{
  "type": "Domain",
  "indicator": "devsetgroup.com",
  "general": {
    "sections": [
      "general",
      "geo",
      "url_list",
      "passive_dns",
      "malware",
      "whois",
      "http_scans"
    ],
    "whois": "http://whois.domaintools.com/devsetgroup.com",
    "alexa": "http://www.alexa.com/siteinfo/devsetgroup.com",
    "indicator": "devsetgroup.com",
    "type": "domain",
    "type_title": "Domain",
    "validation": [],
    "base_indicator": {
      "id": 3650114011,
      "indicator": "devsetgroup.com",
      "type": "domain",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 50,
      "pulses": [
        {
          "id": "65134c8e56a09724279d94a3",
          "name": "Dusting for fingerprints: ShadowSyndicate, a new RaaS player?",
          "description": "The Ransomware-as-a-Service (RaaS) market is a fast-moving one. Prominent RaaS or affiliate groups can form, wreak havoc, and disband all within a short period of time. In Hi-Tech Crime Trends 2022/2023, Group-IB Threat Intelligence\u2019s review of the top cyber threats, our researchers predicted that the RaaS industry will continue to grow rapidly and that numerous new gangs would likely appear on the block. In this blog, we\u2019ll detail what we believe to be a new RaaS group that appears to operate differently from the rest: Enter ShadowSyndicate.",
          "modified": "2023-12-17T00:02:57.642000",
          "created": "2023-09-26T21:26:37.884000",
          "tags": [
            "Cobalt Strike",
            "ShadowSyndicate",
            "SSH",
            "Quantum ransomware",
            "IcedID",
            "Matanbuchus"
          ],
          "references": [
            "https://www.group-ib.com/blog/shadowsyndicate-raas/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1094",
              "name": "Custom Command and Control Protocol",
              "display_name": "T1094 - Custom Command and Control Protocol"
            },
            {
              "id": "T1471",
              "name": "Data Encrypted for Impact",
              "display_name": "T1471 - Data Encrypted for Impact"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 475,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "AlienVault",
            "id": "2",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_2/resized/80/avatar_dacfad0ca8.png",
            "is_subscribed": true,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 4,
            "domain": 33,
            "hostname": 7
          },
          "indicator_count": 44,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 377573,
          "modified_text": "854 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6675c61d2a8e4554b9985027",
          "name": "BLOCK_2024",
          "description": "",
          "modified": "2026-02-04T19:03:11.880000",
          "created": "2024-06-21T18:27:41.885000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": "65e899612f5527bad9d4e5a8",
          "export_count": 6863701,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "BLOCKINGBLOCK",
            "id": "211480",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_211480/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 2306,
            "FileHash-MD5": 4833,
            "URL": 1674,
            "hostname": 1302,
            "FileHash-SHA256": 6371,
            "FileHash-SHA1": 4014,
            "IPv4": 3524,
            "CIDR": 19,
            "email": 190,
            "CVE": 4
          },
          "indicator_count": 24237,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 108,
          "modified_text": "74 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69404b09d8296388596ecfa9",
          "name": "BLOCK_2025_DIC",
          "description": "",
          "modified": "2025-12-24T16:04:11.529000",
          "created": "2025-12-15T17:53:13.004000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": "6675c61d2a8e4554b9985027",
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "BLOCKINGBLOCK",
            "id": "211480",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_211480/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 2300,
            "FileHash-MD5": 4833,
            "URL": 1673,
            "hostname": 1297,
            "FileHash-SHA256": 6371,
            "FileHash-SHA1": 4014,
            "IPv4": 3235,
            "CIDR": 19,
            "email": 170,
            "CVE": 4
          },
          "indicator_count": 23916,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 79,
          "modified_text": "116 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "689483159128c89f669e87d6",
          "name": "EbeeAugust2025 Pt1",
          "description": "",
          "modified": "2025-09-06T10:00:39.896000",
          "created": "2025-08-07T10:42:29.730000",
          "tags": [],
          "references": [
            "Aug1.pdf"
          ],
          "public": 1,
          "adversary": "Multiple",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "IMEBEEIMFINE",
            "id": "343873",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 75,
            "CVE": 1,
            "FileHash-MD5": 111,
            "FileHash-SHA1": 139,
            "FileHash-SHA256": 243,
            "domain": 137,
            "hostname": 43,
            "email": 1
          },
          "indicator_count": 750,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 37,
          "modified_text": "225 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "654c34e7efa40976a9dd655b",
          "name": "SOC2023",
          "description": "",
          "modified": "2025-08-17T17:03:38.868000",
          "created": "2023-11-09T01:24:55.160000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": "65491efbfc3d9479076431bb",
          "export_count": 36,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "BLOCKINGBLOCK",
            "id": "211480",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_211480/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1714,
            "FileHash-MD5": 3448,
            "URL": 727,
            "hostname": 912,
            "FileHash-SHA256": 4539,
            "FileHash-SHA1": 2696,
            "IPv4": 276,
            "CIDR": 10,
            "email": 28
          },
          "indicator_count": 14350,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 91,
          "modified_text": "245 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "679c246da161670e959a9eec",
          "name": "2024-blocking-soc-ene25",
          "description": "",
          "modified": "2025-02-15T00:01:08.338000",
          "created": "2025-01-31T01:16:29.608000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": "6675c61d2a8e4554b9985027",
          "export_count": 23,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "BLOCKINGBLOCK",
            "id": "211480",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_211480/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 2045,
            "FileHash-MD5": 4426,
            "URL": 1463,
            "hostname": 1231,
            "FileHash-SHA256": 5892,
            "FileHash-SHA1": 3625,
            "IPv4": 189,
            "CIDR": 6,
            "email": 163
          },
          "indicator_count": 19040,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 84,
          "modified_text": "428 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "679c246c8bf7850b5096828e",
          "name": "2024-blocking-soc-ene25",
          "description": "",
          "modified": "2025-02-15T00:01:08.338000",
          "created": "2025-01-31T01:16:28.004000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": "6675c61d2a8e4554b9985027",
          "export_count": 17,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "BLOCKINGBLOCK",
            "id": "211480",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_211480/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 2045,
            "FileHash-MD5": 4426,
