url analysis",
        "location united",
        "nso group",
        "pegasus spyware",
        "url indicator",
        "active created",
        "modified",
        "email",
        "nso",
        "germany",
        "pattern",
        "susp",
        "msil",
        "akamai",
        "gmt connection",
        "netherlands",
        "ovhfr",
        "ns nxdomain",
        "australia",
        "redacted for",
        "andariel group",
        "defense",
        "andariel",
        "check",
        "opera ua",
        "et trojan",
        "attempts",
        "april",
        "zbot",
        "possible zeus",
        "as140107 citis",
        "america asn",
        "as22612",
        "as397240",
        "as19527 google",
        "apple"
      ],
      "references": [
        "https://github.com/MSUDenverSystemsEngineering/Salt-Instructional-18/tree/master/AppDeployToolkit",
        "Andariel group \u00bb State-sponsored threat actor & Defense media",
        "IDS Detections: Possible Zbot Activity Common Download Struct Zbot Generic URI/Header Struct .bin",
        "Alerts: nids_malware_alert network_icmp dumped_buffer2 allocates_execute_remote_process",
        "Alerts: persistence_autorun creates_user_folder_exe injection_createremotethread",
        "Alerts: injection_modifies_memory injection_write_memory modifies_proxy_wpad packer_polymorphic self_delete_bat banker_zeus_p2p",
        "PWS:Win32/Zbot!CI: FileHash-SHA256 edfec48c5b9a18add8442f19cf8ecd8457af25a7251cb34fe2d20616dcf315ef",
        "Domains Contacted: crl.microsoft.com blackmarket.ogspy.net",
        "FileHash-SHA256 e5c584fdb2a3684a52edb41836436bb3d88221ffd3eb252516e1ca6dc879f8f9",
        "TrojanDownloader:Win32/Cutwail: IDS Detections: W32/Zbot.InfoStealer WindowsUpdate Connectivity Check With Opera UA Possible Zeus GameOver Connectivity Check 2",
        "NSO Group auto populated/relevant to research results. For several year we've seen evidence of Pegasus attacks on Americans.",
        "Apple:appleremotesupport.com | appleid.cdn-appme.com | appleid.cdn-aqple.com | www.ns1.bdn-apple.com",
        "Used as  Apple IP's : 160.153.62.66 | 162.255.119.21 | 192.64.119.254",
        "Apple: ns2.usm87.siteground.biz | ns2.usm87.siteground.biz | Hostnme www.appleremotesupport.com"
      ],
      "public": 1,
      "adversary": "NSO",
      "targeted_countries": [
        "United States of America",
        "Sweden",
        "Germany",
        "India",
        "United Kingdom of Great Britain and Northern Ireland",
        "France",
        "Spain",
        "Canada",
        "Singapore",
        "Japan",
        "Korea, Republic of",
        "Ireland",
        "Italy"
      ],
      "malware_families": [
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "Trojan:Win64/CoinMiner.WE",
          "display_name": "Trojan:Win64/CoinMiner.WE",
          "target": "/malware/Trojan:Win64/CoinMiner.WE"
        },
        {
          "id": "Trojan:Win32/SmokeLoader",
          "display_name": "Trojan:Win32/SmokeLoader",
          "target": "/malware/Trojan:Win32/SmokeLoader"
        },
        {
          "id": "PWS:Win32/Zbot!CI",
          "display_name": "PWS:Win32/Zbot!CI",
          "target": "/malware/PWS:Win32/Zbot!CI"
        },
        {
          "id": "TrojanDownloader:Win32/Cutwail",
          "display_name": "TrojanDownloader:Win32/Cutwail",
          "target": "/malware/TrojanDownloader:Win32/Cutwail"
        }
      ],
      "attack_ids": [
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1053",
          "name": "Scheduled Task/Job",
          "display_name": "T1053 - Scheduled Task/Job"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1428",
          "name": "Exploit Enterprise Resources",
          "display_name": "T1428 - Exploit Enterprise Resources"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1016.001",
          "name": "Internet Connection Discovery",
          "display_name": "T1016.001 - Internet Connection Discovery"
        },
        {
          "id": "T1033",
          "name": "System Owner/User Discovery",
          "display_name": "T1033 - System Owner/User Discovery"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1031",
          "name": "Modify Existing Service",
          "display_name": "T1031 - Modify Existing Service"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1070",
          "name": "Indicator Removal on Host",
          "display_name": "T1070 - Indicator Removal on Host"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1059.001",
          "name": "PowerShell",
          "display_name": "T1059.001 - PowerShell"
        },
        {
          "id": "T1017",
          "name": "Application Deployment Software",
          "display_name": "T1017 - Application Deployment Software"
        },
        {
          "id": "T1138",
          "name": "Application Shimming",
          "display_name": "T1138 - Application Shimming"
        },
        {
          "id": "T1001.003",
          "name": "Protocol Impersonation",
          "display_name": "T1001.003 - Protocol Impersonation"
        },
        {
          "id": "T1449",
          "name": "Exploit SS7 to Redirect Phone Calls/SMS",
          "display_name": "T1449 - Exploit SS7 to Redirect Phone Calls/SMS"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1155",
          "name": "AppleScript",
          "display_name": "T1155 - AppleScript"
        },
        {
          "id": "T1459",
          "name": "Device Unlock Code Guessing or Brute Force",
          "display_name": "T1459 - Device Unlock Code Guessing or Brute Force"