            "URL": 1463,
            "hostname": 1231,
            "FileHash-SHA256": 5892,
            "FileHash-SHA1": 3625,
            "IPv4": 189,
            "CIDR": 6,
            "email": 163
          },
          "indicator_count": 19040,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 84,
          "modified_text": "428 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6765eebf9ec06704f3a6ea68",
          "name": "CLON IPIF",
          "description": "",
          "modified": "2025-01-09T23:04:00.232000",
          "created": "2024-12-20T22:25:03.407000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": "6675c61d2a8e4554b9985027",
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "BLOCKINGBLOCK",
            "id": "211480",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_211480/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 2031,
            "FileHash-MD5": 4171,
            "URL": 1324,
            "hostname": 1222,
            "FileHash-SHA256": 5634,
            "FileHash-SHA1": 3368,
            "IPv4": 189,
            "CIDR": 6,
            "email": 162
          },
          "indicator_count": 18107,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 84,
          "modified_text": "464 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6758ebc2472100ac75acad69",
          "name": "2024-DIC-10-Clon",
          "description": "",
          "modified": "2025-01-09T23:04:00.232000",
          "created": "2024-12-11T01:32:50.260000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": "6675c61d2a8e4554b9985027",
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "BLOCKINGBLOCK",
            "id": "211480",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_211480/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 2030,
            "FileHash-MD5": 4171,
            "URL": 1324,
            "hostname": 1222,
            "FileHash-SHA256": 5634,
            "FileHash-SHA1": 3368,
            "IPv4": 189,
            "CIDR": 6,
            "email": 162
          },
          "indicator_count": 18106,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 84,
          "modified_text": "464 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6732a0b6cc4c5356a823de37",
          "name": "_CLON_2024_NOV11",
          "description": "",
          "modified": "2024-12-11T00:00:21.805000",
          "created": "2024-11-12T00:26:30.524000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": "6675c61d2a8e4554b9985027",
          "export_count": 30,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "BLOCKINGBLOCK",
            "id": "211480",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_211480/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1795,
            "FileHash-MD5": 3724,
            "URL": 1028,
            "hostname": 1096,
            "FileHash-SHA256": 5030,
            "FileHash-SHA1": 2927,
            "IPv4": 189,
            "CIDR": 6,
            "email": 28
          },
          "indicator_count": 15823,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 84,
          "modified_text": "494 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "66144d653e605338c122077c",
          "name": "Final Project",
          "description": "Pulse created to complete final project",
          "modified": "2024-04-08T20:13:33.944000",
          "created": "2024-04-08T20:02:45.967000",
          "tags": [
            "malware descriptions",
            "microsoft windows",
            "ransomware",
            "trojan",
            "vulnerabilities and exploits",
            "zero-day vulnerabilities",
            "cve202328252",
            "microsoft",
            "clfs",
            "logblockheader",
            "common log",
            "file system",
            "kaspersky",
            "apts",
            "control",
            "record",
            "nokoyawa",
            "february",
            "april",
            "june",
            "puzzlemaker",
            "cobalt strike",
            "exploit",
            "cobaltstrike",
            "jsworm"
          ],
          "references": [
            "https://securelist.com/nokoyawa-ransomware-attacks-with-windows-zero-day/109483/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Cobalt Strike",
              "display_name": "Cobalt Strike",
              "target": null
            },
            {
              "id": "JSWorm",
              "display_name": "JSWorm",
              "target": null
            },
            {
              "id": "Nokoyawa",
              "display_name": "Nokoyawa",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1543",
              "name": "Create or Modify System Process",
              "display_name": "T1543 - Create or Modify System Process"
            }
          ],
          "industries": [
            "Retail",
            "Wholesale",
            "Energy",
            "Manufacturing",
            "Healthcare"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 16,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "ifekayode",
            "id": "277908",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 6,
            "FileHash-MD5": 5,
            "FileHash-SHA1": 1,
            "FileHash-SHA256": 2,
            "domain": 4,
            "URL": 1,
            "email": 1
          },
          "indicator_count": 20,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 1,
          "modified_text": "741 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65fc23e4c36f0715310e1d95",
          "name": "SOC_BLOCK_NEW",
          "description": "",
          "modified": "2024-03-21T12:11:41.190000",
          "created": "2024-03-21T12:11:16.345000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": "65e899612f5527bad9d4e5a8",
          "export_count": 275,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": true,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "fencesense",
            "id": "255590",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1715,
            "FileHash-MD5": 3498,
            "URL": 729,
            "hostname": 911,
            "FileHash-SHA256": 4590,
            "FileHash-SHA1": 2746,
            "IPv4": 189,
            "CIDR": 6,
            "email": 28
          },
          "indicator_count": 14412,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 25,
          "modified_text": "759 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65539ae80b7b6e0d9c669216",
          "name": "Test Pulse",
          "description": "",
          "modified": "2023-12-16T16:02:10.435000",
          "created": "2023-11-14T16:06:00.013000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 24,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "gzerphPer",
            "id": "197016",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "IPv4": 3,
            "URL": 189,
            "FileHash-MD5": 442,
            "FileHash-SHA1": 395,
            "FileHash-SHA256": 659,
            "email": 1,
            "hostname": 298,
            "domain": 515,
            "FilePath": 12
          },
          "indicator_count": 2514,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 1,
          "modified_text": "855 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a9b042961d3e7a6a564d",
          "name": "bkp16oct",
          "description": "",
          "modified": "2023-12-06T17:04:48.880000",
          "created": "2023-12-06T17:04:48.880000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 12,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1390,
            "FileHash-SHA256": 3099,
            "hostname": 769,
            "FileHash-MD5": 2353,
            "FileHash-SHA1": 1624,
            "URL": 590,
            "email": 26,
            "IPv4": 150,
            "CIDR": 6
          },
          "indicator_count": 10007,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 113,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a8b5cae685fce7f5231f",
          "name": "bkp oct 10",
          "description": "",
          "modified": "2023-12-06T17:00:37.687000",
          "created": "2023-12-06T17:00:37.687000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1376,
            "FileHash-SHA256": 3065,
            "hostname": 768,
            "FileHash-MD5": 2320,
            "FileHash-SHA1": 1591,
            "URL": 589,
            "email": 26,
            "IPv4": 150,
            "CIDR": 6
          },
          "indicator_count": 9891,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a7d02c5746343283fc12",
          "name": "bkp5o23",
          "description": "",
          "modified": "2023-12-06T16:56:48.472000",
          "created": "2023-12-06T16:56:48.472000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1365,
            "FileHash-SHA256": 3021,
            "hostname": 764,
            "FileHash-MD5": 2278,
            "FileHash-SHA1": 1539,
            "URL": 589,
            "email": 26,
            "IPv4": 150,
            "CIDR": 6
          },
          "indicator_count": 9738,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a7aaee2e95f7517277d3",
          "name": "bkp03test",
          "description": "",
          "modified": "2023-12-06T16:56:10.492000",
          "created": "2023-12-06T16:56:10.492000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1362,
            "FileHash-SHA256": 2891,
            "hostname": 755,
            "FileHash-MD5": 2159,
            "FileHash-SHA1": 1420,
            "URL": 589,
            "email": 26,
            "IPv4": 148,
            "CIDR": 6
          },
          "indicator_count": 9356,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a7a346ec10c12d5b15b5",
          "name": "BKPo3",
          "description": "",
          "modified": "2023-12-06T16:56:03.381000",
          "created": "2023-12-06T16:56:03.381000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1362,
            "FileHash-SHA256": 2891,
            "hostname": 755,
            "FileHash-MD5": 2159,
            "FileHash-SHA1": 1420,
            "URL": 589,
            "email": 26,
            "IPv4": 148,
            "CIDR": 6
          },
          "indicator_count": 9356,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a602c1e9c47280c247e4",
          "name": "SOC2023",
          "description": "",
          "modified": "2023-12-06T16:49:06.159000",
          "created": "2023-12-06T16:49:06.159000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1420,
            "FileHash-SHA256": 3123,
            "hostname": 769,
            "FileHash-MD5": 2379,
            "FileHash-SHA1": 1642,
            "URL": 590,
            "email": 26,
            "IPv4": 150,
            "CIDR": 6
          },
          "indicator_count": 10105,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a5f81702fdce6c496a1c",
          "name": "Undefined Name",
          "description": "",
          "modified": "2023-12-06T16:48:56.950000",
          "created": "2023-12-06T16:48:56.950000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1345,
            "FileHash-SHA256": 2819,
            "hostname": 741,
            "FileHash-MD5": 2106,
            "FileHash-SHA1": 1371,
            "URL": 571,
            "email": 26,
            "IPv4": 148,
            "CIDR": 6
          },
          "indicator_count": 9133,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a5a5f6bf793f823e6397",
          "name": "Undefined Name",
          "description": "",
          "modified": "2023-12-06T16:47:33.032000",
          "created": "2023-12-06T16:47:33.032000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1345,
            "FileHash-SHA256": 2819,
            "hostname": 741,
            "FileHash-MD5": 2106,
            "FileHash-SHA1": 1371,
            "URL": 571,
            "email": 26,
            "IPv4": 148,
            "CIDR": 6
          },
          "indicator_count": 9133,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a131970ec6097f14145d",
          "name": "SOC BACKUP 30 agosto 23",
          "description": "",
          "modified": "2023-12-06T16:28:33.117000",
          "created": "2023-12-06T16:28:33.117000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 2285,
            "FileHash-MD5": 1940,
            "FileHash-SHA1": 1329,
            "domain": 1221,
            "URL": 509,
            "hostname": 691,
            "email": 26,
            "IPv4": 148,
            "CIDR": 6
          },
          "indicator_count": 8155,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65709d867a940714a5e7986c",
          "name": "soc bkp 20jul23",
          "description": "",
          "modified": "2023-12-06T16:12:54.283000",
          "created": "2023-12-06T16:12:54.283000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1808,
            "FileHash-MD5": 1232,
            "FileHash-SHA1": 991,
            "domain": 1138,
            "URL": 431,
            "hostname": 546,
            "email": 26,
            "IPv4": 142,
            "CIDR": 6
          },
          "indicator_count": 6320,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65709d02c0ab86d6d480a712",
          "name": "prueba final9",
          "description": "",
          "modified": "2023-12-06T16:10:42.479000",
          "created": "2023-12-06T16:10:42.479000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1159,
            "FileHash-SHA256": 1645,
            "FileHash-SHA1": 913,
            "domain": 1082,
            "URL": 353,
            "email": 25,
            "hostname": 395,
            "CIDR": 6
          },
          "indicator_count": 5578,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65709cd0237fe7c1dad22d00",
          "name": "backup soc 3jul",
          "description": "",
          "modified": "2023-12-06T16:09:52.107000",
          "created": "2023-12-06T16:09:52.107000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1607,
            "FileHash-MD5": 1121,
            "FileHash-SHA1": 863,
            "domain": 1094,
            "URL": 349,
            "hostname": 371,
            "email": 25,
            "IPv4": 131,
            "CIDR": 6
          },
          "indicator_count": 5567,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65709c30640281616285e1c3",
          "name": "Backup_soc_2022_05jun23",
          "description": "",
          "modified": "2023-12-06T16:07:12.894000",
          "created": "2023-12-06T16:07:12.894000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 1115,
            "FileHash-SHA256": 1554,
            "FileHash-SHA1": 857,
            "domain": 1079,
            "URL": 338,
            "hostname": 368,
            "email": 25,
            "IPv4": 131,
            "CIDR": 6
          },
          "indicator_count": 5473,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "657093164553ecf08ba4a8bd",
          "name": "SOC2022ALL",
          "description": "",
          "modified": "2023-12-06T15:28:22.905000",
          "created": "2023-12-06T15:28:22.905000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1345,
            "FileHash-SHA256": 2819,
            "hostname": 741,
            "FileHash-MD5": 2106,
            "FileHash-SHA1": 1371,
            "URL": 571,
            "email": 26,
            "IPv4": 148,
            "CIDR": 6
          },
          "indicator_count": 9133,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65250b33cd82629b184a2892",
          "name": "Dusting for fingerprints: ShadowSyndicate, a new RaaS player?",
          "description": "",
          "modified": "2023-11-04T15:01:12.263000",
          "created": "2023-10-10T08:28:35.806000",
          "tags": [],
          "references": [
            "https://www.group-ib.com/blog/shadowsyndicate-raas/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": "651ed59f24821c3a8fee9155",