        },
        {
          "id": "T1445",
          "name": "Abuse of iOS Enterprise App Signing Key",
          "display_name": "T1445 - Abuse of iOS Enterprise App Signing Key"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 40,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 1,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 2852,
        "FileHash-SHA1": 2194,
        "FileHash-SHA256": 6649,
        "domain": 1881,
        "hostname": 1706,
        "URL": 553,
        "CVE": 3,
        "email": 25
      },
      "indicator_count": 15863,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 230,
      "modified_text": "540 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "66eeef55e2c1ec3a4fa60ef4",
      "name": "Android",
      "description": "",
      "modified": "2024-10-25T00:05:34.912000",
      "created": "2024-09-21T16:07:49.763000",
      "tags": [
        "read c",
        "write c",
        "create c",
        "delete c",
        "process32nextw",
        "langchinese",
        "search",
        "regsetvalueexa",
        "medium",
        "show",
        "trojan",
        "malware",
        "copy",
        "write",
        "win32",
        "tools",
        "persistence",
        "execution",
        "local",
        "next",
        "count",
        "august",
        "scan endpoints",
        "all scoreblue",
        "url http",
        "pulse pulses",
        "http",
        "domain",
        "passive dns",
        "urls",
        "files related",
        "pulses otx",
        "unknown",
        "cname",
        "files",
        "ip address",
        "as16276",
        "spain unknown",
        "meta name",
        "frame src",
        "ok set",
        "cookie",
        "gmt date",
        "gmt content",
        "encrypt",
        "france",
        "nxdomain",
        "ns nxdomain",
        "aaaa nxdomain",
        "name servers",
        "soa nxdomain",
        "moved",
        "creation date",
        "date",
        "body",
        "aaaa",
        "asnone belgium",
        "united kingdom",
        "as16276 ovh",
        "sha256",
        "maltaterfb",
        "showing",
        "total",
        "read",
        "delete",
        "default",
        "systemroot",
        "high",
        "virtool",
        "virustotal",
        "hacktool",
        "drweb",
        "vipre",
        "panda",
        "et trojan",
        "msie",
        "windows nt",
        "entries",
        "ascii text",
        "intel",
        "ms windows",
        "salicode",
        "emails",
        "expiration date",
        "france unknown",
        "taskmail",
        "task3dmail",
        "capspdf1",
        "mboxinbox",
        "actionshow",
        "twitter",
        "canada unknown",
        "error",
        "ipv4",
        "backend",
        "alfper",
        "gmt contenttype",
        "gmt server",
        "apache",
        "exploit",
        "hostname",
        "dynamicloader",
        "yara rule",
        "delivery",
        "alpha criteria",
        "inno setup",
        "format",
        "june",
        "stack",
        "dummy",
        "overview domain",
        "pulses",
        "tags",
        "related tags",
        "google safe",
        "browsing",
        "record type",
        "ttl value",
        "status",
        "united",
        "asnone united",
        "record value",
        "trojanproxy",
        "servers",
        "as15169 google",
        "for privacy",
        "domains ii",
        "ransom",
        "checks",
        "bios",
        "cpu name",
        "dynamic",
        "filehash",
        "related nids",
        "files location",
        "ddos",
        "activity",
        "checkin",
        "win64",
        "mirai",
        "technology",
        "dns replication",
        "system label",
        "cloudflarenet",
        "apnic",
        "south brisbane",
        "asia pacific",
        "apnic whois",
        "po box",
        "cordelia st",
        "comment",
        "apnic research",
        "nethandle",
        "arin",
        "andariel",
        "yara detections",
        "malware traffic",
        "nids",
        "icmp traffic",
        "dns query",
        "tcp syn",
        "resolverror",
        "externalport",
        "internalport",
        "http headers",
        "home network",
        "pulse submit",
        "url analysis",
        "mitre att",
        "ta0002 shared",
        "modules t1129",
        "windows",
        "ta0004 access",
        "t1134",
        "defense evasion",
        "xor encrypt",
        "rc4 prga",
        "catalog tree",
        "analysis ob0001",
        "analysis ob0002",
        "command",
        "control ob0004",
        "ob0005 defense",
        "evasion ob0006",
        "file system",
        "oc0001 process",
        "oc0003 data",
        "hashes c2ae",
        "capa",
        "cape sandbox",
        "lastline",
        "microsoft",
        "memory pattern",
        "dns resolutions",
        "ip traffic",
        "urls tcp",
        "tiger rat",
        "hi",
        "helping sabey"
      ],
      "references": [
        "Andariel Backdoor Activity (Checkin)",
        "IDS: WGET Command Specifying Output in HTTP Headers",
        "IDS: D-Link Devices Home Network Administration Protocol Command Execution",
        "Trojan.NukeSped./TigerRat | Trojan[APT]/Win32.Lazarus | Cited: Andariel group \u00bb state-sponsored threat actor & Defense media",
        "Mr. Telephone man. there js something wrong with her line when she tries to dial a number, she gets a freak every time..."
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Trojan:Win32/Tonmye",
          "display_name": "Trojan:Win32/Tonmye",
          "target": "/malware/Trojan:Win32/Tonmye"
        },
        {
          "id": "Win32:Kamso",
          "display_name": "Win32:Kamso",
          "target": null
        },
        {
          "id": "VirTool:Win32/CeeInject.GF",
          "display_name": "VirTool:Win32/CeeInject.GF",
          "target": "/malware/VirTool:Win32/CeeInject.GF"
        },
        {
          "id": "ALFPER:PUA:Win32/InstallCore",
          "display_name": "ALFPER:PUA:Win32/InstallCore",
          "target": null
        },
        {
          "id": "Trojan:Win32/Tonmye!rfn",
          "display_name": "Trojan:Win32/Tonmye!rfn",
          "target": "/malware/Trojan:Win32/Tonmye!rfn"
        },
        {
          "id": "Ransom:Win32/Ako",
          "display_name": "Ransom:Win32/Ako",
          "target": "/malware/Ransom:Win32/Ako"
        },
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "ARIN",
          "display_name": "ARIN",
          "target": null
        },
        {
          "id": "APNIC",
          "display_name": "APNIC",
          "target": null
        },
        {
          "id": "ELF:DDoS-Y\\ [Trj]",
          "display_name": "ELF:DDoS-Y\\ [Trj]",
          "target": null
        },
        {
          "id": "Unix.Trojan.Mirai-6981169-0",
          "display_name": "Unix.Trojan.Mirai-6981169-0",
          "target": null
        },
        {
          "id": "Trojan[APT]/Win32.Lazarus",
          "display_name": "Trojan[APT]/Win32.Lazarus",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1023",
          "name": "Shortcut Modification",
          "display_name": "T1023 - Shortcut Modification"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1089",
          "name": "Disabling Security Tools",
          "display_name": "T1089 - Disabling Security Tools"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1134",
          "name": "Access Token Manipulation",
          "display_name": "T1134 - Access Token Manipulation"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "66ebda7ebbe759bb12cebd4a",
      "export_count": 43,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "MayDay23",
        "id": "292773",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 889,
        "FileHash-SHA1": 817,
        "FileHash-SHA256": 3623,
        "domain": 755,
        "SSLCertFingerprint": 1,
        "URL": 396,
        "hostname": 732,
        "email": 14,
        "CVE": 3,
        "CIDR": 2
      },
      "indicator_count": 7232,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 10,
      "modified_text": "542 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "67176428e4871c2726288178",
      "name": "Android",
      "description": "",
      "modified": "2024-10-25T00:05:34.912000",
      "created": "2024-10-22T08:36:56.514000",
      "tags": [
        "read c",
        "write c",
        "create c",
        "delete c",
        "process32nextw",
        "langchinese",
        "search",
        "regsetvalueexa",
        "medium",
        "show",
        "trojan",
        "malware",
        "copy",
        "write",
        "win32",
        "tools",
        "persistence",
        "execution",
        "local",
        "next",
        "count",
        "august",
        "scan endpoints",
        "all scoreblue",
        "url http",
        "pulse pulses",
        "http",
        "domain",
        "passive dns",
        "urls",
        "files related",
        "pulses otx",
        "unknown",
        "cname",
        "files",
        "ip address",
        "as16276",
        "spain unknown",
        "meta name",
        "frame src",
        "ok set",
        "cookie",
        "gmt date",
        "gmt content",
        "encrypt",
        "france",
        "nxdomain",
        "ns nxdomain",
        "aaaa nxdomain",
        "name servers",
        "soa nxdomain",
        "moved",
        "creation date",
        "date",
        "body",
        "aaaa",
        "asnone belgium",
        "united kingdom",
        "as16276 ovh",
        "sha256",
        "maltaterfb",
        "showing",
        "total",
        "read",
        "delete",
        "default",
        "systemroot",
        "high",
        "virtool",
        "virustotal",
        "hacktool",
        "drweb",
        "vipre",
        "panda",
        "et trojan",
        "msie",
        "windows nt",
        "entries",
        "ascii text",
        "intel",
        "ms windows",
        "salicode",
        "emails",
        "expiration date",
        "france unknown",
        "taskmail",
        "task3dmail",
        "capspdf1",
        "mboxinbox",
        "actionshow",
        "twitter",
        "canada unknown",
        "error",
        "ipv4",
        "backend",
        "alfper",
        "gmt contenttype",
        "gmt server",
        "apache",
        "exploit",
        "hostname",
        "dynamicloader",
        "yara rule",
        "delivery",
        "alpha criteria",
        "inno setup",
        "format",
        "june",
        "stack",
        "dummy",
        "overview domain",
        "pulses",
        "tags",
        "related tags",
        "google safe",
        "browsing",
        "record type",
        "ttl value",
        "status",
        "united",
        "asnone united",
        "record value",
        "trojanproxy",
        "servers",
        "as15169 google",
        "for privacy",
        "domains ii",
        "ransom",
        "checks",
        "bios",
        "cpu name",
        "dynamic",
        "filehash",
        "related nids",
        "files location",
        "ddos",
        "activity",
        "checkin",
        "win64",
        "mirai",
        "technology",
        "dns replication",
        "system label",
        "cloudflarenet",
        "apnic",
        "south brisbane",
        "asia pacific",
        "apnic whois",
        "po box",
        "cordelia st",
        "comment",
        "apnic research",
        "nethandle",
        "arin",
        "andariel",
        "yara detections",
        "malware traffic",
        "nids",
        "icmp traffic",
        "dns query",
        "tcp syn",
        "resolverror",
        "externalport",
        "internalport",
        "http headers",
        "home network",
        "pulse submit",
        "url analysis",
        "mitre att",
        "ta0002 shared",
        "modules t1129",
        "windows",
        "ta0004 access",
        "t1134",
        "defense evasion",
        "xor encrypt",
        "rc4 prga",
        "catalog tree",
        "analysis ob0001",
        "analysis ob0002",
        "command",
        "control ob0004",
        "ob0005 defense",
        "evasion ob0006",
        "file system",
        "oc0001 process",
        "oc0003 data",
        "hashes c2ae",
        "capa",
        "cape sandbox",
        "lastline",
        "microsoft",
        "memory pattern",
        "dns resolutions",
        "ip traffic",
        "urls tcp",
        "tiger rat",
        "hi",
        "helping sabey"
      ],
      "references": [
        "Andariel Backdoor Activity (Checkin)",
        "IDS: WGET Command Specifying Output in HTTP Headers",
        "IDS: D-Link Devices Home Network Administration Protocol Command Execution",
        "Trojan.NukeSped./TigerRat | Trojan[APT]/Win32.Lazarus | Cited: Andariel group \u00bb state-sponsored threat actor & Defense media",
        "Mr. Telephone man. there js something wrong with her line when she tries to dial a number, she gets a freak every time..."