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "santravault1",
            "id": "217419",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_217419/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 4,
            "domain": 33,
            "hostname": 7
          },
          "indicator_count": 44,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 75,
          "modified_text": "897 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "651ed59f24821c3a8fee9155",
          "name": "Dusting for fingerprints: ShadowSyndicate, a new RaaS player? | Group-IB Blog",
          "description": "",
          "modified": "2023-11-04T15:01:12.263000",
          "created": "2023-10-05T15:26:23.365000",
          "tags": [],
          "references": [
            "https://www.group-ib.com/blog/shadowsyndicate-raas/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 18,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "99gmotor",
            "id": "234776",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 4,
            "domain": 33,
            "hostname": 7
          },
          "indicator_count": 44,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 45,
          "modified_text": "897 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "651d941a5b6307a52d3a44a1",
          "name": "Dusting for fingerprints: ShadowSyndicate, a new RaaS player? | Group-IB Blog",
          "description": "",
          "modified": "2023-11-03T16:01:01.291000",
          "created": "2023-10-04T16:34:34.131000",
          "tags": [
            "cobalt strike",
            "shadowsyndicate",
            "nokoyawa",
            "september",
            "strong",
            "alphv",
            "cl0p",
            "april",
            "list a",
            "november",
            "august",
            "royal",
            "panama",
            "icedid",
            "unknown",
            "play",
            "february",
            "sliver",
            "conti",
            "ryuk",
            "june",
            "play ransomware",
            "matanbuchus",
            "meterpreter",
            "trickbot",
            "team",
            "metasploit",
            "shell",
            "tools",
            "gootloader",
            "comment",
            "karakurt",
            "ransomexx",
            "revil",
            "malspam",
            "nemty",
            "blackcat"
          ],
          "references": [
            "https://www.group-ib.com/blog/shadowsyndicate-raas/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 54,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Legion@2023",
            "id": "234229",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 4,
            "domain": 33,
            "hostname": 7
          },
          "indicator_count": 44,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 37,
          "modified_text": "898 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65157d1358a3107b2ee5f055",
          "name": "Dusting for fingerprints: ShadowSyndicate, a new RaaS player? | Group-IB Blog",
          "description": "",
          "modified": "2023-10-28T13:00:32.089000",
          "created": "2023-09-28T13:18:11.640000",
          "tags": [
            "cobalt strike",
            "shadowsyndicate",
            "nokoyawa",
            "september",
            "strong",
            "alphv",
            "cl0p",
            "april",
            "list a",
            "november",
            "august",
            "royal",
            "panama",
            "icedid",
            "unknown",
            "play",
            "february",
            "sliver",
            "conti",
            "ryuk",
            "june",
            "play ransomware",
            "matanbuchus",
            "meterpreter",
            "trickbot",
            "team",
            "metasploit",
            "shell",
            "tools",
            "gootloader",
            "comment",
            "karakurt",
            "ransomexx",
            "revil",
            "malspam",
            "nemty",
            "blackcat"
          ],
          "references": [
            "https://www.group-ib.com/blog/shadowsyndicate-raas/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 46,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Cyber74Team",
            "id": "202637",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_202637/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 4,
            "domain": 33,
            "hostname": 7
          },
          "indicator_count": 44,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 165,
          "modified_text": "904 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65140b17488d4f507c0050c3",
          "name": "Dusting for fingerprints: ShadowSyndicate, a new RaaS player? | Group-IB Blog",
          "description": "",
          "modified": "2023-10-27T10:02:00.427000",
          "created": "2023-09-27T10:59:35.797000",
          "tags": [
            "cobalt strike",
            "shadowsyndicate",
            "nokoyawa",
            "september",
            "strong",
            "alphv",
            "cl0p",
            "april",
            "list a",
            "november",
            "august",
            "royal",
            "panama",
            "icedid",
            "unknown",
            "play",
            "february",
            "sliver",
            "conti",
            "ryuk",
            "june",
            "play ransomware",
            "matanbuchus",
            "meterpreter",
            "trickbot",
            "team",
            "metasploit",
            "shell",
            "tools",
            "gootloader",
            "comment",
            "karakurt",
            "ransomexx",
            "revil",
            "malspam",
            "nemty",
            "blackcat"
          ],
          "references": [
            "https://www.group-ib.com/blog/shadowsyndicate-raas/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 43,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "CyberHunter_NL",
            "id": "171283",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_171283/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 4,
            "domain": 33,
            "hostname": 7
          },
          "indicator_count": 44,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 846,
          "modified_text": "905 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6513b48fc15b29e096cc0883",
          "name": "Dusting for fingerprints: ShadowSyndicate, a new RaaS player? | Group-IB Blog",
          "description": "",
          "modified": "2023-10-27T04:01:31.874000",
          "created": "2023-09-27T04:50:23.854000",
          "tags": [
            "cobalt strike",
            "shadowsyndicate",
            "nokoyawa",
            "september",
            "strong",
            "alphv",
            "cl0p",
            "april",
            "list a",
            "november",
            "august",
            "royal",
            "panama",
            "icedid",
            "unknown",
            "play",
            "february",
            "sliver",
            "conti",
            "ryuk",
            "june",
            "play ransomware",
            "matanbuchus",
            "meterpreter",
            "trickbot",
            "team",
            "metasploit",
            "shell",
            "tools",
            "gootloader",
            "comment",
            "karakurt",
            "ransomexx",
            "revil",
            "malspam",
            "nemty",
            "blackcat"
          ],
          "references": [
            "https://www.group-ib.com/blog/shadowsyndicate-raas/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 45,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "cryptocti",
            "id": "110256",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_110256/resized/80/avatar_e237a4257c.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 4,