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Trojan:Win32/Tonmye",
          "display_name": "Trojan:Win32/Tonmye",
          "target": "/malware/Trojan:Win32/Tonmye"
        },
        {
          "id": "Win32:Kamso",
          "display_name": "Win32:Kamso",
          "target": null
        },
        {
          "id": "VirTool:Win32/CeeInject.GF",
          "display_name": "VirTool:Win32/CeeInject.GF",
          "target": "/malware/VirTool:Win32/CeeInject.GF"
        },
        {
          "id": "ALFPER:PUA:Win32/InstallCore",
          "display_name": "ALFPER:PUA:Win32/InstallCore",
          "target": null
        },
        {
          "id": "Trojan:Win32/Tonmye!rfn",
          "display_name": "Trojan:Win32/Tonmye!rfn",
          "target": "/malware/Trojan:Win32/Tonmye!rfn"
        },
        {
          "id": "Ransom:Win32/Ako",
          "display_name": "Ransom:Win32/Ako",
          "target": "/malware/Ransom:Win32/Ako"
        },
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "ARIN",
          "display_name": "ARIN",
          "target": null
        },
        {
          "id": "APNIC",
          "display_name": "APNIC",
          "target": null
        },
        {
          "id": "ELF:DDoS-Y\\ [Trj]",
          "display_name": "ELF:DDoS-Y\\ [Trj]",
          "target": null
        },
        {
          "id": "Unix.Trojan.Mirai-6981169-0",
          "display_name": "Unix.Trojan.Mirai-6981169-0",
          "target": null
        },
        {
          "id": "Trojan[APT]/Win32.Lazarus",
          "display_name": "Trojan[APT]/Win32.Lazarus",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1023",
          "name": "Shortcut Modification",
          "display_name": "T1023 - Shortcut Modification"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1089",
          "name": "Disabling Security Tools",
          "display_name": "T1089 - Disabling Security Tools"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1134",
          "name": "Access Token Manipulation",
          "display_name": "T1134 - Access Token Manipulation"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": "66eeef55e2c1ec3a4fa60ef4",
      "export_count": 33,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": true,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "jefivnguyen",
        "id": "293031",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 889,
        "FileHash-SHA1": 817,
        "FileHash-SHA256": 3623,
        "domain": 755,
        "SSLCertFingerprint": 1,
        "URL": 396,
        "hostname": 732,
        "email": 14,
        "CVE": 3,
        "CIDR": 2
      },
      "indicator_count": 7232,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 37,
      "modified_text": "542 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "66ebda7ebbe759bb12cebd4a",
      "name": "Andariel Backdoor Activity - Mirai found  in Android",
      "description": "Andariel Backdoor Activity: Cited as a state sponsored threat group, this ET malware Check in) can be accessed by decent hackers. Found in a targets android device. \n\nDevice being used to attack , manipulate accounts , files and every CnC  Botmaster task desired.\n\nNote:. Hack responsibly.. Stop attacking innocent civilians.",
      "modified": "2024-10-19T07:01:20.116000",
      "created": "2024-09-19T08:02:06.265000",
      "tags": [
        "read c",
        "write c",
        "create c",
        "delete c",
        "process32nextw",
        "langchinese",
        "search",
        "regsetvalueexa",
        "medium",
        "show",
        "trojan",
        "malware",
        "copy",
        "write",
        "win32",
        "tools",
        "persistence",
        "execution",
        "local",
        "next",
        "count",
        "august",
        "scan endpoints",
        "all scoreblue",
        "url http",
        "pulse pulses",
        "http",
        "domain",
        "passive dns",
        "urls",
        "files related",
        "pulses otx",
        "unknown",
        "cname",
        "files",
        "ip address",
        "as16276",
        "spain unknown",
        "meta name",
        "frame src",
        "ok set",
        "cookie",
        "gmt date",
        "gmt content",
        "encrypt",
        "france",
        "nxdomain",
        "ns nxdomain",
        "aaaa nxdomain",
        "name servers",
        "soa nxdomain",
        "moved",
        "creation date",
        "date",
        "body",
        "aaaa",
        "asnone belgium",
        "united kingdom",
        "as16276 ovh",
        "sha256",
        "maltaterfb",
        "showing",
        "total",
        "read",
        "delete",
        "default",
        "systemroot",
        "high",
        "virtool",
        "virustotal",
        "hacktool",
        "drweb",
        "vipre",
        "panda",
        "et trojan",
        "msie",
        "windows nt",
        "entries",
        "ascii text",
        "intel",
        "ms windows",
        "salicode",
        "emails",
        "expiration date",
        "france unknown",
        "taskmail",
        "task3dmail",
        "capspdf1",
        "mboxinbox",
        "actionshow",
        "twitter",
        "canada unknown",
        "error",
        "ipv4",
        "backend",
        "alfper",
        "gmt contenttype",
        "gmt server",
        "apache",
        "exploit",
        "hostname",
        "dynamicloader",
        "yara rule",
        "delivery",
        "alpha criteria",
        "inno setup",
        "format",
        "june",
        "stack",
        "dummy",
        "overview domain",
        "pulses",
        "tags",
        "related tags",
        "google safe",
        "browsing",
        "record type",
        "ttl value",
        "status",
        "united",
        "asnone united",
        "record value",
        "trojanproxy",
        "servers",
        "as15169 google",
        "for privacy",
        "domains ii",
        "ransom",
        "checks",
        "bios",
        "cpu name",
        "dynamic",
        "filehash",
        "related nids",
        "files location",
        "ddos",
        "activity",
        "checkin",
        "win64",
        "mirai",
        "technology",
        "dns replication",
        "system label",
        "cloudflarenet",
        "apnic",
        "south brisbane",
        "asia pacific",
        "apnic whois",
        "po box",
        "cordelia st",
        "comment",
        "apnic research",
        "nethandle",
        "arin",
        "andariel",
        "yara detections",
        "malware traffic",
        "nids",
        "icmp traffic",
        "dns query",
        "tcp syn",
        "resolverror",
        "externalport",
        "internalport",
        "http headers",
        "home network",
        "pulse submit",
        "url analysis",
        "mitre att",
        "ta0002 shared",
        "modules t1129",
        "windows",
        "ta0004 access",
        "t1134",
        "defense evasion",
        "xor encrypt",
        "rc4 prga",
        "catalog tree",
        "analysis ob0001",
        "analysis ob0002",
        "command",
        "control ob0004",
        "ob0005 defense",
        "evasion ob0006",
        "file system",
        "oc0001 process",
        "oc0003 data",
        "hashes c2ae",
        "capa",
        "cape sandbox",
        "lastline",
        "microsoft",
        "memory pattern",
        "dns resolutions",
        "ip traffic",
        "urls tcp",
        "tiger rat",
        "hi",
        "helping sabey"
      ],
      "references": [
        "Andariel Backdoor Activity (Checkin)",
        "IDS: WGET Command Specifying Output in HTTP Headers",
        "IDS: D-Link Devices Home Network Administration Protocol Command Execution",
        "Trojan.NukeSped./TigerRat | Trojan[APT]/Win32.Lazarus | Cited: Andariel group \u00bb state-sponsored threat actor & Defense media",
        "Mr. Telephone man. there js something wrong with her line when she tries to dial a number, she gets a freak every time..."
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Trojan:Win32/Tonmye",
          "display_name": "Trojan:Win32/Tonmye",
          "target": "/malware/Trojan:Win32/Tonmye"
        },
        {
          "id": "Win32:Kamso",
          "display_name": "Win32:Kamso",
          "target": null
        },
        {
          "id": "VirTool:Win32/CeeInject.GF",
          "display_name": "VirTool:Win32/CeeInject.GF",
          "target": "/malware/VirTool:Win32/CeeInject.GF"
        },
        {
          "id": "ALFPER:PUA:Win32/InstallCore",
          "display_name": "ALFPER:PUA:Win32/InstallCore",
          "target": null
        },
        {
          "id": "Trojan:Win32/Tonmye!rfn",
          "display_name": "Trojan:Win32/Tonmye!rfn",
          "target": "/malware/Trojan:Win32/Tonmye!rfn"
        },
        {
          "id": "Ransom:Win32/Ako",
          "display_name": "Ransom:Win32/Ako",
          "target": "/malware/Ransom:Win32/Ako"
        },
        {
          "id": "Mirai",
          "display_name": "Mirai",
          "target": null
        },
        {
          "id": "ARIN",
          "display_name": "ARIN",
          "target": null
        },
        {
          "id": "APNIC",
          "display_name": "APNIC",
          "target": null
        },
        {
          "id": "ELF:DDoS-Y\\ [Trj]",
          "display_name": "ELF:DDoS-Y\\ [Trj]",
          "target": null
        },
        {
          "id": "Unix.Trojan.Mirai-6981169-0",
          "display_name": "Unix.Trojan.Mirai-6981169-0",
          "target": null
        },
        {
          "id": "Trojan[APT]/Win32.Lazarus",
          "display_name": "Trojan[APT]/Win32.Lazarus",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1023",
          "name": "Shortcut Modification",
          "display_name": "T1023 - Shortcut Modification"
        },
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1089",
          "name": "Disabling Security Tools",
          "display_name": "T1089 - Disabling Security Tools"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1119",
          "name": "Automated Collection",
          "display_name": "T1119 - Automated Collection"
        },
        {
          "id": "T1129",
          "name": "Shared Modules",
          "display_name": "T1129 - Shared Modules"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1134",
          "name": "Access Token Manipulation",