            "domain": 33,
            "hostname": 7
          },
          "indicator_count": 44,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 485,
          "modified_text": "905 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6346ee707f119521a426ecc9",
          "name": "SOC2022ALL",
          "description": "DD",
          "modified": "2023-10-21T14:02:41.990000",
          "created": "2022-10-12T16:42:24.004000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 16454,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "BLOCKINGBLOCK",
            "id": "211480",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_211480/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1490,
            "FileHash-MD5": 2606,
            "URL": 611,
            "hostname": 831,
            "FileHash-SHA256": 3518,
            "FileHash-SHA1": 1794,
            "IPv4": 187,
            "CIDR": 6,
            "email": 26
          },
          "indicator_count": 11069,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 102,
          "modified_text": "911 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6513dba95e9f04e377e80ec6",
          "name": "Dusting for fingerprints: ShadowSyndicate, a new RaaS player?",
          "description": "",
          "modified": "2023-09-27T07:37:13.684000",
          "created": "2023-09-27T07:37:13.684000",
          "tags": [
            "Cobalt Strike",
            "ShadowSyndicate",
            "SSH",
            "Quantum ransomware",
            "IcedID",
            "Matanbuchus"
          ],
          "references": [
            "https://www.group-ib.com/blog/shadowsyndicate-raas/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1094",
              "name": "Custom Command and Control Protocol",
              "display_name": "T1094 - Custom Command and Control Protocol"
            },
            {
              "id": "T1471",
              "name": "Data Encrypted for Impact",
              "display_name": "T1471 - Data Encrypted for Impact"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "6513d2f4bd7a777522384d5c",
          "export_count": 21,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Tr1sa111",
            "id": "192483",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 4,
            "domain": 33,
            "hostname": 7
          },
          "indicator_count": 44,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 264,
          "modified_text": "935 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6513d2f4bd7a777522384d5c",
          "name": "Dusting for fingerprints: ShadowSyndicate, a new RaaS player?",
          "description": "",
          "modified": "2023-09-27T07:00:04.025000",
          "created": "2023-09-27T07:00:04.025000",
          "tags": [
            "Cobalt Strike",
            "ShadowSyndicate",
            "SSH",
            "Quantum ransomware",
            "IcedID",
            "Matanbuchus"
          ],
          "references": [
            "https://www.group-ib.com/blog/shadowsyndicate-raas/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1094",
              "name": "Custom Command and Control Protocol",
              "display_name": "T1094 - Custom Command and Control Protocol"
            },
            {
              "id": "T1471",
              "name": "Data Encrypted for Impact",
              "display_name": "T1471 - Data Encrypted for Impact"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "65134c8e56a09724279d94a3",
          "export_count": 12,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "tr2222200",
            "id": "207905",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 4,
            "domain": 33,
            "hostname": 7
          },
          "indicator_count": 44,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 182,
          "modified_text": "935 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6513d29aa4726d5d22c9dbc9",
          "name": "Dusting for fingerprints: ShadowSyndicate, a new RaaS player?",
          "description": "",
          "modified": "2023-09-27T06:58:34.207000",
          "created": "2023-09-27T06:58:34.207000",
          "tags": [
            "Cobalt Strike",
            "ShadowSyndicate",
            "SSH",
            "Quantum ransomware",
            "IcedID",
            "Matanbuchus"
          ],
          "references": [
            "https://www.group-ib.com/blog/shadowsyndicate-raas/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1094",
              "name": "Custom Command and Control Protocol",
              "display_name": "T1094 - Custom Command and Control Protocol"
            },
            {
              "id": "T1471",
              "name": "Data Encrypted for Impact",
              "display_name": "T1471 - Data Encrypted for Impact"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": "65134c8e56a09724279d94a3",
          "export_count": 12,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "tr2222200",
            "id": "207905",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 4,
            "domain": 33,
            "hostname": 7
          },
          "indicator_count": 44,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 182,
          "modified_text": "935 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "64484a55bd892f876f68ffe5",
          "name": "Mercury group",
          "description": "MERCURY and DEV-1084: Destructive attack on hybrid environment. mercury is malicious group linked to Irn",
          "modified": "2023-05-10T20:00:32.823000",
          "created": "2023-04-25T21:47:01.671000",
          "tags": [
            "nokoyawa",
            "sha256 nokoyawa",
            "domain drokbk",
            "ip address",
            "drokbk c2",
            "abraham",
            "file name",
            "charmpower lure",
            "charmpower",
            "indicator type",
            "sha256 soldier",
            "drokbk",
            "clear",
            "sha1",
            "md5 mimikatz",
            "md5 netscan",
            "sha256 clear",
            "email address",
            "ransom note",
            "clear farusbig",
            "domain trigona",
            "command",
            "dev1084 batch",
            "download rport",
            "rport domain",
            "rport legit",
            "backdoor",
            "script backdoor",
            "na clear",
            "sha256 na",
            "sha1 na",
            "md5 na",
            "domain na",
            "clear https",
            "sha267",
            "cmd365 sample",
            "google firebase",
            "explorer",
            "chisel",
            "anydesk",
            "exploit"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "EagleEye",
            "id": "232889",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 13,
            "FileHash-MD5": 95,
            "FileHash-SHA1": 90,
            "FileHash-SHA256": 164,
            "domain": 23,
            "hostname": 3,
            "IPv4": 7,
            "email": 2,
            "CVE": 1
          },
          "indicator_count": 398,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 27,
          "modified_text": "1075 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6433fac756a7eae7f9add1d2",
          "name": "Cobalt Strike Servers & C2 | 04/03/2023",
          "description": "IronNet Threat Analysts scan the web searching for hosts that are serving Cobalt Strike beacons. These indicators are hosting Cobalt Strike payloads and are the C2 according to their configs. These servers were scanned the week of 04/03/2023.",
          "modified": "2023-05-10T00:05:09.736000",
          "created": "2023-04-10T12:02:14.989000",
          "tags": [
            "Cobalt Strike"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Cobalt Strike - S0154",