          "display_name": "T1134 - Access Token Manipulation"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 25,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 889,
        "FileHash-SHA1": 817,
        "FileHash-SHA256": 3623,
        "domain": 755,
        "SSLCertFingerprint": 1,
        "URL": 396,
        "hostname": 732,
        "email": 14,
        "CVE": 3,
        "CIDR": 2
      },
      "indicator_count": 7232,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 234,
      "modified_text": "548 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "666d1488316880c73e04054e",
      "name": "Prorat.19.i | Backdoor:Win32/Tofsee.T - Amazon.com | iOS  | Denver",
      "description": "Targets family members device attacked while shopping on Amazon.com using an obviously device compromised, newer, fully updated iOS device. \nAmazon legal? [legal-choice.ru, youla.legal, https://www.effectv.com/legal/advertiser-terms-and-conditions]\n[applehealthcare.com apple-rehab.com: Backdoor:Win32/Tofsee.T]\nAdversarial CnC over devices and networks.\nRelentless attacks.",
      "modified": "2024-07-15T03:03:34.888000",
      "created": "2024-06-15T04:11:52.737000",
      "tags": [
        "server",
        "hostmaster",
        "amazon legal",
        "dept",
        "amazon",
        "street",
        "stateprovince",
        "postal code",
        "view whois",
        "whois record",
        "date",
        "contact",
        "threat roundup",
        "november",
        "march",
        "december",
        "february",
        "october",
        "january",
        "highly targeted",
        "data",
        "boost mobile",
        "formbook",
        "response final",
        "url https",
        "ip address",
        "status code",
        "body length",
        "kb body",
        "sha256",
        "headers",
        "ord52c2 via",
        "cloudfront",
        "sha1",
        "pattern match",
        "ascii text",
        "document file",
        "v2 document",
        "crlf line",
        "size",
        "unicode",
        "beginstring",
        "null",
        "hybrid",
        "refresh",
        "body",
        "span",
        "june",
        "click",
        "strings",
        "error",
        "tools",
        "look",
        "verify",
        "restart",
        "unknown",
        "embeddedwb",
        "windows",
        "search",
        "medium",
        "united",
        "show",
        "whitelisted",
        "shellexecuteexw",
        "msie",
        "tofsee",
        "service",
        "write",
        "win32",
        "malware",
        "copy",
        "a nxdomain",
        "passive dns",
        "domain",
        "scan endpoints",
        "all scoreblue",
        "pulse pulses",
        "urls",
        "files",
        "ip related",
        "process32nextw",
        "components",
        "writeconsolew",
        "copy c",
        "delete c",
        "query",
        "useruin",
        "delphi",
        "capture",
        "install",
        "prorat",
        "url http",
        "http",
        "related nids",
        "files location",
        "regsetvalueexa",
        "hx88x89",
        "regbinary",
        "x95xd3xa4",
        "x8dxb7xb7",
        "hx88x9ax1e",
        "mx81xd1r",
        "x92xac",
        "xc2x84",
        "x93xaf",
        "stream",
        "persistence",
        "execution",
        "creation date",
        "entries",
        "as44273 host",
        "record value",
        "status",
        "nxdomain",
        "content type",
        "accept",
        "gmt server",
        "gmt etag",
        "accept encoding",
        "ipv4",
        "path",
        "pragma",
        "name servers",
        "west domains",
        "hostname",
        "next",
        "asnone germany",
        "as21499 host",
        "singapore",
        "france",
        "object",
        "com cnt",
        "dem fin",
        "found",
        "as16276",
        "spain unknown",
        "meta name",
        "frame src",
        "ok set",
        "cookie",
        "gmt date",
        "gmt content",
        "encrypt",
        "levelblue",
        "open threat",
        "meta",
        "a div",
        "div div",
        "france unknown",
        "ok server",
        "type",
        "seychelles",
        "whitesky",
        "as29182 jsc",
        "showing",
        "as24940 hetzner",
        "moved",
        "expiration date",
        "aaaa",
        "russia",
        "as15169 google",
        "germany",
        "emails",
        "germany unknown",
        "a domains",
        "body doctype",
        "html public",
        "ietfdtd html",
        "finland",
        "asnone iran",
        "iran",
        "td tr",
        "td td",
        "tbody",
        "tr tr",
        "domains",
        "backdoor",
        "apple",
        "radio hacking",
        "voicestram",
        "listening",
        "trojan",
        "twitter",
        "servers",
        "vbs",
        "data center",
        "avg clamav",
        "msdefender sep",
        "vitro mar",
        "Win32:Vitro",
        "target: tsara brashears",
        "target: brashears personal devices",
        "target: whitesky communication network",
        "target: accounting firm devices",
        "targets: intellectual property",
        "redrum",
        "open",
        "tr tbody",
        "rsa ca",
        "apache",
        "as7922 comcast",
        "pulse submit",
        "url analysis",
        "epss",
        "impact",
        "cve cve20178977",
        "exploits",
        "targeted",
        "cve overview",
        "media"
      ],
      "references": [
        "Targets Apple iPad /iOS | www.amazon.com/ref=ap_frn_logo [embedded] | www.amazon.com  ns1.amzndns.co.uk , ns1.amzndns.com",
        "cory@whiteskycommunications.com IP: 137.83.95.132 targets victims associates Amazon account and all devices. CnC target Network",
        "High Priority Alerts: dead_host network_icmp nolookup_communication persistence_autorun bypass_firewall",
        "Win32/Tofsee.AX - https://otx.alienvault.com/indicator/file/47565f3a809e997530e8b0d1602a39cb9cc3dd9e1361db2f9dd5891dfd444383",
        "network_http suspicious_tld allocates_rwx antivm_disk_size creates_exe creates_service suspicious_process stealth_window packer_entropy uses_windows_utilities console_output pe_features",
        "Prorat.19.i: https://otx.alienvault.com/indicator/file/03f92e83f56ad2d687ee2fb7ab21b7fea0bebc1abc82d387a52510b61506e68f",
        "IDS: Prorat.19.i Checkin | DYNAMIC_DNS Query to a Suspicious no-ip Domain | CP Email Send via HTTP - Often Trojan Install Reports",
        "Domains Contacted: you.no-ip.com smtp.secureserver.net www.icq.com www.yoursite.com gmali.com",
        "message.htm.com | Ransomware",
        "www.test_ico355_subsequent_invoices.htm.com\tA NXDOMAIN",
        "htm.com: htm | prod.phx3.secureserver.net | unknown.ip.secureserver.net",
        "https://otx.alienvault.com/indicator/file/03f92e83f56ad2d687ee2fb7ab21b7fea0bebc1abc82d387a52510b61506e68f",
        "Win.Trojan.Tofsee-6840338-0 | https://otx.alienvault.com/indicator/domain/applehealthcare.com",
        "applegatecode.com, applehealthcare.com, nord-com.it, mail.apple-rehab.com, msa-smtp-mx1.hinet.net, https://itae-innova.com/wp-content/themes/itaeinnova/images/apple-touch-icon-114x114.png No Expiration\t0\t  Domain itae-innova.com No Expiration\t0\t  URL https://itae-innova.com/wp-content/themes/itaeinnova/images/apple-touch-icon-152x152.png, 50.205.3.1 2024-07-14T22:00:00\t0\t  Domain apple-rehab.com No Expiration\t0\t  Domain applegatecode.com",
        "Some items found relates to research exploited against or researched by target: disabled_duck",
        "Crypt_r.AWJ: FileHash-SHA256 cc83b186700b21e5c4cae0f8236ae3e50ab47c2c21a3987ea00463056cbd1c26",
        "Crypt_r.BCM: FileHash-SHA256 1e0449b5a573e08289ba8de12b70410abfb021f81819b462cd7659fbcb361b11",
        "Crypt_r.BCM: FileHash-SHA256 cc83b186700b21e5c4cae",
        "Crypt_r.BDI: FileHash-SHA256 1e0449b5a573e08289ba8de12b70410abfb021f81819b462cd7659fbcb361b11",
        "Crypt_r.BDI: FileHash-SHA256 71906e67e75f832dfbd2c63fde953d76b6502e48e78badd3ef6fe30d02390268",
        "3.33.152.147: Trojan:Win32/Dursg.K | Verdict External> IP Lookup Service Classification Cloud provider Reverse DNS a4ec4c6ea1c92e2e6.awsglobalaccelerator.com",
        "3.33.152.147: https://otx.alienvault.com/indicator/ip/3.33.152.147",
        "3.33.152.147 - High Priority IDS Detections: Worm.Win32/Chiviper.C Checkin Possible Fake AV Checkin Kazy/Kryptor/Cycbot",
        "3.33.152.147 - High Priority IDS Detections: Trojan Checkin Win32.Meredrop Checkin CryptoWall Check-in Net-Worm.Win32.Koobface.jxs",
        "3.33.152.147 - High Priority IDS Detections: Checkin Virut Counter/Check-in Backdoor.Win32.Polybot.A Checkin 3 Koobface HTTP Request (2) Win32.Sality-GR Checkin",
        "3.33.152.147 - ALF:HSTR:Trojan:Win32/StartPage.ZS!bit ,  ALF:HeraklezEval:PUA:Win32/InstallCore.R ,  ALF:HeraklezEval:Ransom:Win32/Tescrypt!rfn",
        "3.33.152.147 - Antivirus Detections: !#AddsCopyToStartup ,  !#HSTR:SigGen0136cb6c ,  ALF:AGGR:OpcCl:99!ml , ALF:Exploit:O97M/CVE-2017-8977",
        "3.33.152.147 - Antivirus Detections:  ALF:HeraklezEval:Trojan:Win32/Startpage!rfn ,  ALF:HeraklezEval:Trojan:Win32/Ymacco.AA47",
        "3.33.152.147 - Antivirus Detections:  ALF:HeraklezEval:Trojan:Win32/SpyNoon!rfn ,",
        "85.10.215.232 - Classification Datacenter / Hosting / VPS Reverse DNS dediextern.your-server.de Location: Munich,  Germany | konsoleH :: Login",
        "87.98.231.87 - Classification Datacenter / Hosting / VPS Reverse DNS cluster014.ovh.net Location;  Spain | AVD:: TrojanDownloader:JS/Nemucod.QJ",
        "87.98.231.87 - IDS Detections: MalDoc Request for Payload, Unsupported/Fake Windows NT Version 5.0",
        "CVE-2017-8977 - https://otx.alienvault.com/indicator/cve/CVE-2017-8977",
        "CVE-2017-11882 - https://otx.alienvault.com/indicator/cve/CVE-2017-11882"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "Seychelles",
        "Netherlands",
        "France",
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Backdoor:Win32/Tofsee.T",
          "display_name": "Backdoor:Win32/Tofsee.T",
          "target": "/malware/Backdoor:Win32/Tofsee.T"
        },
        {
          "id": "Win32:BackdoorX-gen\\ [Trj]",
          "display_name": "Win32:BackdoorX-gen\\ [Trj]",
          "target": null
        },
        {