              "display_name": "Cobalt Strike - S0154",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 28,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "IronNetTR",
            "id": "135317",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_135317/resized/80/avatar_3be4d4773d.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {},
          "indicator_count": 0,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 233,
          "modified_text": "1075 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 0
        },
        {
          "id": "6433facf37055146fcc1f825",
          "name": "Cobalt Strike C2 | 04/03/2023",
          "description": "IronNet Threat Analysts scan the web searching for hosts that are serving Cobalt Strike beacons. We then pull them down and extract the beacon config for analysis. The IPs and domains in this pulse are the C2 hosts extracted from those configs. These servers were scanned the week of 04/03/2023.",
          "modified": "2023-05-10T00:05:09.736000",
          "created": "2023-04-10T12:02:23.260000",
          "tags": [
            "Cobalt Strike"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Cobalt Strike - S0154",
              "display_name": "Cobalt Strike - S0154",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 14,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "IronNetTR",
            "id": "135317",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_135317/resized/80/avatar_3be4d4773d.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {},
          "indicator_count": 0,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 230,
          "modified_text": "1075 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 0
        },
        {
          "id": "642ac08bb29fde85b6ea899a",
          "name": "Cobalt Strike Servers & C2 | 03/27/2023",
          "description": "IronNet Threat Analysts scan the web searching for hosts that are serving Cobalt Strike beacons. These indicators are hosting Cobalt Strike payloads and are the C2 according to their configs. These servers were scanned the week of 03/27/2023.",
          "modified": "2023-05-03T00:02:19.100000",
          "created": "2023-04-03T12:03:23.007000",
          "tags": [
            "Cobalt Strike"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Cobalt Strike - S0154",
              "display_name": "Cobalt Strike - S0154",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "IronNetTR",
            "id": "135317",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_135317/resized/80/avatar_3be4d4773d.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {},
          "indicator_count": 0,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 230,
          "modified_text": "1082 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 0
        },
        {
          "id": "642ac0982fabb0e6de3c32f5",
          "name": "Cobalt Strike C2 | 03/27/2023",
          "description": "IronNet Threat Analysts scan the web searching for hosts that are serving Cobalt Strike beacons. We then pull them down and extract the beacon config for analysis. The IPs and domains in this pulse are the C2 hosts extracted from those configs. These servers were scanned the week of 03/27/2023.",
          "modified": "2023-05-03T00:02:19.100000",
          "created": "2023-04-03T12:03:36.361000",
          "tags": [
            "Cobalt Strike"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Cobalt Strike - S0154",
              "display_name": "Cobalt Strike - S0154",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "IronNetTR",
            "id": "135317",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_135317/resized/80/avatar_3be4d4773d.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {},
          "indicator_count": 0,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 229,
          "modified_text": "1082 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 0
        },
        {
          "id": "642225cfb7bbb45d751282e5",
          "name": "InQuest - 27-03-2023",
          "description": "",
          "modified": "2023-04-26T23:04:14.955000",
          "created": "2023-03-27T23:25:03.239000",
          "tags": [],
          "references": [
            "https://labs.inquest.net/iocdb"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "CyberHunterAutoFeed",
            "id": "182496",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_182496/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 153,
            "domain": 1037,
            "URL": 1565,
            "hostname": 288,
            "FileHash-MD5": 25,
            "FileHash-SHA1": 12
          },
          "indicator_count": 3080,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 1600,
          "modified_text": "1088 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "641f9134764d8ffe7b7dc2c2",
          "name": "InQuest - 25-03-2023",
          "description": "",
          "modified": "2023-04-25T00:05:37.678000",
          "created": "2023-03-26T00:26:28.383000",
          "tags": [],
          "references": [
            "https://labs.inquest.net/iocdb"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "CyberHunterAutoFeed",
            "id": "182496",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_182496/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 309,
            "domain": 1166,
            "URL": 1794,
            "hostname": 244,
            "FileHash-MD5": 11,
            "FileHash-SHA1": 7
          },
          "indicator_count": 3531,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 1601,
          "modified_text": "1090 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "641e3e1fb27dd0e61de60f24",
          "name": "InQuest - 24-03-2023",
          "description": "",
          "modified": "2023-04-24T00:04:14.074000",
          "created": "2023-03-25T00:19:43.421000",
          "tags": [],
          "references": [
            "https://labs.inquest.net/iocdb"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "CyberHunterAutoFeed",
            "id": "182496",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_182496/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 1250,
            "URL": 1833,
            "FileHash-SHA256": 297,
            "hostname": 278,
            "FileHash-MD5": 27,
            "FileHash-SHA1": 11
          },
          "indicator_count": 3696,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 1600,
          "modified_text": "1091 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "643d353a19934d688a812ad6",
          "name": "Cobalt Strike C2 | 04/10/2023",
          "description": "IronNet Threat Analysts scan the web searching for hosts that are serving Cobalt Strike beacons. We then pull them down and extract the beacon config for analysis. The IPs and domains in this pulse are the C2 hosts extracted from those configs. These servers were scanned the week of 04/10/2023.",
          "modified": "2023-04-17T12:02:02.681000",
          "created": "2023-04-17T12:02:02.681000",
          "tags": [
            "Cobalt Strike"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Cobalt Strike - S0154",
              "display_name": "Cobalt Strike - S0154",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 20,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "IronNetTR",
            "id": "135317",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_135317/resized/80/avatar_3be4d4773d.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "IPv4": 33,
            "hostname": 54,
            "domain": 35
          },
          "indicator_count": 122,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 229,
          "modified_text": "1098 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "643d35360350825bffcd0cba",
          "name": "Cobalt Strike Servers & C2 | 04/10/2023",