          "id": "Win.Trojan.Tofsee-6840338-0",
          "display_name": "Win.Trojan.Tofsee-6840338-0",
          "target": null
        },
        {
          "id": "Win32:Trojan-gen",
          "display_name": "Win32:Trojan-gen",
          "target": null
        },
        {
          "id": "Trojan:Win32/Dursg.K",
          "display_name": "Trojan:Win32/Dursg.K",
          "target": "/malware/Trojan:Win32/Dursg.K"
        },
        {
          "id": "Win.Packer.pkr_ce1a-9980177-0",
          "display_name": "Win.Packer.pkr_ce1a-9980177-0",
          "target": null
        },
        {
          "id": "Win.Trojan.Downloader-42770",
          "display_name": "Win.Trojan.Downloader-42770",
          "target": null
        },
        {
          "id": "TrojanDownloader:JS/Nemucod.QJ",
          "display_name": "TrojanDownloader:JS/Nemucod.QJ",
          "target": "/malware/TrojanDownloader:JS/Nemucod.QJ"
        },
        {
          "id": "Win32:Trojan-gen",
          "display_name": "Win32:Trojan-gen",
          "target": null
        },
        {
          "id": "Win32:Kamso",
          "display_name": "Win32:Kamso",
          "target": null
        },
        {
          "id": "Win.Trojan.Magania-13720",
          "display_name": "Win.Trojan.Magania-13720",
          "target": null
        },
        {
          "id": "Win32:Sality",
          "display_name": "Win32:Sality",
          "target": null
        },
        {
          "id": "Win.Trojan.Swisyn-6819",
          "display_name": "Win.Trojan.Swisyn-6819",
          "target": null
        },
        {
          "id": "Win32:SaliCode",
          "display_name": "Win32:SaliCode",
          "target": null
        },
        {
          "id": "Win.Trojan.Agent-1313630",
          "display_name": "Win.Trojan.Agent-1313630",
          "target": null
        },
        {
          "id": "Crypt_r.BCM",
          "display_name": "Crypt_r.BCM",
          "target": null
        },
        {
          "id": "ALF:AGGR:Exploit:O97M/CVE-2017-11882",
          "display_name": "ALF:AGGR:Exploit:O97M/CVE-2017-11882",
          "target": null
        },
        {
          "id": "ALF:Exploit:O97M/CVE-2017-8977",
          "display_name": "ALF:Exploit:O97M/CVE-2017-8977",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1045",
          "name": "Software Packing",
          "display_name": "T1045 - Software Packing"
        },
        {
          "id": "T1060",
          "name": "Registry Run Keys / Startup Folder",
          "display_name": "T1060 - Registry Run Keys / Startup Folder"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1096",
          "name": "NTFS File Attributes",
          "display_name": "T1096 - NTFS File Attributes"
        },
        {
          "id": "T1112",
          "name": "Modify Registry",
          "display_name": "T1112 - Modify Registry"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "TA0011",
          "name": "Command and Control",
          "display_name": "TA0011 - Command and Control"
        },
        {
          "id": "T1415",
          "name": "URL Scheme Hijacking",
          "display_name": "T1415 - URL Scheme Hijacking"
        },
        {
          "id": "T1416",
          "name": "URI Hijacking",
          "display_name": "T1416 - URI Hijacking"
        },
        {
          "id": "T1210",
          "name": "Exploitation of Remote Services",
          "display_name": "T1210 - Exploitation of Remote Services"
        },
        {
          "id": "T1114",
          "name": "Email Collection",
          "display_name": "T1114 - Email Collection"
        },
        {
          "id": "T1003.005",
          "name": "Cached Domain Credentials",
          "display_name": "T1003.005 - Cached Domain Credentials"
        },
        {
          "id": "T1212",
          "name": "Exploitation for Credential Access",
          "display_name": "T1212 - Exploitation for Credential Access"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1068",
          "name": "Exploitation for Privilege Escalation",
          "display_name": "T1068 - Exploitation for Privilege Escalation"
        },
        {
          "id": "T1059.002",
          "name": "AppleScript",
          "display_name": "T1059.002 - AppleScript"
        }
      ],
      "industries": [
        "Retail",
        "Technology",
        "Telecommunications",
        "Civil Society",
        "Online Shopping",
        "Legal"
      ],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 25,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 2,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 1965,
        "hostname": 1378,
        "domain": 1922,
        "FileHash-SHA256": 2639,
        "FileHash-MD5": 386,
        "FileHash-SHA1": 377,
        "email": 11,
        "CVE": 2
      },
      "indicator_count": 8680,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 226,
      "modified_text": "644 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "d2plus.com",
    "type": "Domain"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "d2plus.com",
    "found": false,
    "verdict": "clean",
    "urls": [],
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776680751.540774
}