          "description": "IronNet Threat Analysts scan the web searching for hosts that are serving Cobalt Strike beacons. These indicators are hosting Cobalt Strike payloads and are the C2 according to their configs. These servers were scanned the week of 04/10/2023.",
          "modified": "2023-04-17T12:01:58.821000",
          "created": "2023-04-17T12:01:58.821000",
          "tags": [
            "Cobalt Strike"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Cobalt Strike - S0154",
              "display_name": "Cobalt Strike - S0154",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "TA0011",
              "name": "Command and Control",
              "display_name": "TA0011 - Command and Control"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 20,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "IronNetTR",
            "id": "135317",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_135317/resized/80/avatar_3be4d4773d.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "IPv4": 820,
            "domain": 36,
            "hostname": 104
          },
          "indicator_count": 960,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 229,
          "modified_text": "1098 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "643cf62052be5ec5c808c0f2",
          "name": "Nokoyawa ransomware attacks with Windows zero-day",
          "description": "",
          "modified": "2023-04-17T07:32:48.210000",
          "created": "2023-04-17T07:32:48.210000",
          "tags": [
            "Windows 0day",
            "CVE-2023-28252"
          ],
          "references": [
            "2755642.misp-json",
            "https://securelist.com/nokoyawa-ransomware-attacks-with-windows-zero-day/109483/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "nokoyama",
              "display_name": "nokoyama",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": "643cf479e0a17c4143f7577a",
          "export_count": 22,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Tr1sa111",
            "id": "192483",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 4,
            "FileHash-MD5": 5,
            "FileHash-SHA1": 1,
            "FileHash-SHA256": 1
          },
          "indicator_count": 11,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 267,
          "modified_text": "1098 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "643cf479e0a17c4143f7577a",
          "name": "Nokoyawa ransomware attacks with Windows zero-day",
          "description": "In February 2023, Kaspersky technologies detected a number of attempts to execute similar elevation-of-privilege exploits on Microsoft Windows servers belonging to small and medium-sized businesses in the Middle East, in North America, and previously in Asia regions. These exploits were very similar to already known Common Log File System (CLFS) driver exploits that we analyzed previously, but we decided to double check and it was worth it \u2013 one of the exploits turned out to be a zero-day, supporting different versions and builds of Windows, including Windows 11.",
          "modified": "2023-04-17T07:31:44.122000",
          "created": "2023-04-17T07:25:45.194000",
          "tags": [
            "Windows 0day",
            "CVE-2023-28252"
          ],
          "references": [
            "2755642.misp-json",
            "https://securelist.com/nokoyawa-ransomware-attacks-with-windows-zero-day/109483/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "nokoyama",
              "display_name": "nokoyama",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": "64379d0d1929616fc81557f6",
          "export_count": 13,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "tr2222200",
            "id": "207905",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 4,
            "FileHash-MD5": 5,
            "FileHash-SHA1": 1,
            "FileHash-SHA256": 1
          },
          "indicator_count": 11,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 182,
          "modified_text": "1098 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "64379d0d1929616fc81557f6",
          "name": "Nokoyawa ransomware attacks with Windows zero-day",
          "description": "RMPAC7/2023/002/02 41 Data  12/04/2023   Nokoyawa: CVE -2023 -28252 sfruttata come 0 -day al fine di veicolare il",
          "modified": "2023-04-13T06:11:25.414000",
          "created": "2023-04-13T06:11:25.414000",
          "tags": [],
          "references": [
            "2755642.misp-json",
            "https://securelist.com/nokoyawa-ransomware-attacks-with-windows-zero-day/109483/"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "otx_support",
            "id": "26678",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 4,
            "FileHash-MD5": 5,
            "FileHash-SHA1": 1,
            "FileHash-SHA256": 1
          },
          "indicator_count": 11,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 211,
          "modified_text": "1102 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "https://www.group-ib.com/blog/shadowsyndicate-raas/",
        "https://labs.inquest.net/iocdb",
        "https://securelist.com/nokoyawa-ransomware-attacks-with-windows-zero-day/109483/",
        "2755642.misp-json",
        "Aug1.pdf"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": []
        },
        "other": {
          "adversary": [
            "Multiple"
          ],
          "malware_families": [
            "Nokoyama",
            "Cobalt strike - s0154",
            "Cobalt strike",
            "Nokoyawa",
            "Jsworm"
          ],
          "industries": [
            "Energy",
            "Healthcare",
            "Wholesale",
            "Manufacturing",
            "Retail"
          ]
        }
      }
    },
    "false_positive": []
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 50,
  "pulses": [
    {
      "id": "65134c8e56a09724279d94a3",
      "name": "Dusting for fingerprints: ShadowSyndicate, a new RaaS player?",
      "description": "The Ransomware-as-a-Service (RaaS) market is a fast-moving one. Prominent RaaS or affiliate groups can form, wreak havoc, and disband all within a short period of time. In Hi-Tech Crime Trends 2022/2023, Group-IB Threat Intelligence\u2019s review of the top cyber threats, our researchers predicted that the RaaS industry will continue to grow rapidly and that numerous new gangs would likely appear on the block. In this blog, we\u2019ll detail what we believe to be a new RaaS group that appears to operate differently from the rest: Enter ShadowSyndicate.",
      "modified": "2023-12-17T00:02:57.642000",
      "created": "2023-09-26T21:26:37.884000",
      "tags": [
        "Cobalt Strike",
        "ShadowSyndicate",
        "SSH",
        "Quantum ransomware",
        "IcedID",
        "Matanbuchus"
      ],
      "references": [
        "https://www.group-ib.com/blog/shadowsyndicate-raas/"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1094",
          "name": "Custom Command and Control Protocol",
          "display_name": "T1094 - Custom Command and Control Protocol"
        },
        {
          "id": "T1471",
          "name": "Data Encrypted for Impact",
          "display_name": "T1471 - Data Encrypted for Impact"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 475,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "AlienVault",
        "id": "2",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_2/resized/80/avatar_dacfad0ca8.png",
        "is_subscribed": true,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 4,
        "domain": 33,
        "hostname": 7
      },
      "indicator_count": 44,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 377573,
      "modified_text": "854 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "6675c61d2a8e4554b9985027",
      "name": "BLOCK_2024",
      "description": "",
      "modified": "2026-02-04T19:03:11.880000",
      "created": "2024-06-21T18:27:41.885000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": "65e899612f5527bad9d4e5a8",
      "export_count": 6863701,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "BLOCKINGBLOCK",
        "id": "211480",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_211480/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 2306,
        "FileHash-MD5": 4833,
        "URL": 1674,
        "hostname": 1302,
        "FileHash-SHA256": 6371,
        "FileHash-SHA1": 4014,
        "IPv4": 3524,
        "CIDR": 19,
        "email": 190,
        "CVE": 4
      },
      "indicator_count": 24237,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 108,
      "modified_text": "74 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "69404b09d8296388596ecfa9",
      "name": "BLOCK_2025_DIC",
      "description": "",
      "modified": "2025-12-24T16:04:11.529000",
      "created": "2025-12-15T17:53:13.004000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": "6675c61d2a8e4554b9985027",
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "BLOCKINGBLOCK",
        "id": "211480",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_211480/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 2300,
        "FileHash-MD5": 4833,
        "URL": 1673,
        "hostname": 1297,
        "FileHash-SHA256": 6371,
        "FileHash-SHA1": 4014,
        "IPv4": 3235,
        "CIDR": 19,
        "email": 170,
        "CVE": 4
      },
      "indicator_count": 23916,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 79,
      "modified_text": "116 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "689483159128c89f669e87d6",
      "name": "EbeeAugust2025 Pt1",
      "description": "",
      "modified": "2025-09-06T10:00:39.896000",
      "created": "2025-08-07T10:42:29.730000",
      "tags": [],
      "references": [
        "Aug1.pdf"
      ],
      "public": 1,
      "adversary": "Multiple",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 9,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "IMEBEEIMFINE",
        "id": "343873",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 75,
        "CVE": 1,
        "FileHash-MD5": 111,
        "FileHash-SHA1": 139,
        "FileHash-SHA256": 243,
        "domain": 137,
        "hostname": 43,
        "email": 1
      },
      "indicator_count": 750,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 37,
      "modified_text": "225 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "654c34e7efa40976a9dd655b",
      "name": "SOC2023",
      "description": "",
      "modified": "2025-08-17T17:03:38.868000",
      "created": "2023-11-09T01:24:55.160000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": "65491efbfc3d9479076431bb",
      "export_count": 36,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "BLOCKINGBLOCK",
        "id": "211480",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_211480/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 1714,
        "FileHash-MD5": 3448,
        "URL": 727,
        "hostname": 912,
        "FileHash-SHA256": 4539,
        "FileHash-SHA1": 2696,
        "IPv4": 276,
        "CIDR": 10,
        "email": 28
      },
      "indicator_count": 14350,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 91,
      "modified_text": "245 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "679c246da161670e959a9eec",
      "name": "2024-blocking-soc-ene25",
      "description": "",
      "modified": "2025-02-15T00:01:08.338000",
      "created": "2025-01-31T01:16:29.608000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": "6675c61d2a8e4554b9985027",
      "export_count": 23,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "BLOCKINGBLOCK",
        "id": "211480",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_211480/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 2045,
        "FileHash-MD5": 4426,
        "URL": 1463,
        "hostname": 1231,
        "FileHash-SHA256": 5892,
        "FileHash-SHA1": 3625,
        "IPv4": 189,
        "CIDR": 6,
        "email": 163
      },
      "indicator_count": 19040,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 84,
      "modified_text": "428 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "679c246c8bf7850b5096828e",
      "name": "2024-blocking-soc-ene25",
      "description": "",
      "modified": "2025-02-15T00:01:08.338000",
      "created": "2025-01-31T01:16:28.004000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": "6675c61d2a8e4554b9985027",
      "export_count": 17,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "BLOCKINGBLOCK",
        "id": "211480",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_211480/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 2045,
        "FileHash-MD5": 4426,
        "URL": 1463,
        "hostname": 1231,
        "FileHash-SHA256": 5892,
        "FileHash-SHA1": 3625,
        "IPv4": 189,
        "CIDR": 6,
        "email": 163
      },
      "indicator_count": 19040,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 84,
      "modified_text": "428 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "6765eebf9ec06704f3a6ea68",
      "name": "CLON IPIF",
      "description": "",
      "modified": "2025-01-09T23:04:00.232000",
      "created": "2024-12-20T22:25:03.407000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": "6675c61d2a8e4554b9985027",
      "export_count": 11,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "BLOCKINGBLOCK",
        "id": "211480",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_211480/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 2031,
        "FileHash-MD5": 4171,
        "URL": 1324,
        "hostname": 1222,
        "FileHash-SHA256": 5634,
        "FileHash-SHA1": 3368,
        "IPv4": 189,
        "CIDR": 6,
        "email": 162
      },
      "indicator_count": 18107,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 84,
      "modified_text": "464 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "6758ebc2472100ac75acad69",
      "name": "2024-DIC-10-Clon",
      "description": "",
      "modified": "2025-01-09T23:04:00.232000",
      "created": "2024-12-11T01:32:50.260000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": "6675c61d2a8e4554b9985027",
      "export_count": 11,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "BLOCKINGBLOCK",
        "id": "211480",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_211480/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 2030,
        "FileHash-MD5": 4171,
        "URL": 1324,
        "hostname": 1222,
        "FileHash-SHA256": 5634,
        "FileHash-SHA1": 3368,
        "IPv4": 189,
        "CIDR": 6,
        "email": 162
      },
      "indicator_count": 18106,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 84,
      "modified_text": "464 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "6732a0b6cc4c5356a823de37",
      "name": "_CLON_2024_NOV11",
      "description": "",
      "modified": "2024-12-11T00:00:21.805000",
      "created": "2024-11-12T00:26:30.524000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": "6675c61d2a8e4554b9985027",
      "export_count": 30,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "BLOCKINGBLOCK",
        "id": "211480",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_211480/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 1795,
        "FileHash-MD5": 3724,
        "URL": 1028,
        "hostname": 1096,
        "FileHash-SHA256": 5030,
        "FileHash-SHA1": 2927,
        "IPv4": 189,
        "CIDR": 6,
        "email": 28
      },
      "indicator_count": 15823,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 84,
      "modified_text": "494 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "devsetgroup.com",
    "type": "Domain"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "devsetgroup.com",
    "found": false,
    "verdict": "clean",
    "urls": [],
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776638773.404422
}